co2router.tech — Technical Reference

The Deterministic
Environmental Execution
Control Plane

CO₂Router is a pre-execution governance engine that authorizes compute before it runs. Every decision is deterministic, cryptographically sealed, and replayable. Five binding actions. Full signal provenance. 77ms p95.

Decision Schema

Five Binding Actions

Every authorization request returns exactly one of five binding actions. These are not recommendations — they are the output of a governance engine with execution authority.

ActionMeaning
run_nowConditions clear — execute immediately
rerouteRedirect to lower-carbon region
delayHold until clean window opens
throttleReduce resource footprint to comply
denyExecution refused — policy violation
The deny action distinguishes CO₂Router from advisory systems. A system that cannot deny does not govern.
Signal Architecture

Provider Hierarchy

Signals are ranked by trust tier. The lowest defensible signal is used — never averaged. Every signal carries source, freshness, estimated/synthetic flags, and confidence score through the decision into the proof frame.

TierProviderRoleStatus
T1WattTime MOER
MOER current + forecast
Primary causal routing signallive
T1EIA-930
Balance, interchange, subregion
Predictive grid telemetrylive
T2Electricity Maps
Premium, per-key
Flow-traced enrichment (optional)live
T3Ember
Monthly/yearly baseline
Structural validation onlylive
T4Aqueduct 2.1 / AWARE 2.0
27hr stale — monitored
Water stress indexdegraded
T4CO₂Router Decision Log
Grows with every decision
Proprietary moat — owned signallive
Governance

Multi-Objective Evaluation Order

1Policy
2Water
3SLA
4Carbon
5Cost

Evaluation is sequential and exits early on policy violation. Cost is never a routing reason — it is a consequence.

Cryptographic Provenance

SHA-256 ProofHash per Decision Frame

Every decision is sealed with a SHA-256 hash of the canonical decision envelope. The envelope includes: arbitrated signal values, policy evaluation result, decision action, selected region, reference timestamp, and operating mode. Any modification to the record invalidates the hash.

// CiResponseV2 — core proof fields
{
  decisionFrameId:     "32133b3a-77f5-4123-b5f6-024e8f954eba",
  decision:            "run_now",
  proofHash:           "sha256:a7f3d9...",
  qualityTier:         "HIGH",
  signalConfidence:    0.88,
  fallbackUsed:        false,
  carbonIntensity:     112,        // gCO₂/kWh
  selectedRegion:      "us-west-2",
  leaseExpiresAt:      "2026-04-02T08:21:00Z",  // +4h (HIGH tier)
  estimatedFlag:       false,
  syntheticFlag:       false,
  provider_disagreement: { flag: false, pct: 3.1 }
}
Performance

Latency Architecture

p95 Total
77ms
measured — 250 samples
p95 Compute
59ms
measured — 250 samples
p99 SLA
≤200ms
cross-region contract

Hot path budget: 100ms internal quality gate. Budget allocation: 40ms signal resolution (cache-only) · 20ms scoring · 10ms governance · 10ms serialization · 20ms buffer. Provider calls never occur on the hot path — all external data flows through background workers → Redis cache → hot path.

Read Latency ADR-001 →
Documentation

Reference Materials

Design Targets — Not Yet Validated in Production
Accuracy targets are architectural design goals: ≤12% carbon forecast variance · ≥85% clean window detection · ≤10% confidence calibration error · ≥95% provider disagreement detection. Measured latency (77ms p95, 59ms p95 compute, 250 samples) is verified. Accuracy figures require sustained production volume to validate. See the Production Audit for current status.