Deterministic by contract
Every output carries a sha256 hash, a core version, and a rules-table version. Two runs on the same tree produce byte-identical output, enforced by tests.
Same input, byte-identical output. Hash-verifiable. No network, no LLM at runtime.