This section describes how extracted evidence is converted into edges and clusters. It covers signal weighting, admission gates, conflict resolution, safeguards, and transitive controls. The objective is to ensure that linkages are precise, reproducible, and resilient under adversarial variation. All thresholds and constants are omitted by design.Documentation Index
Fetch the complete documentation index at: https://none-38c466ad.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
7.1 Signal Contribution
Each pivot contributes weight subject to rarity adjustment, hub suppression, and temporal decay. Frequent features are capped, high-degree hubs are downweighted, and aged signals lose influence over time. Formal definitionFor a signal : where suppresses high-degree nodes and applies age-dependent decay. Parameters omitted by design. Invariants
- Rare and recent signals dominate
- Hub suppression prevents clustering on common infra
- Decay logic handles pruning of stale evidence
7.2 Typed Edge Gates
Edges are admitted through class-stratified gates. Hard evidence can be admitted alone, medium evidence requires diversity, and soft evidence cannot be promoted on its own. Formal definition Invariants- Deterministic pivots dominate
- Medium pivots require multiple classes
- Soft evidence is supplemental only
7.3 Conflict Handling
Contradictory evidence overrides raw score. Payment mutexes, TLS issuer contradictions, geographic mismatches, and placeholder surfaces reduce or veto link strength. Formal definition where is a normalized conflict score and applies either subtraction or rejection. Parameters omitted by design. Invariants- Logical contradictions override weight
- Partial conflicts reduce confidence
- Reasons are preserved for auditability
7.4 Diversity and Safeguards
Additional safeguards prevent spurious links and enforce evidence diversity:- Infra-only disallow: infrastructure pivots alone cannot admit edges
- Diversity requirement: non-hard links must include multiple asset-like classes and a score floor
- DOM reinforcement: approximate DOM similarity contributes a bounded bonus but never suffices on its own
- Blocks links formed only by infrastructure coincidences
- Ensures multi-faceted support for edges without hard pivots
- Allows structural reinforcement without over-reliance on layout alone
7.5 Negative Evidence Veto
Veto rules exclude edges arising from weak overlaps or known false commonalities. These checks are applied before final admission. Predicates include- Shared agency accounts without corroborating identity
- Vendor templates or placeholder surfaces reused across many operators
- Lone shared extension without other overlap
- Geographic mismatches when identity is weak
- Payment or TLS contradictions
- High-precision exclusion suppresses false positives
- Strong identity is always required for survival
- Veto application is logged for traceability
7.6 Bounded Transitive Expansion
Soft evidence chains are explicitly bounded. Let and let be the set of soft edges. A proposed soft edge is rejected if it would create a path Parameters omitted by design. Baseline contrastUnbounded chaining of weak overlaps causes “snowballing,” where unrelated nodes are merged through repeated soft coincidences. The bounded predicate localizes soft pivots and prevents cluster inflation.
7.7 Community Detection
Admitted edges form a weighted graph. Clusters are extracted using modularity-based community detection. Formal definition where are edge weights, node degrees, and community assignments. Maximization of yields partitions; fallback is connected components when community detection is unavailable. Parameters omitted by design. Baseline contrastUsing only connected components tends to over-merge clusters when a single bridge exists. Modularity-based detection favors dense substructures and suppresses merges across weak bridges.
7.8 Candidate Generation
Candidate edges are proposed upstream through approximate similarity search in embedding space. Formal definitionFor a domain with embedding : with chosen adaptively (omitted). Candidate pairs are . Baseline contrast
Exhaustive enumeration is ; approximate similarity retrieval scales sub-quadratically. Prefilters remove trivial overlaps (e.g. provider-wide or CDN-wide artifacts) before scoring.
7.9 Outcome Properties
System outcomes reflect the guarantees of the scoring and correlation framework:- Explainability: every admitted edge carries metadata on weight, rarity caps, decay, conflicts, and veto results
- Precision-first growth: infra-only and soft-only links are excluded; medium pivots must pass diversity; hard pivots dominate
- Stability: reproducibility is measured via bootstrap resampling, with cluster Jaccard index enforced:
- Scalability: clustering methods partition graphs at the – node scale under configured resources
- Auditability: all admitted and rejected edges retain their rationale, enabling external verification