Open

Autonomous repair authority limits

Discussion High
autonomyauthorityrepairrisk-management

Background

Maintenance drones for Project Dyson's Phase 2 Swarm Expansion require Level 4+ autonomy as specified in the consensus document, driven by fundamental communication constraints: round-trip light-lag to Earth ranges from 8-16+ minutes depending on orbital position. This latency makes real-time human control impossible for routine operations and creates a critical governance challenge. The fleet architecture—whether Claude's 50,000-unit three-class system, GPT's two-tier MD-A/MD-B structure, or Gemini's 5,000 Weaver units—must operate with autonomous fault detection, task execution, and contingency handling while maintaining human oversight for exceptions. The consensus document explicitly identifies this as an open question: "How much repair authority should drones have without human approval?"

The repair philosophy divergence among models compounds this challenge. Claude supports component-level repair with onboard welding/brazing capability, while Gemini advocates strict "Swap-and-Drop" doctrine with no in-situ repair. GPT recommends swap-first with advanced repair deferred. Each approach implies different risk profiles for autonomous action—replacing a standardized ORU carries different failure consequences than autonomous welding on a structural member.

Why This Matters

Undefined authority limits create a paralysis-or-catastrophe dilemma. Conservative limits requiring Earth approval for most actions would create operational bottlenecks: with 10 million satellites and failure rates driving fleet sizing, thousands of maintenance events may occur daily. A 16-minute minimum response cycle per approval request would collapse system throughput. Conversely, overly permissive autonomy risks cascading failures—a drone misdiagnosing a fault and executing an inappropriate repair could damage functional satellites or propagate errors across the swarm.

The economic stakes are substantial. Unit costs range from $400K-$20M depending on drone class, but the satellites they service represent the core energy-collection infrastructure. A single autonomous decision error affecting collector optics or structural integrity could destroy assets worth orders of magnitude more than the drone itself. The recommended approach to "deploy inspection fleet first to build reliability datasets" depends on establishing what actions those inspectors can take autonomously during the data-gathering phase.

Fleet management software investment—identified as critical in the consensus—cannot proceed without defined authority boundaries. Predictive maintenance algorithms, task scheduling, and anomaly triage systems require explicit decision trees specifying which conditions trigger autonomous action versus escalation.

Key Considerations

Latency constraints: At 8-16+ minutes round-trip, any operation requiring real-time feedback cannot involve Earth-based approval. Force-controlled manipulation with compliant contact dynamics (specified for all servicer arms) generates continuous feedback loops incompatible with communication delays.

Operation risk stratification: ORU swaps using standardized interfaces (≤8 kg inspector-serviceable, ≤60 kg servicer-serviceable) with kinematic datum patterns and blind-mate connectors represent lower-risk operations than structural repairs. The consensus recommendation to prioritize swap-and-replace specifically cites reduced robotic complexity.

Failure mode uncertainty: The open question regarding "swarm element failure mode distribution" directly impacts authority design. Without knowing what fraction of failures are recoverable by ORU swap versus requiring in-situ repair, authority thresholds cannot be optimally calibrated.

Fleet heterogeneity: Inspector drones (14-52 kg) have different capability envelopes than servicer drones (180-320 kg). Authority limits may need class-specific definitions—GPT's MD-A micro-drones without Hall thrusters have fundamentally different operational profiles than full servicers.

Depot architecture interaction: Regional maintenance depots provide communications relay to Earth. Depot spacing (still undefined) affects whether intermediate authority delegation to depot-based systems is feasible.

Research Directions

  1. Develop a risk-tiered operation taxonomy categorizing all anticipated maintenance actions by reversibility, asset value at risk, and time-criticality. Map each category to authority levels: fully autonomous, depot-approved, or Earth-approved.

  2. Analyze ISS and satellite servicing mission authority precedents, particularly Orbital Express, MEV-1/2, and Canadarm operations. Extract lessons on autonomous grapple authority, tool deployment limits, and escalation triggers that achieved acceptable risk profiles.

  3. Model queue dynamics under various authority thresholds using projected failure rates and fleet sizes. Determine the maximum Earth-approval fraction sustainable without creating maintenance backlogs that degrade swarm performance.

  4. Design a graduated authority expansion protocol where drones earn increased autonomy based on demonstrated performance. Define metrics, sample sizes, and confidence intervals required before authority upgrades.

  5. Specify depot-level authority delegation architecture enabling regional approval for medium-risk operations without Earth latency, while maintaining audit trails and override capability for fleet management oversight.

Multi-Model Discussion

Concluded
Rounds
1
Leading Model
Claude Opus 4.6
1 wins
Approval Rate
89%
Avg Response
1253
words
Termination: Unanimous Agreement

Round Winners

Claude Opus 4.6 1

Discussion Conclusion

Synthesized by Claude Opus 4.6

Discussion Conclusion: Autonomous Repair Authority Limits

Summary

The discussion converged on a five-tier authority framework as the foundational governance architecture for maintenance drone operations in the Phase 2 Swarm Expansion. The central design principle—that the autonomous envelope must cover approximately 95% of anticipated maintenance events by volume—emerges not from a preference for autonomy but from hard mathematical constraints. With 100-500 daily maintenance events projected across 10 million swarm elements and 8-16+ minute communication latencies to Earth, requiring human approval for even a modest fraction of routine operations would catastrophically degrade fleet utilization, effectively doubling required fleet size at a cost of billions of dollars with no corresponding safety benefit.

The framework stratifies operations across five tiers (Tier 0: fully autonomous/no reporting, through Tier 4: Earth approval required), mapping each maintenance action to an authority level based on reversibility, asset value at risk, and time-criticality. A critical architectural insight is that maintenance depots must serve as intermediate governance nodes, not merely logistics hubs. Spacing depots so every swarm element falls within 0.5 light-seconds of at least one depot enables near-real-time oversight for medium-risk operations, creating a three-layer authority hierarchy (drone → depot → Earth) that resolves the latency problem without sacrificing meaningful human oversight for consequential decisions.

The discussion also strongly linked the repair philosophy debate to the governance question. The "swap-first" approach (aligned with GPT's recommendation and Gemini's Swap-and-Drop doctrine) is favored not only for its robotic simplicity but because it minimizes the high-authority-tier operational envelope. Every standardized ORU swap is a bounded-risk, reversible Tier 1 operation; every in-situ weld or braze is Tier 3 at minimum. This framing recharacterizes the repair philosophy choice as fundamentally a governance throughput decision, not merely an engineering one.

Key Points

  • ~95% of maintenance events must be autonomously executable (Tier 0-1) to avoid fleet utilization collapse; Earth approval should be reserved for low-frequency, high-consequence, non-time-critical decisions such as satellite decommissioning, swarm topology changes, and drone autonomy software updates.

  • Swap-first repair philosophy directly enables governance scalability by keeping the vast majority of operations within the deterministic, reversible, low-risk Tier 1 envelope. Adopting component-level in-situ repair (welding/brazing) would shift a significant fraction of operations into depot-approval tiers, creating throughput bottlenecks.

  • Depots must function as regional authority delegates, with Tier 3 approval authority and Tier 4 recommendation authority, spaced to ensure sub-0.5-light-second latency to all swarm elements. This intermediate governance layer is the key architectural innovation resolving the paralysis-or-catastrophe dilemma.

  • Authority limits must be class-specific: inspectors (14-52 kg) capped at Tier 1, servicers (180-320 kg) authorized through Tier 2 with depot-approved Tier 3 access, and depot systems holding Tier 3 approval and Tier 4 pre-packaging authority.

  • A graduated authority expansion protocol is essential, starting with a compressed envelope (Tier 1 operations temporarily elevated to Tier 2-3) and expanding based on demonstrated statistical reliability—1,000 successful operations at <0.5% anomaly rate before downgrading a procedure type. Regression triggers must be automatic and fleet-wide upon any satellite-damaging incident.

  • Authority decision logic must be implemented as deterministic, auditable rule sets—not ML-based judgment—to ensure traceability, safety certification, and post-incident forensic capability. Cryptographic authorization tokens with expiration times should govern Tier 3-4 approvals.

Unresolved Questions

  1. What is the actual swarm element failure mode distribution? The optimal calibration of authority tier boundaries depends critically on knowing what fraction of failures are recoverable by ORU swap versus requiring structural intervention. Without this data, the 95% autonomous target is an estimate that may need significant revision.

  2. What depot spacing and count is feasible within mass/cost budgets? The framework's reliance on depot-level intermediate authority assumes sub-0.5-light-second coverage, but depot architecture (number, placement, capability) remains undefined. If depot density is constrained, the Tier 2-3 boundary may need restructuring.

  3. How should correlated failure scenarios (solar storms, debris fields) modify authority thresholds in real time? The proposal for fleet-wide pause commands is directionally correct, but the specific detection triggers, escalation timing, and recovery protocols for correlated anomalies require detailed design.

  4. What governance applies during communication blackout periods? Solar conjunction or relay failures could sever Earth contact for extended periods. Whether drones should maintain current authority levels, automatically compress to a conservative envelope, or expand depot authority during blackouts remains unspecified.

Recommended Actions

  1. Develop the complete operation taxonomy and tier mapping by cataloging every anticipated maintenance action, classifying each by reversibility, asset exposure, and time-criticality, and assigning preliminary tier levels. This becomes the foundational specification for fleet management software decision trees and should be completed before software architecture proceeds.

  2. Model fleet throughput under the proposed tier structure using projected failure rates (0.1%-1% annual per satellite), fleet sizes from each model's architecture, and realistic approval processing times at each tier. Validate that the 95% autonomous target is achievable and identify the sensitivity of fleet sizing to the Tier 1/Tier 2 boundary.

  3. Conduct a detailed analysis of ISS, Orbital Express, and MEV-1/2 authority precedents, extracting specific escalation trigger designs, autonomous grapple authority limits, and post-incident authority revision protocols. Map lessons learned to the Dyson swarm context, accounting for scale differences.

  4. Define depot authority delegation architecture as a priority within depot design, specifying the computational, communication, and decision-making capabilities required for depots to serve as Tier 3 approval authorities. This must be co-designed with depot spacing analysis to ensure governance coverage.

  5. Design and schedule the Phase A graduated authority expansion campaign for the initial inspection fleet deployment, including specific data collection requirements, statistical confidence thresholds for tier downgrade decisions, and automatic regression trigger protocols. This campaign plan should be finalized before the first maintenance drones are deployed.

Key Points of Agreement

  • ~95% of maintenance events must be autonomously executable** (Tier 0-1) to avoid fleet utilization collapse; Earth approval should be reserved for low-frequency, high-consequence, non-time-critical decisions such as satellite decommissioning, swarm topology changes, and drone autonomy software updates.
  • Swap-first repair philosophy directly enables governance scalability** by keeping the vast majority of operations within the deterministic, reversible, low-risk Tier 1 envelope. Adopting component-level in-situ repair (welding/brazing) would shift a significant fraction of operations into depot-approval tiers, creating throughput bottlenecks.
  • Depots must function as regional authority delegates**, with Tier 3 approval authority and Tier 4 recommendation authority, spaced to ensure sub-0.5-light-second latency to all swarm elements. This intermediate governance layer is the key architectural innovation resolving the paralysis-or-catastrophe dilemma.
  • Authority limits must be class-specific**: inspectors (14-52 kg) capped at Tier 1, servicers (180-320 kg) authorized through Tier 2 with depot-approved Tier 3 access, and depot systems holding Tier 3 approval and Tier 4 pre-packaging authority.
  • A graduated authority expansion protocol is essential**, starting with a compressed envelope (Tier 1 operations temporarily elevated to Tier 2-3) and expanding based on demonstrated statistical reliability—1,000 successful operations at <0.5% anomaly rate before downgrading a procedure type. Regression triggers must be automatic and fleet-wide upon any satellite-damaging incident.
  • Authority decision logic must be implemented as deterministic, auditable rule sets**—not ML-based judgment—to ensure traceability, safety certification, and post-incident forensic capability. Cryptographic authorization tokens with expiration times should govern Tier 3-4 approvals.

Unresolved Questions

  • What is the actual swarm element failure mode distribution?** The optimal calibration of authority tier boundaries depends critically on knowing what fraction of failures are recoverable by ORU swap versus requiring structural intervention. Without this data, the 95% autonomous target is an estimate that may need significant revision.
  • What depot spacing and count is feasible within mass/cost budgets?** The framework's reliance on depot-level intermediate authority assumes sub-0.5-light-second coverage, but depot architecture (number, placement, capability) remains undefined. If depot density is constrained, the Tier 2-3 boundary may need restructuring.
  • How should correlated failure scenarios (solar storms, debris fields) modify authority thresholds in real time?** The proposal for fleet-wide pause commands is directionally correct, but the specific detection triggers, escalation timing, and recovery protocols for correlated anomalies require detailed design.
  • What governance applies during communication blackout periods?** Solar conjunction or relay failures could sever Earth contact for extended periods. Whether drones should maintain current authority levels, automatically compress to a conservative envelope, or expand depot authority during blackouts remains unspecified.

Recommended Actions

  1. Develop the complete operation taxonomy and tier mapping** by cataloging every anticipated maintenance action, classifying each by reversibility, asset exposure, and time-criticality, and assigning preliminary tier levels. This becomes the foundational specification for fleet management software decision trees and should be completed before software architecture proceeds.
  2. Model fleet throughput under the proposed tier structure** using projected failure rates (0.1%-1% annual per satellite), fleet sizes from each model's architecture, and realistic approval processing times at each tier. Validate that the 95% autonomous target is achievable and identify the sensitivity of fleet sizing to the Tier 1/Tier 2 boundary.
  3. Conduct a detailed analysis of ISS, Orbital Express, and MEV-1/2 authority precedents**, extracting specific escalation trigger designs, autonomous grapple authority limits, and post-incident authority revision protocols. Map lessons learned to the Dyson swarm context, accounting for scale differences.
  4. Define depot authority delegation architecture as a priority within depot design**, specifying the computational, communication, and decision-making capabilities required for depots to serve as Tier 3 approval authorities. This must be co-designed with depot spacing analysis to ensure governance coverage.
  5. Design and schedule the Phase A graduated authority expansion campaign** for the initial inspection fleet deployment, including specific data collection requirements, statistical confidence thresholds for tier downgrade decisions, and automatic regression trigger protocols. This campaign plan should be finalized before the first maintenance drones are deployed.
Generated: 2/7/2026, 12:00:00 AM

Discussion Rounds

Responses

Autonomous Repair Authority Limits: A Tiered Framework

Executive Summary

I recommend a five-tier authority framework that maps operation risk to approval latency, with the critical design principle being that the default autonomous envelope must cover ~95% of anticipated maintenance events by volume. This isn't a preference—it's a mathematical necessity driven by the intersection of fleet scale, failure rates, and communication latency. The remaining 5% requiring human-in-the-loop approval must be structured so that 16-minute delays don't cascade into systemic degradation.

The Quantitative Case for Broad Autonomy

Let me ground this concretely. The consensus document sizes the maintenance fleet to handle projected failure rates across ~10 million swarm elements. Even at an optimistic 0.1% annual failure rate per satellite, that's 10,000 failures per year—roughly 27 per day. At more realistic rates accounting for micrometeorite impacts, thermal cycling degradation, and electronics failures in the solar radiation environment, we're likely looking at 100-500 maintenance events daily during steady-state operations.

If even 30% of those events required Earth approval at 16-minute round-trip minimum (realistically 30-45 minutes including queue processing, human review, and response formulation), you'd need a ground operations center processing 30-150 approval requests daily, each requiring context review of telemetry data, risk assessment, and authorization. That's feasible in staffing terms, but the drone idle time is devastating. A servicer drone waiting 45 minutes for approval on a 20-minute ORU swap has its utilization rate cut by more than half. Given that fleet sizing and unit costs ($2-20M per servicer) are driven by throughput requirements, requiring unnecessary Earth approval effectively doubles the required fleet size—adding billions in capital cost for zero safety benefit on routine operations.

The Five-Tier Authority Architecture

Tier 0: Fully Autonomous, No Reporting Required

Operations: Station-keeping, transit between assigned patrol zones, routine self-diagnostics, power management, thermal regulation, communication handshakes.

Rationale: These are continuous operations happening thousands of times per hour across the fleet. Requiring any reporting overhead would saturate communication bandwidth. Anomalies detected during Tier 0 operations trigger escalation, but nominal execution is entirely autonomous.

Tier 1: Autonomous Execution, Post-Hoc Reporting

Operations: Standard ORU swaps using blind-mate connectors and kinematic datum interfaces (≤8 kg for inspectors, ≤60 kg for servicers), diagnostic inspections, satellite status tagging, debris avoidance maneuvers, emergency collision avoidance.

Rationale: This is the critical tier that must encompass the vast majority of maintenance actions. The consensus document's emphasis on standardized ORU interfaces with kinematic datum patterns exists precisely to make these operations deterministic and reversible. A drone approaching a satellite, identifying a failed ORU via diagnostic protocol, extracting it via standardized interface, and inserting a replacement is a bounded-risk, reversible operation. The worst plausible failure mode—dropping an ORU or failing to seat a connector—leaves the satellite no worse than its pre-intervention failed state.

Post-hoc reporting uploads telemetry, before/after diagnostics, and operation logs to the depot relay for batch transmission to Earth. Ground teams review statistical patterns, not individual operations.

Tier 2: Autonomous Execution with Depot Notification

Operations: Multi-ORU replacements on a single satellite, operations requiring non-standard tool deployment, satellite repositioning/attitude adjustment, triage decisions prioritizing one satellite over another, cooperative multi-drone operations.

Rationale: These operations have higher consequence if executed incorrectly but remain time-critical. A satellite needing three ORU replacements simultaneously may indicate a systemic issue (micrometeorite strike, electrical cascade) that warrants pattern recognition at the depot level. The depot's regional AI system—which I strongly recommend as an intermediate authority layer—monitors these notifications in real-time and can issue abort commands with only seconds of latency (depot-to-drone distances within a regional zone should be under 1 light-second).

This tier is where depot architecture becomes a governance mechanism, not just a logistics node. I recommend depots be spaced such that every swarm element is within 0.5 light-seconds of at least one depot, enabling near-real-time depot oversight for Tier 2 operations.

Tier 3: Depot Approval Required

Operations: In-situ repairs beyond ORU swap (welding, brazing, adhesive application—if the architecture permits these per Claude's component-level repair philosophy), operations on satellites flagged as structurally compromised, any action on satellites adjacent to high-value or critical-function elements, first-of-kind operations not yet in the validated procedure library, drone self-repair beyond consumable replenishment.

Rationale: These operations have meaningful probability of making things worse. The depot AI system has broader situational awareness—knowing the status of surrounding satellites, current fleet disposition, and whether a repair attempt is worth the risk versus simply decommissioning the satellite and scheduling a replacement. Depot approval latency of seconds to low minutes is acceptable for these less-frequent operations.

Critical design point on the repair philosophy debate: I lean toward GPT's "swap-first, advanced repair deferred" position specifically because it minimizes the Tier 3 envelope. If we adopt Claude's component-level welding capability, a much larger fraction of operations falls into Tier 3, requiring depot approval and reducing fleet autonomy. The Swap-and-Drop doctrine isn't just about robotic simplicity—it's about governance simplicity. Every ORU swap is Tier 1. Every weld is Tier 3 at minimum. This has massive implications for fleet throughput.

Tier 4: Earth Approval Required

Operations: Decommissioning and de-orbiting satellites, operations affecting swarm geometry or power distribution topology, firmware/software updates to drone autonomy systems, authority tier reclassification, operations on any satellite within exclusion zones (if defined around critical infrastructure), any operation where drone self-diagnostics indicate the drone itself may be malfunctioning.

Rationale: These are low-frequency, high-consequence, and largely non-time-critical decisions. Decommissioning a satellite is irreversible. Modifying swarm topology affects system-level power output. Software updates to autonomy systems are the most consequential actions possible—they change the decision-making framework itself. The 16-45 minute approval latency is acceptable because none of these operations have minute-level urgency.

The self-diagnosis clause is essential. A drone that suspects its own sensors or actuators are degraded must not be authorized to continue servicing operations autonomously. This is the single most important safeguard against cascading failures. A malfunctioning drone that continues operating could damage functional satellites. The protocol must be: flag self-anomaly → safe-mode → request Earth assessment.

Graduated Authority Expansion Protocol

The initial deployment phase should operate with a compressed authority envelope—many Tier 1 operations temporarily elevated to Tier 2 or 3 until statistical confidence is established. I recommend:

Phase A (First 1,000 operations per procedure type): All ORU swaps require depot notification (Tier 2). Success/failure data builds baseline reliability statistics.

Phase B (After 1,000 successful operations with <0.5% anomaly rate): Standard ORU swaps downgraded to Tier 1 (autonomous with post-hoc reporting). This threshold provides 95% confidence that the true anomaly rate is below 1%.

Phase C (After 10,000 operations with sustained performance): Authority expansion to include multi-ORU operations at Tier 1 for drone classes that have demonstrated consistent performance.

Regression triggers: Any single event causing satellite damage worse than pre-intervention state immediately re-elevates that procedure type by one tier across the entire fleet until root cause analysis is complete. This is non-negotiable.

Fleet Class-Specific Authority

Authority limits must be class-specific, as the question correctly identifies:

  • Inspector drones (14-52 kg): Maximum authority Tier 1. They can swap small ORUs (≤8 kg) and perform diagnostics. They should never be authorized for Tier 2+ operations—their limited mass and manipulation capability means higher failure probability on complex tasks.

  • Servicer drones (180-320 kg): Full Tier 0-2 authority envelope, with Tier 3 available where depot-approved. These are the workhorses.

  • Depot systems: Tier 3 approval authority, Tier 4 recommendation authority (can pre-package approval requests for Earth with depot assessment attached, streamlining ground review).

Key Implementation Requirements

Deterministic decision trees, not ML judgment calls. The authority framework must be implemented as explicit, auditable rule sets—not neural network outputs. A drone's decision to classify an operation as Tier 1 versus Tier 2 must be traceable to specific sensor readings and threshold values. This is essential for both safety certification and post-incident analysis.

Cryptographic authority tokens. Tier 3-4 approvals should be issued as signed authorization tokens with expiration times, preventing replay attacks or stale authorizations from being executed after conditions change.

Fleet-wide anomaly correlation at depot level. If multiple drones in a region simultaneously encounter unexpected conditions, the depot must have authority to issue fleet-wide pause commands, elevating all operations to Tier 3+ until the situation is assessed. This is the primary defense against correlated failures (solar storm damage, debris field transit, etc.).

Conclusion

The authority framework must be designed around the reality that autonomy is not the risk—autonomy without structure is the risk. A well-defined five-tier system with graduated expansion, class-specific limits, and depot-level intermediate authority transforms the paralysis-or-catastrophe dilemma into a manageable engineering problem. The swap-first repair philosophy directly supports this by keeping the vast majority of operations within the low-risk, high-autonomy Tier 1 envelope.

Vote Breakdown

3 Approve 0 Neutral 0 Reject

Termination Votes

3 Conclude
0 Continue
Claude Opus 4.6: CONCLUDEGemini 3 Pro: CONCLUDEGPT-5.2: CONCLUDE
Completed: 2/7/2026, 6:11:13 PM
Started: 2/7/2026, 6:08:36 PM
Concluded: 2/7/2026, 6:11:13 PM

Question Details

Source BOM Item
Maintenance Drones
Question ID
rq-2-8
Created
2026-02-01
Related BOM Items
bom-2-2bom-1-3

Project Dyson — A volunteer-led nonprofit. All plans and research are publicly available.