id
stringlengths
12
12
task_type
stringclasses
24 values
difficulty
stringclasses
3 values
primary_language
stringclasses
11 values
prompt
stringlengths
500
779
response
stringlengths
1.49k
1.93k
metadata
dict
omega_000001
mechanized_spec
expert
lean
Task type: mechanized_spec Scenario: time-series metrics store Domain focus: compiler toolchains Primary language: lean Difficulty: expert Scale/SLO: p99 < 50ms Component: component_vouxqmpd Constraints: include failure modes and recovery, assume adversarial inputs; validate everything, avoid data races and undefined behavior, include backward compatibility and migration plan, include test vectors and fuzz strategy, include security threat model (defensive only), include verification strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000002
mechanized_spec
expert
lean
Task type: mechanized_spec Scenario: rate limit gateway Domain focus: runtime systems Primary language: lean Difficulty: expert Scale/SLO: 99.99% availability Component: component_frdiozsr Constraints: assume adversarial inputs; validate everything, explicit contracts and invariants, include failure modes and recovery, avoid data races and undefined behavior, include deterministic replay plan Assume schema changes every sprint; must be backward compatible. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000003
mechanized_spec
expert+
lean
Task type: mechanized_spec Scenario: real-time notification hub Domain focus: data lineage & governance Primary language: lean Difficulty: expert+ Scale/SLO: p99 < 50ms Component: component_pcdkegbf Constraints: avoid data races and undefined behavior, include performance model and limits, include test vectors and fuzz strategy, include backward compatibility and migration plan, include failure modes and recovery, include security threat model (defensive only), include verification strategy Assume crash-only processes; recovery must be deterministic. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000004
mechanized_spec
expert+
lean
Task type: mechanized_spec Scenario: multi-tenant event ingestion Domain focus: constraint solving Primary language: lean Difficulty: expert+ Scale/SLO: 50 TB/day ingestion Component: component_dgzxvxke Constraints: explicit contracts and invariants, include failure modes and recovery, include performance model and limits, include backward compatibility and migration plan, include deterministic replay plan, avoid data races and undefined behavior Assume hostile inputs and targeted abuse patterns. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000005
mechanized_spec
expert+
lean
Task type: mechanized_spec Scenario: multi-tenant event ingestion Domain focus: high-frequency trading systems (safe engineering) Primary language: lean Difficulty: expert+ Scale/SLO: 100k RPS peak Component: component_hjldkbhm Constraints: avoid data races and undefined behavior, include security threat model (defensive only), explicit contracts and invariants, assume adversarial inputs; validate everything, include backward compatibility and migration plan Assume tight memory budget and cold-start constraints. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000006
tla_state_machine
expert+
tla+
Task type: tla_state_machine Scenario: multi-tenant event ingestion Domain focus: runtime systems Primary language: tla+ Difficulty: expert+ Scale/SLO: 50 TB/day ingestion Component: component_ggtbnahf Constraints: assume adversarial inputs; validate everything, explicit contracts and invariants, include test vectors and fuzz strategy, avoid data races and undefined behavior, include verification strategy, include deterministic replay plan Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000007
tla_state_machine
expert
tla+
Task type: tla_state_machine Scenario: document indexing pipeline Domain focus: formal verification Primary language: tla+ Difficulty: expert Scale/SLO: 10k RPS peak Component: component_lvggtrbg Constraints: include failure modes and recovery, include performance model and limits, avoid data races and undefined behavior, include security threat model (defensive only), include verification strategy, include test vectors and fuzz strategy, include backward compatibility and migration plan Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000008
tla_state_machine
expert
tla+
Task type: tla_state_machine Scenario: identity and access Domain focus: program synthesis (safe) Primary language: tla+ Difficulty: expert Scale/SLO: 1M msgs/min Component: component_rbwquxuy Constraints: include performance model and limits, include test vectors and fuzz strategy, assume adversarial inputs; validate everything, include verification strategy, explicit contracts and invariants, avoid data races and undefined behavior, include failure modes and recovery Assume crash-only processes; recovery must be deterministic. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000009
tla_state_machine
hard
tla+
Task type: tla_state_machine Scenario: rate limit gateway Domain focus: distributed storage Primary language: tla+ Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_mesobenv Constraints: include deterministic replay plan, include performance model and limits, include backward compatibility and migration plan, avoid data races and undefined behavior, include test vectors and fuzz strategy, assume adversarial inputs; validate everything Assume crash-only processes; recovery must be deterministic. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000010
tla_state_machine
hard
tla+
Task type: tla_state_machine Scenario: graph query service Domain focus: data lineage & governance Primary language: tla+ Difficulty: hard Scale/SLO: p99 < 50ms Component: component_ipxhbaoi Constraints: include performance model and limits, include security threat model (defensive only), avoid data races and undefined behavior, include test vectors and fuzz strategy, include verification strategy, assume adversarial inputs; validate everything Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000011
tla_state_machine
expert+
tla+
Task type: tla_state_machine Scenario: rate limit gateway Domain focus: secure enclaves (defensive) Primary language: tla+ Difficulty: expert+ Scale/SLO: 50 TB/day ingestion Component: component_qbqjiobn Constraints: include deterministic replay plan, include verification strategy, assume adversarial inputs; validate everything, include security threat model (defensive only), include failure modes and recovery, include test vectors and fuzz strategy, avoid data races and undefined behavior Assume crash-only processes; recovery must be deterministic. Deliverable: Provide a TLA+-style state machine (pseudo), safety/liveness properties, and a model-checking strategy. Include an implementation sketch and test vectors.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```tla VARIABLES state, log, seen Init == state = [k \in Keys |-> <<0, NULL>>] /\ log = << >> /\ seen = [r \in ReqIds |-> NULL] Put(req, k, v) == IF seen[req] # NULL THEN UNCHANGED <<state, log, seen>> ELSE LET ver == state[k][1] + 1 IN /\ state' = [state EXCEPT ![k] = <<ver, v>>] /\ log' = Append(log, <<req, k, v, ver>>) /\ seen' = [seen EXCEPT ![req] = <<"ok", ver>>] Safety == \A k \in Keys: state[k][1] >= 0 ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "tla+", "model-checking", "state-machines" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000012
smt_constraint_model
hard
smtlib
Task type: smt_constraint_model Scenario: document indexing pipeline Domain focus: edge robotics (safe) Primary language: smtlib Difficulty: hard Scale/SLO: p99 < 150ms Component: component_bfhoxekx Constraints: avoid data races and undefined behavior, include backward compatibility and migration plan, explicit contracts and invariants, include test vectors and fuzz strategy, include security threat model (defensive only) Assume crash-only processes; recovery must be deterministic. Deliverable: Provide an SMT constraint model (or Python-to-SMT) for correctness/optimization; include sample instances and how to validate solutions.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```smtlib ; Find an assignment minimizing cost while satisfying constraints (declare-const x Int) (declare-const y Int) (assert (and (>= x 0) (>= y 0) (<= (+ x y) 10))) (minimize (+ (* 3 x) (* 2 y))) (check-sat) (get-model) ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "smtlib", "constraints", "smt" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000013
smt_constraint_model
hard
smtlib
Task type: smt_constraint_model Scenario: feature-flag evaluation Domain focus: network protocols Primary language: smtlib Difficulty: hard Scale/SLO: 1M msgs/min Component: component_vtmvtpqy Constraints: assume adversarial inputs; validate everything, include performance model and limits, include failure modes and recovery, avoid data races and undefined behavior, include deterministic replay plan, include verification strategy, include security threat model (defensive only) Assume crash-only processes; recovery must be deterministic. Deliverable: Provide an SMT constraint model (or Python-to-SMT) for correctness/optimization; include sample instances and how to validate solutions.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```smtlib ; Find an assignment minimizing cost while satisfying constraints (declare-const x Int) (declare-const y Int) (assert (and (>= x 0) (>= y 0) (<= (+ x y) 10))) (minimize (+ (* 3 x) (* 2 y))) (check-sat) (get-model) ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "smtlib", "constraints", "smt" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000014
smt_constraint_model
expert
python
Task type: smt_constraint_model Scenario: edge sync Domain focus: program synthesis (safe) Primary language: python Difficulty: expert Scale/SLO: 99.99% availability Component: component_ykyvyyle Constraints: avoid data races and undefined behavior, include backward compatibility and migration plan, explicit contracts and invariants, assume adversarial inputs; validate everything, include test vectors and fuzz strategy, include security threat model (defensive only), include verification strategy Assume tight memory budget and cold-start constraints. Deliverable: Provide an SMT constraint model (or Python-to-SMT) for correctness/optimization; include sample instances and how to validate solutions.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```smtlib ; Find an assignment minimizing cost while satisfying constraints (declare-const x Int) (declare-const y Int) (assert (and (>= x 0) (>= y 0) (<= (+ x y) 10))) (minimize (+ (* 3 x) (* 2 y))) (check-sat) (get-model) ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "constraints", "smt" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000015
smt_constraint_model
expert
python
Task type: smt_constraint_model Scenario: payment ledger Domain focus: network protocols Primary language: python Difficulty: expert Scale/SLO: 10k RPS peak Component: component_epblhesv Constraints: explicit contracts and invariants, include failure modes and recovery, assume adversarial inputs; validate everything, include backward compatibility and migration plan, include security threat model (defensive only), include deterministic replay plan, include performance model and limits Assume tight memory budget and cold-start constraints. Deliverable: Provide an SMT constraint model (or Python-to-SMT) for correctness/optimization; include sample instances and how to validate solutions.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```smtlib ; Find an assignment minimizing cost while satisfying constraints (declare-const x Int) (declare-const y Int) (assert (and (>= x 0) (>= y 0) (<= (+ x y) 10))) (minimize (+ (* 3 x) (* 2 y))) (check-sat) (get-model) ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "constraints", "smt" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000016
distributed_algorithm
hard
typescript
Task type: distributed_algorithm Scenario: multi-tenant event ingestion Domain focus: program synthesis (safe) Primary language: typescript Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_gjdkenmg Constraints: include deterministic replay plan, include failure modes and recovery, include verification strategy, avoid data races and undefined behavior, include security threat model (defensive only), assume adversarial inputs; validate everything Assume weekly network partitions. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000017
distributed_algorithm
hard
python
Task type: distributed_algorithm Scenario: feature-flag evaluation Domain focus: formal verification Primary language: python Difficulty: hard Scale/SLO: p99 < 50ms Component: component_bxgtgskb Constraints: include test vectors and fuzz strategy, include security threat model (defensive only), include failure modes and recovery, assume adversarial inputs; validate everything, include performance model and limits Assume strict auditability and replayable history. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000018
distributed_algorithm
expert+
typescript
Task type: distributed_algorithm Scenario: document indexing pipeline Domain focus: edge robotics (safe) Primary language: typescript Difficulty: expert+ Scale/SLO: 100k RPS peak Component: component_lekahwkh Constraints: include deterministic replay plan, include performance model and limits, include failure modes and recovery, explicit contracts and invariants, include security threat model (defensive only), include test vectors and fuzz strategy Assume tight memory budget and cold-start constraints. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000019
distributed_algorithm
expert+
sql
Task type: distributed_algorithm Scenario: document indexing pipeline Domain focus: GPU serving Primary language: sql Difficulty: expert+ Scale/SLO: p99 < 150ms Component: component_unklwuka Constraints: include performance model and limits, include security threat model (defensive only), include verification strategy, assume adversarial inputs; validate everything, include backward compatibility and migration plan Assume strict auditability and replayable history. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000020
distributed_algorithm
expert
typescript
Task type: distributed_algorithm Scenario: identity and access Domain focus: distributed storage Primary language: typescript Difficulty: expert Scale/SLO: 1M msgs/min Component: component_fywerxit Constraints: include test vectors and fuzz strategy, include security threat model (defensive only), explicit contracts and invariants, include backward compatibility and migration plan, assume adversarial inputs; validate everything, include performance model and limits Assume tight memory budget and cold-start constraints. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000021
distributed_algorithm
hard
python
Task type: distributed_algorithm Scenario: document indexing pipeline Domain focus: kernel primitives Primary language: python Difficulty: hard Scale/SLO: 99.99% availability Component: component_lywlxsex Constraints: explicit contracts and invariants, include backward compatibility and migration plan, include verification strategy, include failure modes and recovery, include test vectors and fuzz strategy Assume weekly network partitions. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000022
distributed_algorithm
hard
typescript
Task type: distributed_algorithm Scenario: time-series metrics store Domain focus: secure enclaves (defensive) Primary language: typescript Difficulty: hard Scale/SLO: 10k RPS peak Component: component_znipibzo Constraints: include verification strategy, include security threat model (defensive only), include deterministic replay plan, include failure modes and recovery, explicit contracts and invariants Assume weekly network partitions. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000023
distributed_algorithm
hard
bash
Task type: distributed_algorithm Scenario: streaming ETL Domain focus: kernel primitives Primary language: bash Difficulty: hard Scale/SLO: p99 < 50ms Component: component_jxckwpvu Constraints: include failure modes and recovery, include security threat model (defensive only), include backward compatibility and migration plan, avoid data races and undefined behavior, include performance model and limits Assume partial data corruption; include scrubbing strategy. Deliverable: Design an algorithm with message flows and correctness arguments (safety + liveness). Include failure handling and a minimal reference implementation skeleton.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "distributed", "consensus" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000024
storage_engine
hard
bash
Task type: storage_engine Scenario: edge sync Domain focus: model checking Primary language: bash Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_ywrsqlqt Constraints: include backward compatibility and migration plan, explicit contracts and invariants, include failure modes and recovery, include test vectors and fuzz strategy, include security threat model (defensive only), include deterministic replay plan Assume weekly network partitions. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000025
storage_engine
expert
typescript
Task type: storage_engine Scenario: graph query service Domain focus: fault injection & chaos engineering Primary language: typescript Difficulty: expert Scale/SLO: 10k RPS peak Component: component_wbymgcde Constraints: include test vectors and fuzz strategy, include security threat model (defensive only), include failure modes and recovery, assume adversarial inputs; validate everything, include verification strategy, avoid data races and undefined behavior Assume strict auditability and replayable history. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000026
storage_engine
hard
go
Task type: storage_engine Scenario: job scheduler Domain focus: data lineage & governance Primary language: go Difficulty: hard Scale/SLO: p99 < 50ms Component: component_jvyvrfax Constraints: include performance model and limits, include verification strategy, include test vectors and fuzz strategy, explicit contracts and invariants, include deterministic replay plan, assume adversarial inputs; validate everything, avoid data races and undefined behavior Assume partial data corruption; include scrubbing strategy. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000027
storage_engine
hard
typescript
Task type: storage_engine Scenario: payment ledger Domain focus: runtime systems Primary language: typescript Difficulty: hard Scale/SLO: 99.99% availability Component: component_svprsrig Constraints: assume adversarial inputs; validate everything, avoid data races and undefined behavior, explicit contracts and invariants, include test vectors and fuzz strategy, include verification strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000028
storage_engine
expert+
bash
Task type: storage_engine Scenario: job scheduler Domain focus: GPU serving Primary language: bash Difficulty: expert+ Scale/SLO: p99 < 50ms Component: component_lhjxmlui Constraints: include verification strategy, include failure modes and recovery, explicit contracts and invariants, avoid data races and undefined behavior, include deterministic replay plan, include performance model and limits, include test vectors and fuzz strategy Assume schema changes every sprint; must be backward compatible. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000029
storage_engine
hard
rust
Task type: storage_engine Scenario: edge sync Domain focus: kernel primitives Primary language: rust Difficulty: hard Scale/SLO: multi-region active-active Component: component_vnrwoivg Constraints: avoid data races and undefined behavior, include backward compatibility and migration plan, include test vectors and fuzz strategy, include deterministic replay plan, assume adversarial inputs; validate everything, include verification strategy, include performance model and limits Assume weekly network partitions. Deliverable: Design a storage engine subsystem (WAL, snapshots, compaction). Include crash recovery invariants and a benchmark plan.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "storage", "wal", "lsm" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000030
query_optimizer
expert+
go
Task type: query_optimizer Scenario: graph query service Domain focus: query planning Primary language: go Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_seijvkuz Constraints: include failure modes and recovery, include backward compatibility and migration plan, include deterministic replay plan, explicit contracts and invariants, include verification strategy, assume adversarial inputs; validate everything, include performance model and limits Assume schema changes every sprint; must be backward compatible. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000031
query_optimizer
expert
typescript
Task type: query_optimizer Scenario: real-time notification hub Domain focus: real-time scheduling Primary language: typescript Difficulty: expert Scale/SLO: p99 < 50ms Component: component_zzpfgzvg Constraints: include verification strategy, avoid data races and undefined behavior, include deterministic replay plan, include backward compatibility and migration plan, assume adversarial inputs; validate everything, include performance model and limits, include test vectors and fuzz strategy Assume tight memory budget and cold-start constraints. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000032
query_optimizer
expert+
rust
Task type: query_optimizer Scenario: rate limit gateway Domain focus: observability platforms Primary language: rust Difficulty: expert+ Scale/SLO: multi-region active-active Component: component_tojeuzwt Constraints: include verification strategy, include deterministic replay plan, include failure modes and recovery, assume adversarial inputs; validate everything, include security threat model (defensive only) Assume crash-only processes; recovery must be deterministic. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000033
query_optimizer
hard
typescript
Task type: query_optimizer Scenario: streaming ETL Domain focus: runtime systems Primary language: typescript Difficulty: hard Scale/SLO: p99 < 150ms Component: component_ymyopobv Constraints: explicit contracts and invariants, avoid data races and undefined behavior, include backward compatibility and migration plan, include verification strategy, include deterministic replay plan, include test vectors and fuzz strategy Assume weekly network partitions. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000034
query_optimizer
expert+
sql
Task type: query_optimizer Scenario: identity and access Domain focus: model checking Primary language: sql Difficulty: expert+ Scale/SLO: multi-region active-active Component: component_jercwlrf Constraints: assume adversarial inputs; validate everything, include backward compatibility and migration plan, explicit contracts and invariants, include verification strategy, include failure modes and recovery, include deterministic replay plan Assume tight memory budget and cold-start constraints. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000035
query_optimizer
expert+
go
Task type: query_optimizer Scenario: job scheduler Domain focus: data lineage & governance Primary language: go Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_ffitpcwn Constraints: explicit contracts and invariants, include performance model and limits, include failure modes and recovery, assume adversarial inputs; validate everything, include deterministic replay plan, avoid data races and undefined behavior Assume weekly network partitions. Deliverable: Design a cost-based optimizer slice: logical rules, physical operators, and cost model. Include regression tests and query-plan explain examples.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```python # Minimal cost model skeleton from dataclasses import dataclass @dataclass(frozen=True) class Plan: op: str cost: float children: tuple["Plan", ...] = () def choose_best(plans: list[Plan]) -> Plan: return min(plans, key=lambda p: p.cost) ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "databases", "cost-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000036
compiler_frontend
hard
python
Task type: compiler_frontend Scenario: time-series metrics store Domain focus: stream processing Primary language: python Difficulty: hard Scale/SLO: 10k RPS peak Component: component_kqywwksn Constraints: avoid data races and undefined behavior, assume adversarial inputs; validate everything, include failure modes and recovery, include performance model and limits, explicit contracts and invariants Assume partial data corruption; include scrubbing strategy. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000037
compiler_frontend
expert+
go
Task type: compiler_frontend Scenario: feature-flag evaluation Domain focus: zero-downtime migrations Primary language: go Difficulty: expert+ Scale/SLO: p99 < 50ms Component: component_svqbssim Constraints: include failure modes and recovery, include backward compatibility and migration plan, avoid data races and undefined behavior, include deterministic replay plan, assume adversarial inputs; validate everything, include test vectors and fuzz strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000038
compiler_frontend
expert
go
Task type: compiler_frontend Scenario: graph query service Domain focus: static analysis Primary language: go Difficulty: expert Scale/SLO: 10k RPS peak Component: component_rcvixnxd Constraints: include deterministic replay plan, include backward compatibility and migration plan, include failure modes and recovery, explicit contracts and invariants, include verification strategy Assume schema changes every sprint; must be backward compatible. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000039
compiler_frontend
expert
rust
Task type: compiler_frontend Scenario: document indexing pipeline Domain focus: runtime systems Primary language: rust Difficulty: expert Scale/SLO: 10k RPS peak Component: component_jccbqhlj Constraints: avoid data races and undefined behavior, include failure modes and recovery, include test vectors and fuzz strategy, include verification strategy, include security threat model (defensive only), include deterministic replay plan, include backward compatibility and migration plan Assume weekly network partitions. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000040
compiler_frontend
hard
typescript
Task type: compiler_frontend Scenario: graph query service Domain focus: stream processing Primary language: typescript Difficulty: hard Scale/SLO: p99 < 150ms Component: component_mhcrfobs Constraints: include verification strategy, include backward compatibility and migration plan, include security threat model (defensive only), avoid data races and undefined behavior, assume adversarial inputs; validate everything, explicit contracts and invariants, include test vectors and fuzz strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000041
compiler_frontend
expert
python
Task type: compiler_frontend Scenario: graph query service Domain focus: observability platforms Primary language: python Difficulty: expert Scale/SLO: 1M msgs/min Component: component_ybghvgqu Constraints: include backward compatibility and migration plan, include verification strategy, include failure modes and recovery, avoid data races and undefined behavior, assume adversarial inputs; validate everything, explicit contracts and invariants, include performance model and limits Assume schema changes every sprint; must be backward compatible. Deliverable: Design a DSL language frontend: lexer/parser, AST, type checking, error reporting, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "parsing", "type-systems" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000042
compiler_backend_ir
expert
rust
Task type: compiler_backend_ir Scenario: document indexing pipeline Domain focus: network protocols Primary language: rust Difficulty: expert Scale/SLO: 100k RPS peak Component: component_shwtlhhg Constraints: include failure modes and recovery, explicit contracts and invariants, include test vectors and fuzz strategy, include backward compatibility and migration plan, include performance model and limits, avoid data races and undefined behavior Assume strict auditability and replayable history. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000043
compiler_backend_ir
expert
cpp
Task type: compiler_backend_ir Scenario: graph query service Domain focus: GPU serving Primary language: cpp Difficulty: expert Scale/SLO: p99 < 150ms Component: component_nuflpeob Constraints: include security threat model (defensive only), include verification strategy, avoid data races and undefined behavior, assume adversarial inputs; validate everything, include failure modes and recovery Assume weekly network partitions. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000044
compiler_backend_ir
hard
cpp
Task type: compiler_backend_ir Scenario: edge sync Domain focus: compiler toolchains Primary language: cpp Difficulty: hard Scale/SLO: p99 < 150ms Component: component_vjhcnfzj Constraints: avoid data races and undefined behavior, include performance model and limits, include test vectors and fuzz strategy, include failure modes and recovery, include deterministic replay plan Assume tight memory budget and cold-start constraints. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000045
compiler_backend_ir
expert
rust
Task type: compiler_backend_ir Scenario: payment ledger Domain focus: large-scale ML systems Primary language: rust Difficulty: expert Scale/SLO: p99 < 150ms Component: component_wukulnnm Constraints: include failure modes and recovery, include verification strategy, explicit contracts and invariants, include test vectors and fuzz strategy, include deterministic replay plan, assume adversarial inputs; validate everything, avoid data races and undefined behavior Assume tight memory budget and cold-start constraints. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000046
compiler_backend_ir
expert
cpp
Task type: compiler_backend_ir Scenario: multi-tenant event ingestion Domain focus: GPU serving Primary language: cpp Difficulty: expert Scale/SLO: p99 < 150ms Component: component_ewqelrcb Constraints: include backward compatibility and migration plan, include security threat model (defensive only), explicit contracts and invariants, include deterministic replay plan, assume adversarial inputs; validate everything Assume schema changes every sprint; must be backward compatible. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000047
compiler_backend_ir
expert
rust
Task type: compiler_backend_ir Scenario: time-series metrics store Domain focus: observability platforms Primary language: rust Difficulty: expert Scale/SLO: 1M msgs/min Component: component_utezyxlk Constraints: include failure modes and recovery, include verification strategy, avoid data races and undefined behavior, explicit contracts and invariants, assume adversarial inputs; validate everything, include deterministic replay plan Assume weekly network partitions. Deliverable: Design an IR and lowering pipeline; include an optimization pass and correctness checks. Provide minimal code skeleton and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "ir", "codegen" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000048
static_analyzer
expert+
rust
Task type: static_analyzer Scenario: time-series metrics store Domain focus: fault injection & chaos engineering Primary language: rust Difficulty: expert+ Scale/SLO: p99 < 50ms Component: component_fogtlwcu Constraints: include deterministic replay plan, include verification strategy, explicit contracts and invariants, assume adversarial inputs; validate everything, include failure modes and recovery Assume weekly network partitions. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000049
static_analyzer
expert+
python
Task type: static_analyzer Scenario: identity and access Domain focus: high-frequency trading systems (safe engineering) Primary language: python Difficulty: expert+ Scale/SLO: 10k RPS peak Component: component_gygowvfa Constraints: include security threat model (defensive only), include verification strategy, include backward compatibility and migration plan, include performance model and limits, explicit contracts and invariants, include test vectors and fuzz strategy, include failure modes and recovery Assume schema changes every sprint; must be backward compatible. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000050
static_analyzer
expert+
bash
Task type: static_analyzer Scenario: multi-tenant event ingestion Domain focus: model checking Primary language: bash Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_kxlanhnp Constraints: include backward compatibility and migration plan, include test vectors and fuzz strategy, avoid data races and undefined behavior, include performance model and limits, explicit contracts and invariants, include deterministic replay plan Assume crash-only processes; recovery must be deterministic. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000051
static_analyzer
expert+
sql
Task type: static_analyzer Scenario: edge sync Domain focus: data lineage & governance Primary language: sql Difficulty: expert+ Scale/SLO: p99 < 150ms Component: component_xpkwmofl Constraints: include security threat model (defensive only), avoid data races and undefined behavior, include backward compatibility and migration plan, include performance model and limits, assume adversarial inputs; validate everything, include deterministic replay plan Assume tight memory budget and cold-start constraints. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000052
static_analyzer
hard
go
Task type: static_analyzer Scenario: payment ledger Domain focus: data lineage & governance Primary language: go Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_xaqjxnun Constraints: include test vectors and fuzz strategy, include verification strategy, explicit contracts and invariants, include security threat model (defensive only), avoid data races and undefined behavior, assume adversarial inputs; validate everything, include failure modes and recovery Assume schema changes every sprint; must be backward compatible. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000053
static_analyzer
expert
rust
Task type: static_analyzer Scenario: real-time notification hub Domain focus: network protocols Primary language: rust Difficulty: expert Scale/SLO: 1M msgs/min Component: component_hnbmshhl Constraints: avoid data races and undefined behavior, include security threat model (defensive only), include verification strategy, explicit contracts and invariants, assume adversarial inputs; validate everything, include test vectors and fuzz strategy, include deterministic replay plan Assume hostile inputs and targeted abuse patterns. Deliverable: Design a static analyzer for a safety property (e.g., taint/SQLi prevention); include rule set, false-positive strategy, and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "static-analysis", "security" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000054
runtime_gc
expert+
bash
Task type: runtime_gc Scenario: payment ledger Domain focus: query planning Primary language: bash Difficulty: expert+ Scale/SLO: 99.99% availability Component: component_lxvqvovy Constraints: include performance model and limits, include backward compatibility and migration plan, explicit contracts and invariants, avoid data races and undefined behavior, include security threat model (defensive only), include failure modes and recovery Assume crash-only processes; recovery must be deterministic. Deliverable: Design a GC/runtime component (mark-sweep/arena/RC hybrid); include pause-time strategy and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "runtime", "gc" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000055
runtime_gc
expert+
go
Task type: runtime_gc Scenario: edge sync Domain focus: cryptography engineering (defensive) Primary language: go Difficulty: expert+ Scale/SLO: p99 < 50ms Component: component_mhthhljn Constraints: include verification strategy, include failure modes and recovery, assume adversarial inputs; validate everything, avoid data races and undefined behavior, include deterministic replay plan, explicit contracts and invariants, include backward compatibility and migration plan Assume tight memory budget and cold-start constraints. Deliverable: Design a GC/runtime component (mark-sweep/arena/RC hybrid); include pause-time strategy and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "runtime", "gc" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000056
runtime_gc
expert
go
Task type: runtime_gc Scenario: job scheduler Domain focus: observability platforms Primary language: go Difficulty: expert Scale/SLO: 10k RPS peak Component: component_eszkhncs Constraints: include verification strategy, include deterministic replay plan, assume adversarial inputs; validate everything, include backward compatibility and migration plan, include test vectors and fuzz strategy, include security threat model (defensive only) Assume crash-only processes; recovery must be deterministic. Deliverable: Design a GC/runtime component (mark-sweep/arena/RC hybrid); include pause-time strategy and tests.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "runtime", "gc" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000057
runtime_gc
hard
sql
Task type: runtime_gc Scenario: document indexing pipeline Domain focus: kernel primitives Primary language: sql Difficulty: hard Scale/SLO: p99 < 50ms Component: component_qtkubmgu Constraints: include test vectors and fuzz strategy, include security threat model (defensive only), include deterministic replay plan, include performance model and limits, explicit contracts and invariants, avoid data races and undefined behavior, include backward compatibility and migration plan Assume hostile inputs and targeted abuse patterns. Deliverable: Design a GC/runtime component (mark-sweep/arena/RC hybrid); include pause-time strategy and tests.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "runtime", "gc" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000058
lockfree_primitive
expert
rust
Task type: lockfree_primitive Scenario: real-time notification hub Domain focus: formal verification Primary language: rust Difficulty: expert Scale/SLO: 99.99% availability Component: component_zeyckpes Constraints: include deterministic replay plan, avoid data races and undefined behavior, include failure modes and recovery, assume adversarial inputs; validate everything, explicit contracts and invariants, include security threat model (defensive only), include performance model and limits Assume schema changes every sprint; must be backward compatible. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000059
lockfree_primitive
expert
cpp
Task type: lockfree_primitive Scenario: streaming ETL Domain focus: secure enclaves (defensive) Primary language: cpp Difficulty: expert Scale/SLO: p99 < 50ms Component: component_sxgtlmfh Constraints: include failure modes and recovery, assume adversarial inputs; validate everything, include test vectors and fuzz strategy, include backward compatibility and migration plan, include performance model and limits, avoid data races and undefined behavior, explicit contracts and invariants Assume tight memory budget and cold-start constraints. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000060
lockfree_primitive
expert
cpp
Task type: lockfree_primitive Scenario: graph query service Domain focus: distributed storage Primary language: cpp Difficulty: expert Scale/SLO: 99.99% availability Component: component_rigkjrvu Constraints: include test vectors and fuzz strategy, include performance model and limits, include failure modes and recovery, include deterministic replay plan, include verification strategy Assume tight memory budget and cold-start constraints. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000061
lockfree_primitive
expert
rust
Task type: lockfree_primitive Scenario: job scheduler Domain focus: stream processing Primary language: rust Difficulty: expert Scale/SLO: 10k RPS peak Component: component_lxcdclvc Constraints: include security threat model (defensive only), include backward compatibility and migration plan, explicit contracts and invariants, include performance model and limits, include verification strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000062
lockfree_primitive
hard
rust
Task type: lockfree_primitive Scenario: graph query service Domain focus: high-frequency trading systems (safe engineering) Primary language: rust Difficulty: hard Scale/SLO: multi-region active-active Component: component_vixroxxs Constraints: include verification strategy, include security threat model (defensive only), include failure modes and recovery, include test vectors and fuzz strategy, explicit contracts and invariants Assume crash-only processes; recovery must be deterministic. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000063
lockfree_primitive
expert+
cpp
Task type: lockfree_primitive Scenario: rate limit gateway Domain focus: formal verification Primary language: cpp Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_ehewugds Constraints: include verification strategy, explicit contracts and invariants, include performance model and limits, include deterministic replay plan, include failure modes and recovery, avoid data races and undefined behavior, assume adversarial inputs; validate everything Assume hostile inputs and targeted abuse patterns. Deliverable: Design a lock-free primitive with memory ordering reasoning and stress tests (no UB).
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```rust // Skeleton: SPSC ring buffer with acquire/release (outline) use std::sync::atomic::{AtomicUsize, Ordering}; pub struct Ring<T> { buf: Vec<std::mem::MaybeUninit<T>>, head: AtomicUsize, tail: AtomicUsize, cap: usize, } // Correctness sketch: producer uses Release on tail store, consumer uses Acquire on tail load. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "concurrency", "memory-model" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000064
kernel_syscall_design
expert+
c
Task type: kernel_syscall_design Scenario: time-series metrics store Domain focus: formal verification Primary language: c Difficulty: expert+ Scale/SLO: 50 TB/day ingestion Component: component_topdcbck Constraints: assume adversarial inputs; validate everything, explicit contracts and invariants, include security threat model (defensive only), include verification strategy, include test vectors and fuzz strategy, avoid data races and undefined behavior Assume strict auditability and replayable history. Deliverable: Design a safe syscall/API boundary: ABI, validation, error codes, and compatibility; include tests and fuzz plan.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "c", "os", "interfaces" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000065
kernel_syscall_design
hard
cpp
Task type: kernel_syscall_design Scenario: rate limit gateway Domain focus: kernel primitives Primary language: cpp Difficulty: hard Scale/SLO: 1M msgs/min Component: component_jdnpdwhh Constraints: assume adversarial inputs; validate everything, include deterministic replay plan, include backward compatibility and migration plan, explicit contracts and invariants, include verification strategy, include performance model and limits Assume crash-only processes; recovery must be deterministic. Deliverable: Design a safe syscall/API boundary: ABI, validation, error codes, and compatibility; include tests and fuzz plan.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "os", "interfaces" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000066
kernel_syscall_design
hard
cpp
Task type: kernel_syscall_design Scenario: multi-tenant event ingestion Domain focus: secure enclaves (defensive) Primary language: cpp Difficulty: hard Scale/SLO: 100k RPS peak Component: component_bnwbyuxf Constraints: include backward compatibility and migration plan, avoid data races and undefined behavior, include deterministic replay plan, include security threat model (defensive only), include verification strategy, explicit contracts and invariants Assume partial data corruption; include scrubbing strategy. Deliverable: Design a safe syscall/API boundary: ABI, validation, error codes, and compatibility; include tests and fuzz plan.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "cpp", "os", "interfaces" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000067
kernel_syscall_design
expert
rust
Task type: kernel_syscall_design Scenario: job scheduler Domain focus: static analysis Primary language: rust Difficulty: expert Scale/SLO: 50 TB/day ingestion Component: component_awpuwscf Constraints: include failure modes and recovery, avoid data races and undefined behavior, include deterministic replay plan, explicit contracts and invariants, include verification strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Design a safe syscall/API boundary: ABI, validation, error codes, and compatibility; include tests and fuzz plan.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "os", "interfaces" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000068
network_protocol
expert
go
Task type: network_protocol Scenario: graph query service Domain focus: constraint solving Primary language: go Difficulty: expert Scale/SLO: p99 < 50ms Component: component_japcufpe Constraints: include verification strategy, include backward compatibility and migration plan, include performance model and limits, assume adversarial inputs; validate everything, avoid data races and undefined behavior, explicit contracts and invariants Assume partial data corruption; include scrubbing strategy. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000069
network_protocol
hard
typescript
Task type: network_protocol Scenario: identity and access Domain focus: static analysis Primary language: typescript Difficulty: hard Scale/SLO: 10k RPS peak Component: component_pzeqknba Constraints: include deterministic replay plan, avoid data races and undefined behavior, include backward compatibility and migration plan, include failure modes and recovery, include verification strategy, include performance model and limits Assume partial data corruption; include scrubbing strategy. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000070
network_protocol
hard
bash
Task type: network_protocol Scenario: real-time notification hub Domain focus: constraint solving Primary language: bash Difficulty: hard Scale/SLO: 10k RPS peak Component: component_muwtlsyh Constraints: include deterministic replay plan, include performance model and limits, avoid data races and undefined behavior, include verification strategy, include security threat model (defensive only) Assume tight memory budget and cold-start constraints. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000071
network_protocol
expert+
typescript
Task type: network_protocol Scenario: edge sync Domain focus: formal verification Primary language: typescript Difficulty: expert+ Scale/SLO: 10k RPS peak Component: component_bqmboovr Constraints: include backward compatibility and migration plan, include failure modes and recovery, avoid data races and undefined behavior, include deterministic replay plan, include security threat model (defensive only) Assume crash-only processes; recovery must be deterministic. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000072
network_protocol
expert
bash
Task type: network_protocol Scenario: identity and access Domain focus: network protocols Primary language: bash Difficulty: expert Scale/SLO: 100k RPS peak Component: component_qslvkntc Constraints: include performance model and limits, include deterministic replay plan, include failure modes and recovery, include test vectors and fuzz strategy, include verification strategy, explicit contracts and invariants Assume strict auditability and replayable history. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000073
network_protocol
expert+
bash
Task type: network_protocol Scenario: job scheduler Domain focus: large-scale ML systems Primary language: bash Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_mwrbpxmt Constraints: assume adversarial inputs; validate everything, include failure modes and recovery, include security threat model (defensive only), include backward compatibility and migration plan, include deterministic replay plan, include test vectors and fuzz strategy Assume schema changes every sprint; must be backward compatible. Deliverable: Design an application protocol: framing, retries, backpressure, timeouts; include client/server skeleton and test vectors.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "protocols", "reliability" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000074
secure_architecture
hard
typescript
Task type: secure_architecture Scenario: real-time notification hub Domain focus: edge robotics (safe) Primary language: typescript Difficulty: hard Scale/SLO: multi-region active-active Component: component_ejmbatkz Constraints: include backward compatibility and migration plan, avoid data races and undefined behavior, explicit contracts and invariants, assume adversarial inputs; validate everything, include performance model and limits Assume weekly network partitions. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000075
secure_architecture
expert
sql
Task type: secure_architecture Scenario: rate limit gateway Domain focus: static analysis Primary language: sql Difficulty: expert Scale/SLO: 100k RPS peak Component: component_jmlpcrdi Constraints: include backward compatibility and migration plan, include deterministic replay plan, assume adversarial inputs; validate everything, include security threat model (defensive only), include failure modes and recovery, explicit contracts and invariants Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000076
secure_architecture
expert
rust
Task type: secure_architecture Scenario: job scheduler Domain focus: high-frequency trading systems (safe engineering) Primary language: rust Difficulty: expert Scale/SLO: multi-region active-active Component: component_zbwncurp Constraints: include test vectors and fuzz strategy, assume adversarial inputs; validate everything, include backward compatibility and migration plan, include performance model and limits, explicit contracts and invariants Assume hostile inputs and targeted abuse patterns. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000077
secure_architecture
expert
sql
Task type: secure_architecture Scenario: job scheduler Domain focus: data lineage & governance Primary language: sql Difficulty: expert Scale/SLO: 50 TB/day ingestion Component: component_ucxgayzs Constraints: assume adversarial inputs; validate everything, include failure modes and recovery, explicit contracts and invariants, include security threat model (defensive only), avoid data races and undefined behavior, include performance model and limits, include backward compatibility and migration plan Assume crash-only processes; recovery must be deterministic. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000078
secure_architecture
expert
python
Task type: secure_architecture Scenario: rate limit gateway Domain focus: query planning Primary language: python Difficulty: expert Scale/SLO: 10k RPS peak Component: component_vagexgdf Constraints: include verification strategy, explicit contracts and invariants, include test vectors and fuzz strategy, include backward compatibility and migration plan, include performance model and limits Assume partial data corruption; include scrubbing strategy. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000079
secure_architecture
hard
typescript
Task type: secure_architecture Scenario: identity and access Domain focus: zero-downtime migrations Primary language: typescript Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_heogfkas Constraints: include performance model and limits, include backward compatibility and migration plan, avoid data races and undefined behavior, include verification strategy, explicit contracts and invariants Assume weekly network partitions. Deliverable: Provide a defensive threat model and secure-by-default architecture; include monitoring/detection and tests (no offensive content).
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "security", "threat-modeling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000080
supply_chain_security
expert
bash
Task type: supply_chain_security Scenario: streaming ETL Domain focus: real-time scheduling Primary language: bash Difficulty: expert Scale/SLO: 1M msgs/min Component: component_bzrrptoo Constraints: include backward compatibility and migration plan, include test vectors and fuzz strategy, include deterministic replay plan, assume adversarial inputs; validate everything, explicit contracts and invariants, include security threat model (defensive only) Assume hostile inputs and targeted abuse patterns. Deliverable: Design a supply-chain security plan: SBOM, signing, provenance, dependency policy, and CI gates.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "sbom", "signing" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000081
supply_chain_security
hard
typescript
Task type: supply_chain_security Scenario: feature-flag evaluation Domain focus: secure enclaves (defensive) Primary language: typescript Difficulty: hard Scale/SLO: p99 < 150ms Component: component_khdykpyw Constraints: include backward compatibility and migration plan, include deterministic replay plan, include security threat model (defensive only), include performance model and limits, include test vectors and fuzz strategy, include verification strategy, include failure modes and recovery Assume schema changes every sprint; must be backward compatible. Deliverable: Design a supply-chain security plan: SBOM, signing, provenance, dependency policy, and CI gates.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "sbom", "signing" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000082
supply_chain_security
hard
bash
Task type: supply_chain_security Scenario: feature-flag evaluation Domain focus: network protocols Primary language: bash Difficulty: hard Scale/SLO: multi-region active-active Component: component_guvxupfr Constraints: include deterministic replay plan, include security threat model (defensive only), assume adversarial inputs; validate everything, include performance model and limits, avoid data races and undefined behavior, include failure modes and recovery Assume crash-only processes; recovery must be deterministic. Deliverable: Design a supply-chain security plan: SBOM, signing, provenance, dependency policy, and CI gates.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "sbom", "signing" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000083
sre_incident_sim
expert
bash
Task type: sre_incident_sim Scenario: time-series metrics store Domain focus: observability platforms Primary language: bash Difficulty: expert Scale/SLO: 50 TB/day ingestion Component: component_ahfaqbhk Constraints: include backward compatibility and migration plan, explicit contracts and invariants, include security threat model (defensive only), include verification strategy, include performance model and limits, include deterministic replay plan Assume tight memory budget and cold-start constraints. Deliverable: Provide incident simulation: SLOs, alerts, runbooks, and game-day plan; include postmortem template.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "sre", "runbooks" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000084
sre_incident_sim
expert+
typescript
Task type: sre_incident_sim Scenario: identity and access Domain focus: query planning Primary language: typescript Difficulty: expert+ Scale/SLO: 100k RPS peak Component: component_vdxbxeup Constraints: include performance model and limits, include verification strategy, include deterministic replay plan, avoid data races and undefined behavior, explicit contracts and invariants, include security threat model (defensive only) Assume partial data corruption; include scrubbing strategy. Deliverable: Provide incident simulation: SLOs, alerts, runbooks, and game-day plan; include postmortem template.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "sre", "runbooks" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000085
sre_incident_sim
expert
go
Task type: sre_incident_sim Scenario: rate limit gateway Domain focus: runtime systems Primary language: go Difficulty: expert Scale/SLO: 10k RPS peak Component: component_luvkgsss Constraints: include test vectors and fuzz strategy, include backward compatibility and migration plan, include security threat model (defensive only), avoid data races and undefined behavior, explicit contracts and invariants Assume hostile inputs and targeted abuse patterns. Deliverable: Provide incident simulation: SLOs, alerts, runbooks, and game-day plan; include postmortem template.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "sre", "runbooks" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000086
perf_microarchitecture
expert+
rust
Task type: perf_microarchitecture Scenario: job scheduler Domain focus: high-frequency trading systems (safe engineering) Primary language: rust Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_knvsalkb Constraints: include backward compatibility and migration plan, avoid data races and undefined behavior, include performance model and limits, include verification strategy, include deterministic replay plan Assume hostile inputs and targeted abuse patterns. Deliverable: Provide performance engineering plan: profiling, hot-path redesign, cache behavior assumptions, and microbench harness.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "performance", "profiling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000087
perf_microarchitecture
expert
go
Task type: perf_microarchitecture Scenario: payment ledger Domain focus: zero-downtime migrations Primary language: go Difficulty: expert Scale/SLO: p99 < 150ms Component: component_kjqaqcau Constraints: assume adversarial inputs; validate everything, include test vectors and fuzz strategy, include verification strategy, include backward compatibility and migration plan, include failure modes and recovery, include security threat model (defensive only) Assume tight memory budget and cold-start constraints. Deliverable: Provide performance engineering plan: profiling, hot-path redesign, cache behavior assumptions, and microbench harness.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "performance", "profiling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000088
perf_microarchitecture
expert
sql
Task type: perf_microarchitecture Scenario: multi-tenant event ingestion Domain focus: compiler toolchains Primary language: sql Difficulty: expert Scale/SLO: multi-region active-active Component: component_tdjeylch Constraints: include performance model and limits, include failure modes and recovery, assume adversarial inputs; validate everything, avoid data races and undefined behavior, explicit contracts and invariants, include verification strategy, include test vectors and fuzz strategy Assume partial data corruption; include scrubbing strategy. Deliverable: Provide performance engineering plan: profiling, hot-path redesign, cache behavior assumptions, and microbench harness.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "performance", "profiling" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000089
gpu_serving_pipeline
expert+
python
Task type: gpu_serving_pipeline Scenario: real-time notification hub Domain focus: cryptography engineering (defensive) Primary language: python Difficulty: expert+ Scale/SLO: 1M msgs/min Component: component_sgjsvaia Constraints: assume adversarial inputs; validate everything, include backward compatibility and migration plan, include security threat model (defensive only), explicit contracts and invariants, avoid data races and undefined behavior, include verification strategy, include performance model and limits Assume partial data corruption; include scrubbing strategy. Deliverable: Design a GPU inference serving pipeline: batching, scheduling, memory management, tail-latency control, and monitoring.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "gpu", "throughput" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000090
gpu_serving_pipeline
expert
bash
Task type: gpu_serving_pipeline Scenario: payment ledger Domain focus: GPU serving Primary language: bash Difficulty: expert Scale/SLO: 50 TB/day ingestion Component: component_vnaxscqa Constraints: include security threat model (defensive only), explicit contracts and invariants, include failure modes and recovery, include verification strategy, assume adversarial inputs; validate everything Assume schema changes every sprint; must be backward compatible. Deliverable: Design a GPU inference serving pipeline: batching, scheduling, memory management, tail-latency control, and monitoring.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "bash", "gpu", "throughput" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000091
gpu_serving_pipeline
expert
sql
Task type: gpu_serving_pipeline Scenario: real-time notification hub Domain focus: query planning Primary language: sql Difficulty: expert Scale/SLO: 100k RPS peak Component: component_irjvmdpo Constraints: include security threat model (defensive only), avoid data races and undefined behavior, include performance model and limits, include test vectors and fuzz strategy, include backward compatibility and migration plan, explicit contracts and invariants Assume crash-only processes; recovery must be deterministic. Deliverable: Design a GPU inference serving pipeline: batching, scheduling, memory management, tail-latency control, and monitoring.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "gpu", "throughput" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000092
ml_system_design
expert+
sql
Task type: ml_system_design Scenario: rate limit gateway Domain focus: static analysis Primary language: sql Difficulty: expert+ Scale/SLO: p99 < 150ms Component: component_xysnveas Constraints: assume adversarial inputs; validate everything, avoid data races and undefined behavior, include verification strategy, include test vectors and fuzz strategy, include failure modes and recovery Assume hostile inputs and targeted abuse patterns. Deliverable: Design end-to-end ML system: data contracts, training, evaluation, registry, serving, monitoring, and rollback.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "mlops", "serving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000093
ml_system_design
expert+
python
Task type: ml_system_design Scenario: feature-flag evaluation Domain focus: network protocols Primary language: python Difficulty: expert+ Scale/SLO: p99 < 150ms Component: component_mrozzamy Constraints: include test vectors and fuzz strategy, explicit contracts and invariants, include backward compatibility and migration plan, include performance model and limits, include failure modes and recovery, include verification strategy, include deterministic replay plan Assume tight memory budget and cold-start constraints. Deliverable: Design end-to-end ML system: data contracts, training, evaluation, registry, serving, monitoring, and rollback.
Output: rigorous design + invariants + verification plan + implementation sketch. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "python", "mlops", "serving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000094
robust_e2e_testing
expert
go
Task type: robust_e2e_testing Scenario: edge sync Domain focus: fault injection & chaos engineering Primary language: go Difficulty: expert Scale/SLO: multi-region active-active Component: component_rkixekyv Constraints: explicit contracts and invariants, include test vectors and fuzz strategy, include performance model and limits, assume adversarial inputs; validate everything, include security threat model (defensive only), include verification strategy, include backward compatibility and migration plan Assume weekly network partitions. Deliverable: Design an E2E testing strategy with determinism, fuzzing, chaos, and CI gating.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "go", "testing", "fuzzing" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000095
robust_e2e_testing
expert+
rust
Task type: robust_e2e_testing Scenario: identity and access Domain focus: formal verification Primary language: rust Difficulty: expert+ Scale/SLO: p99 < 150ms Component: component_darieaos Constraints: assume adversarial inputs; validate everything, include deterministic replay plan, include backward compatibility and migration plan, include test vectors and fuzz strategy, explicit contracts and invariants Assume schema changes every sprint; must be backward compatible. Deliverable: Design an E2E testing strategy with determinism, fuzzing, chaos, and CI gating.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "testing", "fuzzing" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000096
schema_evolution_contracts
expert
rust
Task type: schema_evolution_contracts Scenario: document indexing pipeline Domain focus: model checking Primary language: rust Difficulty: expert Scale/SLO: 10k RPS peak Component: component_carhludu Constraints: assume adversarial inputs; validate everything, include performance model and limits, include verification strategy, explicit contracts and invariants, include security threat model (defensive only), include backward compatibility and migration plan, include deterministic replay plan Assume crash-only processes; recovery must be deterministic. Deliverable: Design schema evolution rules and compatibility tests; include migration plan and examples.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). - Canary + shadow traffic; invariants checked in production via assertions/metrics. **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert checks: state-machine proof sketch + model checking; upgrade/rollback rehearsed.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "rust", "schemas", "compat" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000097
program_synthesis_safe
expert+
typescript
Task type: program_synthesis_safe Scenario: payment ledger Domain focus: consensus & replication Primary language: typescript Difficulty: expert+ Scale/SLO: 99.99% availability Component: component_ncgrezyp Constraints: include backward compatibility and migration plan, include verification strategy, include deterministic replay plan, avoid data races and undefined behavior, include performance model and limits, explicit contracts and invariants, include security threat model (defensive only) Assume hostile inputs and targeted abuse patterns. Deliverable: Design a program-synthesis workflow that generates code from specs safely; include guardrails and verification.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. - Liveness: under bounded faults and stable network, progress occurs. **Failure modes & recovery** - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Deterministic simulation with fault injection (crash/partition/latency). - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "synthesis", "specs" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000098
formal_proof_sketch
hard
sql
Task type: formal_proof_sketch Scenario: streaming ETL Domain focus: large-scale ML systems Primary language: sql Difficulty: hard Scale/SLO: p99 < 150ms Component: component_nfjkoqxs Constraints: include deterministic replay plan, include verification strategy, include failure modes and recovery, include security threat model (defensive only), explicit contracts and invariants, assume adversarial inputs; validate everything, avoid data races and undefined behavior Assume strict auditability and replayable history. Deliverable: Provide a rigorous proof sketch for key invariants and show how to test/verify them in practice.
Output: elite engineering answer optimized for correctness, performance, and operability. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Determinism: replay of the same event log yields identical outputs. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Property tests against a pure reference model (state machine). - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "sql", "proofs", "invariants" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000099
verification_properties
hard
typescript
Task type: verification_properties Scenario: graph query service Domain focus: network protocols Primary language: typescript Difficulty: hard Scale/SLO: 50 TB/day ingestion Component: component_oigdigie Constraints: avoid data races and undefined behavior, include security threat model (defensive only), include performance model and limits, explicit contracts and invariants, include failure modes and recovery Assume crash-only processes; recovery must be deterministic. Deliverable: Define properties and provide property-based/generative test plan with a reference model.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Safety: state transitions preserve invariants; no partial commit leaks. - Determinism: replay of the same event log yields identical outputs. **Failure modes & recovery** - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. - Network partition: minority cannot commit; clients receive retriable errors. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Deterministic simulation with fault injection (crash/partition/latency). - Fuzzing of parsers/framers/validators with corpus seeds. - Property tests against a pure reference model (state machine). **Snippet** ```text Implementation sketch: factor pure state-machine core; adapters for I/O; add deterministic replay log. ``` Hard checks: fault injection tests gate merges; perf thresholds enforced in CI.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "typescript", "property-based", "verification" ], "has_code": true, "requires_thinking": true, "seed": 271828 }
omega_000100
mechanized_spec
expert+
lean
Task type: mechanized_spec Scenario: identity and access Domain focus: query planning Primary language: lean Difficulty: expert+ Scale/SLO: 10k RPS peak Component: component_tbtbjfhx Constraints: include performance model and limits, include failure modes and recovery, include test vectors and fuzz strategy, explicit contracts and invariants, include verification strategy, avoid data races and undefined behavior Assume weekly network partitions. Deliverable: Provide a mechanized-style spec outline (Lean-like), key definitions, and a proof plan. Include executable reference code skeleton and tests.
Output: contract-first solution with failure modes, security posture, and test/verification strategy. **Contract** - Inputs validated at the boundary; explicit error taxonomy. - Idempotency for side effects via request_id; deterministic replay. - Backward compatibility: additive changes by default; versioned breaking changes. **Invariants** - Liveness: under bounded faults and stable network, progress occurs. - Isolation: tenant boundary enforced; no cross-tenant reads/writes. - Safety: state transitions preserve invariants; no partial commit leaks. **Failure modes & recovery** - Data corruption: checksums + scrubber; quarantine and rebuild from replicas/snapshots. - Crash during commit: WAL replay completes or transaction aborts; no torn writes. - Duplicate requests: de-duplicate by (tenant, request_id) returning cached response. **Security posture (defensive)** - Threat model: auth/authz, injection, replay/abuse, supply chain. - Least privilege; secrets in managed store; audit logs for sensitive ops. - Input normalization, parameterized queries, path traversal protections. **Verification strategy** - Canary + shadow traffic; invariants checked in production via assertions/metrics. - Fuzzing of parsers/framers/validators with corpus seeds. - Deterministic simulation with fault injection (crash/partition/latency). **Snippet** ```lean -- Pseudo-Lean outline structure State where ver : Nat val : Option ByteArray def invariant (s : State) : Prop := True theorem step_preserves_invariant : βˆ€ s, invariant s β†’ βˆ€ s', Step s s' β†’ invariant s' := by intro s hs s' hstep -- proof plan: case analysis on transition; trivial here trivial ``` Expert+ checks: mechanized invariants (or exhaustive model checking), adversarial fuzzing, and multi-region failure drills.
{ "tags": [ "omegagenesis", "ultra-elite", "software-engineering", "lean", "formal-methods", "theorem-proving" ], "has_code": true, "requires_thinking": true, "seed": 271828 }