Sovereign Stack — Final Scoring, Ranking, Analysis

Final, audited scoring and ranking of the specified tools under a combined lens: Bitcoin-maximalist rails, FOSS/self-host sovereignty, privacy posture, and anti–Synthetic Stack constraints.

Composite score: weighted (A–F) and normalized to 0–100 Every tool name in the table and text is linked inline Language: neutral / non-addressed

1) Final Criteria & Weights

Scores are assigned on six axes (A–F), each 0–100. Higher scores represent stronger alignment with sats-native sovereignty, FOSS/offline control, reduced Synthetic Stack entanglement, and modular composability.

A — Bitcoin / Sats Alignment
25%

100 = sats/Lightning/Cashu only, no altcoin core, no fiat/KYC baked in.
~80 = money-agnostic primitive with no contamination pressure.
<50 = altchain/tokenized core, fiat rails, or obvious capture dynamics.

B — FOSS Purity & Offline Sovereignty
25%

100 = MIT/Apache/BSD/GPL/AGPL, fully self-hostable, offline capable.
70–85 = source-available or FOSS but with practical/cloud friction.
<70 = SaaS core, platform lock, or license games.

C — Synthetic Entanglement & Attack Surface
20%

Higher is safer (less entangled).
100 = tiny/local, no telemetry, no obligatory cloud identity.
70–85 = can run sovereign, but defaults lean toward cloud integration.
<70 = telemetry by design, AWS-only dependence, large monolith/agent mesh.

D — Sovereign Stack Leverage
15%

100 = civilization-level primitive (sats-as-HTTP kernel, local inference backbone).
70–90 = strong infra (vector DB, quantization, routing, parsing).
<70 = marginal utility; not structural.

E — Composability & Minimalism
10%

100 = small, focused module/library, clean interfaces.
70–85 = moderate-sized service; understandable and swappable.
<70 = heavy platform; complex lifecycle; hard to reason about.

F — Maturity & Stability
5%

100 = long-running, widely used, stable.
70–90 = active, solid, evolving quickly.
<70 = experimental or unclear maintenance.

Composite Formula

Composite = 0.25·A + 0.25·B + 0.20·C + 0.15·D + 0.10·E + 0.05·F

2) Final Ranked Table

“LightningProx stack” = lightningprox-mcp + lightningprox-agent-example. “Maple Proxy (Maple/Maple AI)” is linked to maple-proxy and the Maple/OpenSecret ecosystem.

Rank Tool Comp. A B C D E F
1 ngx_l402 sats membrane 94.01009590959080
2 L402 spec protocol primitive 93.21009090989080
3 llama.cpp local inference 92.08010095959095
4 Aperture L402 reverse proxy 91.61009088958085
5 whisper.cpp local ASR 90.88010095928590
6 lightning-agent-tools agent commerce 90.01009085928075
7 Piper local TTS 88.5809595888580
8 GROBID PDF→structure 88.2809595887595
9 Vosk offline ASR 87.8809595858085
10 Routstr sats bridge 87.1959078908075
11 PPQ (OpenPPL/ppq) quantization 87.0809590888080
12 LightningProx stack closed-model bridge 86.21008870908075
13 InvokeAI local image 85.8809588857585
14 Qdrant vector DB 84.5809085858085
15 Chroma vector DB 83.0809080838080
16 Weaviate vector DB 82.3809078837585
17 Langfuse telemetry tool 79.5759065888080
18 LobeChat UI shell 79.2758570888080
19 Open WebUI UI shell 78.8758070908090
20 Maple Proxy (Maple/Maple AI) TEE bridge 77.2807570887575
21 OpenClaw high-risk agent 77.2759055887585
22 OpenSecret platform AWS-TEE anchored 73.0807060857075
23 Clawstr alt-token gravity 62.0308550807575

3) Layered Interpretive Analysis

3.1 Absolute Canon: sats-as-HTTP membrane + local cognition engines

The top cluster defines two spine primitives: L402 as a sats-denominated authentication/metering protocol and local inference engines such as llama.cpp and whisper.cpp as sovereign compute.

3.2 Local perception & model tooling (speech in/out, documents, quantization, images)

The next layer supplies sensory IO and model portability: text-to-speech via Piper (development notes mention migration), offline speech recognition via Vosk, document parsing via GROBID, quantization via PPQ, and local image generation via InvokeAI.

3.3 Sats-native routing and paid access to external model surfaces

Routstr and the LightningProx stack are ranked as powerful bridges: sats are used for access control and payment, but the value path often targets external providers (closed or otherwise).

3.4 Semantic state: vector databases as memory substrate

Qdrant, Chroma, and Weaviate supply retrieval and state for RAG and long-lived agent memory. These are not sats-native by themselves; they are neutral infrastructure.

3.5 UI shells, orchestration surfaces, and telemetry

Open WebUI, LobeChat, and Langfuse are control-plane instruments rather than primitives. They are powerful—but they are also common re-entry points for cloud identity, plugin sprawl, and trace/metric capture patterns.

3.6 Confidential compute bridges: OpenSecret / Maple Proxy

Maple Proxy and the OpenSecret platform implement a privacy-hardening path using TEEs. This improves confidentiality of prompts/data relative to conventional hosted inference, but remains anchored to cloud enclave infrastructure and its jurisdictional gravity.

3.7 Agent framework & social layer: OpenClaw and Clawstr

OpenClaw remains extremely capable and highly entangling: deep integration with messaging channels, tool execution, and third-party “skills” expands the attack surface. Recent reporting highlights ecosystem security risks from malicious skills and deployment configuration drift; see The Verge, Reuters, and related coverage such as Tom’s Hardware.

Clawstr is a Nostr-based agent social layer with a strongly tokenized gravity. Its ranking is driven primarily by the low A-score: an alt-token market center of mass (Base chain token listings and contracts are publicly visible on BaseScan, and exchange announcements such as MEXC publish the Base contract address).

4) Canonical Stack Reading (by layer)

The following read groups the ranked items into an operational stack view. It describes roles and boundaries, not “recommendations”.

Kernel
Local cognition + sats membrane
Perception & Model Portability
speech, docs, quantization, images
State / Memory
vector retrieval substrate
Bridges
paid access to external surfaces
Shells & Control Plane
UI + telemetry
Red-Bordered / High-Risk
attack surface and drift vectors

5) Tool Directory (Inline Links)

Each entry consolidates primary links inline (repo/docs/site). This section is intentionally embedded in-page instead of being placed in a detached appendix.

ngx_l402
L402 spec
Aperture
lightning-agent-tools
llama.cpp
whisper.cpp
Piper
Vosk
GROBID
PPQ (OpenPPL/ppq)
InvokeAI
Qdrant
Chroma
Weaviate
Routstr
LightningProx stack
Open WebUI
LobeChat
Langfuse
Maple Proxy / Maple AI / OpenSecret
OpenClaw
Clawstr