Skip to content

chboishabba/SensibLaw

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1,132 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SensibLaw

SensibLaw is the suite's deterministic review and provenance layer.

In plain language, it takes difficult source material and turns it into structured, inspectable outputs instead of opaque summaries. It is used for legal/normative review, structured evidence handling, and bounded ontology diagnostics such as the current Wikidata work.

What SensibLaw Does

SensibLaw currently provides:

  • ingestion of source material into structured, anchored artifacts
  • deterministic review/report surfaces instead of free-form narrative output
  • provenance-backed JSON artifacts and handoff bundles
  • bounded Wikidata diagnostics over pinned slices
  • export/handoff paths into downstream reasoning and review layers such as Zelph

The important design choice is that SensibLaw is not trying to be "the model that knows the answer." It is trying to preserve source traceability while making reviewable structure.

What You Can Do With It Today

1. Build structured review artifacts from messy source material

SensibLaw can turn source material into:

  • structured slices
  • projections
  • review queues
  • handoff bundles
  • provenance-aware JSON outputs

Why that matters:

  • a later reviewer can inspect what was extracted
  • uncertainty and disagreement can stay visible
  • downstream systems do not need to depend on ad hoc notes

2. Run bounded Wikidata review/diagnostic workflows

This is one of the clearest current external examples of SensibLaw doing something real.

Current repo-backed examples include:

  • a clean baseline around nucleon / proton / neutron, where the disjointness relation is present but there are no violations
  • a real contradiction around working fluid, where working fluid is typed as both gas and liquid
  • a real contradiction in the fixed construction / geographic entity area, where the current pinned slice shows several subclass violations
  • a synthetic transport example used to keep the reporting deterministic, with amphibious/land/water subclass and instance violations

What those examples imply:

  • the lane can preserve a genuine zero-violation baseline
  • it can catch direct instance-level contradictions
  • it can also catch longer structural subclass problems
  • it can present those findings in reviewer-facing summaries rather than only raw graph output

3. Produce checked handoff artifacts

SensibLaw already has bounded, checked handoff outputs for multiple lanes.

That matters because the outputs are:

  • stable enough to discuss with collaborators
  • backed by repo artifacts and tests
  • explicit about what is demonstrated and what is not yet being claimed

Proven Abilities

These are the strongest current categories to point at.

Bounded Wikidata structural review

SensibLaw can already:

  • turn live or imported Wikidata slices into deterministic reports
  • preserve zero-violation baselines
  • surface direct contradictions
  • surface subclass contradiction chains
  • package those outputs into checked summaries and fixture-backed artifacts

Start here:

Checked Zelph handoff paths

SensibLaw can already export small checked bundles for downstream reasoning without pretending the entire corpus is complete.

Start here:

Deterministic review over provenance-backed artifacts

The broader point of SensibLaw is not just that it stores data. It provides a bounded route from messy input to reviewed structure while keeping the source trail visible.

Quick Start

SensibLaw is usually worked on inside the top-level ITIR-suite workspace.

From the repo root:

./env_init.sh
cd SensibLaw
../.venv/bin/pip install -e .[dev,test]

Useful first commands:

../.venv/bin/python -m sensiblaw.cli --help
../.venv/bin/python -m pytest -q tests/test_wikidata_disjointness.py
../.venv/bin/python -m pytest -q tests/test_wikidata_structural_handoff.py

If you want the Streamlit surface:

../.venv/bin/streamlit run streamlit_app.py

Note:

  • the test suite expects the superproject venv (../.venv)
  • many docs and fixtures assume the full ITIR-suite workspace is present

Common Workflows

Wikidata diagnostics

Current operational entry points include:

../.venv/bin/python -m cli.__main__ wikidata build-slice
../.venv/bin/python -m cli.__main__ wikidata project
../.venv/bin/python -m cli.__main__ wikidata find-qualifier-drift
../.venv/bin/python scripts/run_wikidata_qualifier_drift_scan.py

Use this lane when you want bounded, pinned review artifacts rather than generic ontology cleanup claims.

CLI-first exploration

If you want to see what the current CLI exposes:

../.venv/bin/python -m sensiblaw.cli --help
../.venv/bin/python -m cli.__main__ --help

Checked artifact review

If you want the fastest route to current examples, read the checked summaries and fixture artifacts first, then drill down into the raw JSON/tests only if needed.

Where To Find Things

Start here

Wikidata lane

Ingestion and review docs

Onboarding and ontology docs

What SensibLaw Is Not

SensibLaw is not:

  • a generic chatbot
  • a free-form legal-answer engine
  • a silent auto-correction bot for Wikidata
  • a substitute for human review

Its job is to make bounded structure and provenance easier to inspect, test, and hand off.

About

Like coleslaw, it just makes sense.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors