Skip to content

lowestprime/KenMatch

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

140 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


KenMatch Brand Emblem

KenMatch
GitHub repository: lowestprime/KenMatch   Live website: kmat.ch   KenMatch DeepWiki

KenMatch is a public board for proposing, ranking, funding, launching, and auditing long-running AI work. Each unit of work is called a Ken. A Ken can be a scientific mechanism atlas, reproducibility scout, evaluation harness, open developer tool, engineering tradeoff explorer, or other bounded deliverable that benefits from sustained compute, checkpoints, public feedback, and visible funding.

🎯 Mission and Background

KenMatch is built around a simple idea: everyone should have a public, legible opportunity to decide which long-horizon Kens receive time, review, and funding, without relying on wealth as the allocator.

As frontier models evolve from short, single-turn assistants into long-context, tool-using systems, the “few queries” standard is becoming less representative of the work people want to run. The opportunity to participate in long-horizon AI effort for research, software, evaluation, engineering, and public-benefit outputs can still be constrained by capital and access. KenMatch makes that allocation problem visible: public signal, scarce voice, funding context, checkpoint gates, and audit records are separated so a useful Ken can earn priority without pretending the demo is live provider execution.

💡 Concept

🔍 Kens

A Ken is a proposed unit of long-running AI work. The public board shows its goal, evidence, risks, requested lane, funding path, current review state, launch timing, and audit trail.

🌎 Public Participation

KenMatch separates fast public signal from scarce allocation voice:

  • Public vote: simple upvote or downvote support.
  • Voice allocation: quadratic credits assigned by signed-in contributors.
  • Comments: threaded, voted, timestamped discussion with visible stake.
  • Attestation policy: new or partially reviewed accounts can participate with review-aware limits until stronger verification lands.

🚀 Launch and Review

Kens can stay public before launch. Launch requires visible release conditions:

  • Safety status
  • Checkpoint gates
  • Reproducibility notes
  • Rollback plan
  • Run updates and evidence logs

🏦 Funding

KenMatch keeps funding legible without turning rank into a purchasable advantage:

  • Sponsor pools tied to specific Kens.
  • Reusable service revenue routed into the treasury.
  • Committed and projected support shown separately.
  • Founder and operations split reported separately from public compute support.

🔀 Coordination

KenMatch centralizes the proposal, refinement, and prioritization of long-horizon tasks, including, but not limited to:

  1. Deep scientific and technical research that benefits from iterative investigation and synthesis.
  2. Complex software development and maintenance.
  3. Evaluation, reproducibility, safety, and benchmark infrastructure.
  4. Other high-leverage work whose results can be validated, reused, and compounded.

The platform is designed for tasks that are naturally multi-stage, requiring:

  • Planning
  • Intermediate checkpoints
  • Continuous evaluation
  • State-preserving resumability

🪙 Proof-of-value Allocation Credits

KenMatch’s allocation credits are not a pay-to-win instrument. In KenMatch’s intended design, allocation rights are earned through contribution and curation.

Users earn “proof-of-value” credits by doing work the community can audit and validate, such as:

  1. Proposing tasks that generate high-quality, verifiable outputs.
  2. Improving existing tasks (clarifying requirements, adding constraints, testing plans).
  3. Accurately curating (supporting proposals that later prove to be genuinely valuable).
  4. Contributing measurable infrastructure support (e.g., verified computation or evaluation labor) under clear rules.

The governance literature on token platforms emphasizes that token issuance can align incentives under some conditions, but token voting also introduces capture risks and demands careful mechanism design. KenMatch therefore treats tokens as allocation credentials, not a speculative asset class. (13)(14)

🗳️ Safeguarded Democratic Ranking

KenMatch’s “value” cannot be a single number. It must be the result of a process that is:

  1. inclusive (broad participation),

  2. sybil-resistant (identity and duplication attacks are managed),

  3. auditable (why a task won is legible),

  4. and safe (high-severity dual-use is screened).

A defensible default for expressing intensity of preference is quadratic voting, where the cost of concentrating votes rises quadratically. This voting rule is motivated in the mechanism design literature and is widely discussed as a way to incorporate preference intensity rather than only headcount, while still requiring serious attention to secure implementation and fraud resistance. (15)(16)

KenMatch pairs broad voting with a constrained “safety and validity” layer that can block tasks that plausibly create severe harm or cannot be evaluated responsibly. This is aligned with mainstream AI risk management guidance (governance, measurement, monitoring, and mitigation), instead of a blind trust approach. (24)(25)(26)(27)

🧮 Allocation Protocol

KenMatch organizes long-horizon computational tasks into explicit duration tiers, because the duration of frontier LLM’s sustained computational effort is a finite resource, while the management of energy use and facilities pose additional constraints.

KenMatch’s baseline tiering is:

  1. Months: top 3 Kens per category

  2. Weeks: top 10 Kens per category

  3. Days: top 100 Kens per category

Modern accelerator systems are power-dense (e.g., DGX-class systems are in the tens of kilowatts), and at national and global scale data center electricity demand is now a material planning variable. Long-horizon allocations must therefore be explicit about duration, checkpointing, and rollback, as well as about evaluation and stopping conditions. (6)(7)(10)

📚 Execution Layer Neutrality

KenMatch is execution-layer neutral by design: it can route long-horizon computation to (1) enterprise APIs, (2) dedicated clusters, and/or (3) decentralized computation networks with verifiable work.

Decentralized computation is an active design space with concrete architectures:

  1. decentralized marketplaces for leasing computation capacity and managing deployments, bids, and leases, (20)(21)(23)(22)

  2. protocols for running ML computation across heterogeneous devices with trustless verification, (22)

  3. and peer-to-peer “intelligence markets” that reward contributors based on ledgered value signals. (23)

KenMatch contends that the collective deserves a legitimate mechanism to determine which ideas and problems will benefit from the long-horizon effort of advanced API-accessible models, without defaulting to wealth as the allocator.

🤝 Stewardship, Legitimacy, and Public Benefit

KenMatch treats legitimacy as a product requirement.

A credible democratic computation platform must:

  1. publish clear rules for what can and cannot be run,

  2. maintain transparent logs of decisions and allocations,

  3. implement rigorous evaluation and rollback practices for long-horizon agents,

  4. and align incentives so that the platform produces durable public value (e.g., tools, research artifacts, verified analyses) rather than attention-grabbing but unverifiable outputs.

This stance reflects widely adopted principles for AI alignment, including risk management, accountability, transparency, and respect for human rights and democratic values. (24)(25)(26)(27)

🌌 Vision

KenMatch is a public queue for work that benefits from sustained frontier-compute runs, visible checkpoints, and human review. A Ken can be a scientific evidence map, a reproducibility scout, a defensive software regression reproducer, a benchmark harness, an engineering tradeoff explorer, an educational simulation tool, or another bounded project where one quick prompt is not enough.

The allocation problem is practical: compute, review time, and operational attention are scarce, while useful ideas often come from people or groups that cannot simply buy long-running access. KenMatch separates funding from rank. Public pulse votes make interest visible, allocation credits make scarce prioritization harder to concentrate, and checkpoints keep releases auditable before more runtime is spent.

✨ Features

  • Public proposal feed with search, categories, stage/tier filters, and realistic community-facing examples.
  • Linked contributor profiles plus real account creation, email verification, password reset, and cookie-backed sessions.
  • Earned quadratic voice for scarce allocation, with separate up/down pulse voting for broad public curation.
  • Threaded comments with replies, voting, and small stakes for discussion quality.
  • Proposal quality bonds, checkpoint approval gates, run metadata, rollback plans, and visible blocked work.
  • Economics surface for supported service packaging, screened evaluation licensing, compute routing, private execution lanes, sponsorship routing, treasury entries, and the 80/20 public reporting split.
  • Structured sponsor commitments with projected, simulated, and committed funding states plus optional Stripe Checkout for live sponsor intake.
  • Sandbox-backed demo Kens with clearly disclosed simulated capital, demo workflow labels, API-spend estimates, pilot-user counts, and sample outcomes shown directly in the UI.
  • Deterministic Ken/category/status visuals plus optional admin-managed Ken illustrations stored in the persisted data volume. Uploaded illustrations are validated server-side; SVG uploads are blocked.
  • Owner-controlled maintenance mode, public changelog, admin SMTP configuration/status, visitor summaries, and filtered audit log views.
  • Two theme modes (Light and true-black OLED), rich motion, compact responsive navigation, strong visual hierarchy, and preview-safe KenMatch favicon/social-image assets.
  • Public board at /kens with search, category, lane, and status filters.
  • Real account creation and persistent signed-in accounts.
  • libSQL-backed persistence with local-file or remote libSQL support.
  • Public upvote/downvote signal, separate quadratic voice allocation, and threaded comments with voting.
  • Forgot-password, email-verification, owner/admin notification, profile editing, profile-picture customization, About/Contact editing, visitor telemetry, and audit logging.
  • Universal sitewide search, mobile navigation drawer, bookmark/share affordances, and linked public profile surfaces.
  • Ken timing metadata: created and updated timestamps, launch countdown, submission age, compute usage, remaining runtime window, and completion state.
  • Incremental run audit history for partial delivery, early completion, and checkpoint-by-checkpoint evidence notes.
  • Economics and treasury views with committed versus projected support, sponsor pools, restricted funding, simulated runway, safety reserve coverage, and sponsor covenant details.
  • Governance view with blocked Kens, attestation state, enforceable participation limits, review timing, and visible decision logs.
  • Security headers, host filtering, request-origin checks, structured rate limits, optional Turnstile verification, and public-safe health checks.
  • Standalone Next.js Docker build, non-root container runtime, loopback-only Synology deployment, and public-hosting guidance for Cloudflare Tunnel or equivalent origin shielding.

🏗️ Stack

💻 Local Development

npm install
npm run dev

Open http://localhost:3000.

🔡 Environment

Copy .env.example and set values as needed.

  • DATABASE_URL: leave empty for the local file database, or point it at remote libSQL.
  • DATABASE_AUTH_TOKEN: auth token for remote libSQL.
  • KENMATCH_DB_FILE: local fallback database path.
  • KENMATCH_SESSION_COOKIE: cookie name for the signed-in account cookie.
  • KENMATCH_SESSION_DAYS: sign-in lifetime in days.
  • KENMATCH_ALLOW_SIGNUPS: set to false to disable public account creation.
  • KENMATCH_REQUIRE_EMAIL_VERIFICATION: when true, signups must confirm the emailed verification link before participating.
  • KENMATCH_PUBLIC_ORIGIN: exact public HTTPS origin for redirects, Stripe success URLs, and host validation.
  • KENMATCH_ALLOWED_HOSTS: comma-separated list of allowed public hostnames.
  • KENMATCH_OWNER_EMAIL: owner account email that receives owner-only permissions.
  • KENMATCH_ADMIN_EMAILS: comma-separated admin account emails.
  • KENMATCH_NOTIFICATION_EMAILS: comma-separated alert recipients for signup, visitor, verification, and Ken events.
  • KENMATCH_SMTP_HOST / KENMATCH_SMTP_PORT / KENMATCH_SMTP_USER / KENMATCH_SMTP_PASS / KENMATCH_SMTP_SECURE / KENMATCH_SMTP_FROM: SMTP settings for verification, reset, and admin notification email dispatch.
  • KENMATCH_CONFIG_ENCRYPTION_KEY: stable server-side encryption key required before owner-managed SMTP passwords can be stored from /admin. Environment SMTP values always take priority.
  • KENMATCH_MAINTENANCE_MODE / KENMATCH_MAINTENANCE_MESSAGE / KENMATCH_MAINTENANCE_EXPECTED_RETURN: emergency maintenance override. Admins can also control database-backed maintenance mode from /admin.
  • KENMATCH_VISITOR_HASH_SALT: server-only salt for unique visitor deduplication.
  • KENMATCH_HEALTH_TOKEN: token for detailed health responses.
  • KENMATCH_TREASURY_TARGET_MONTHS: reserve target used by the economics view.
  • NEXT_PUBLIC_TURNSTILE_SITE_KEY / KENMATCH_TURNSTILE_SECRET_KEY: optional Cloudflare Turnstile keys for public forms.
  • STRIPE_SECRET_KEY / STRIPE_WEBHOOK_SECRET: optional Stripe Checkout and webhook settings for live sponsorships.
  • DEPLOYMENT_VERSION: optional deployment identifier passed into Next.js.

📃 Scripts

npm run dev
npm run typecheck
npm run lint
npm run test
npm run build

🚀 Deployment

KenMatch ships with a standalone Next.js build configuration and a Docker image intended for self-hosting.

  • next.config.ts sets output: "standalone".
  • npm run build runs Next's compile build mode followed by generate-env mode, then verifies that every app-route chunk referenced by the standalone server exists under .next/static before Docker copies the artifact.
  • npm run start copies .next/static and public assets into .next/standalone before starting the standalone server so local and container previews use the same icon and CSS paths.
  • Dockerfile runs the generated standalone server as a non-root user.
  • docker-compose.synology.yml mounts persistent local data, keeps the container read-only except for /app/data, and binds the app to 127.0.0.1:3000.
  • docker-compose.synology.tunnel.yml adds a cloudflared sidecar for a direct Cloudflare Tunnel deployment from Synology.
  • The /api/health health endpoint exposes a public-safe summary and can return detailed diagnostics when KENMATCH_HEALTH_TOKEN is supplied.
  • For local development, KenMatch constructs a file-backed SQLite-compatible database via libSQL.
  • For public deployment, DATABASE_URL and DATABASE_AUTH_TOKEN can be specified for managed remote libSQL database integration.
  • Security headers, host filtering, and mutation-origin checks live in src/proxy.ts, which Next.js 16 reports as the app proxy/middleware boundary during production builds.
  • For public Synology NAS deployment, read docs/synology-nas-deploy.md and docs/public-security-hardening.md before exposing the service.

🛣️ Main Routes

  • / overview and featured Kens
  • /kens public Ken board
  • /kens/[slug] Ken detail, timing, voting, audit, and comments
  • /submit Ken submission
  • /governance governance, attestation, and blocked Kens
  • /economics treasury and revenue logic
  • /auth sign-in and account creation
  • /forgot-password, /reset, /verify email-backed account recovery and verification
  • /account profile, avatar, links, verification request, and bookmarks
  • /people/[slug] linked public profile surface for contributors referenced from Kens, comments, and account cards
  • /verification public identity and participation guidance
  • /about owner-editable About / Contact page
  • /about/changelog public changelog
  • /admin owner/admin/moderator operations portal

Legacy /tasks routes now redirect to /kens routes.

🗺️ Repository Map

  • src/app routes, layout, health endpoint, and server actions
  • src/components public UI, timing display, voting, comments, sponsor intake, auth, and shell
  • src/lib/attestation.ts participation policy derived from attestation state
  • src/lib/db.ts database schema, seeding, hydration, account persistence, funding ledger, rate limits, and write flows
  • src/lib/illustrations.ts upload validation for admin-managed Ken illustrations
  • src/lib/security.ts form hardening, origin checks, rate-limit integration, and Turnstile verification
  • src/lib/stripe.ts optional hosted sponsor checkout wiring
  • src/lib/seed.ts and src/lib/seed-plus.ts realistic demo data
  • docs/architecture.md implementation structure
  • docs/requirements-traceability.md conception-to-code mapping
  • docs/synology-nas-deploy.md Synology NAS deployment guide
  • docs/public-security-hardening.md public-hosting security checklist
  • cloudflared/config.yml.example Cloudflare Tunnel example configuration for NAS deployments

📝 Notes

  • The default local deployment uses a file-backed libSQL database. For public internet deployment, use a managed remote libSQL instance when possible.
  • The included Synology compose file is intentionally loopback-only. Put Cloudflare Tunnel or another reverse proxy in front of it instead of exposing the container directly.
  • The deployment artifact in this repository is currently produced through Next.js experimental compile/generate-env build modes because this project has been validated around that standalone output path.

🧠 Conceptualization

KenMatch_Conception.md

📑 References

  1. Data center energy demand and projections: U.S. Department of Energy summary of LBNL report (U.S. share, 176 TWh, 2028 projections). (6)(7)(8)
  2. Global data center electricity demand: International Energy Agency Energy and AI report pages (415 TWh in 2024; 945 TWh by 2030; sensitivity cases). (7)(8)
  3. Hardware power density: NVIDIA specs for H100 TDP and DGX B200 system power usage. (9)(10)
  4. Frontier-model capabilities and access gating: public provider documentation for API-accessible reasoning, long-context, coding, and multimodal systems. KenMatch examples use durable sandbox workflow labels only and do not claim live provider execution. (1)(2)(3)(4)
  5. Governance mechanisms: Quadratic voting paper summary; secure QV implementation concerns. (15)(16)
  6. Token governance and DAO voting risks: Philadelphia Fed token governance research; DAO voting mechanism centralization risks. (13)(14)
  7. Risk and stewardship frameworks: NIST AI RMF and GenAI profile; OECD AI principles; DeepMind Frontier Safety Framework. (24)(25)(26)(27)
  8. Decentralized compute / verification primitives: Akash deployment marketplace docs; Gensyn protocol overview; Bittensor whitepaper. (20)(21)(23)(22)

About

Democratizing access to long-horizon frontier AI. Crowdsourced allocation of enterprise-grade compute toward joint resolution of humanity's greatest perplexities and the equitable construction of value.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages