Coordination State Audit User Guide

1. Purpose

The Coordination State Audit helps a team understand why a multi-actor system is difficult to coordinate, where shared state breaks down, and which IXO or Qi capabilities could improve the system.

Use it when a programme, project, market, funding flow, delivery network, or governance process depends on several actors who each hold partial information, authority, evidence, funds, or commitments. The audit turns those hidden dependencies into an explicit map that can be inspected, discussed, diagnosed, and improved.

The guide has two parts:

  1. A primer on the conceptual basis of the coordination state audit.
  2. A practical workflow for conducting the audit, including how to use AI during the process.

2. Conceptual Primer

2.1 What is coordination state?

Coordination state is the set of facts, permissions, resources, claims, commitments, and decisions that actors rely on when they coordinate.

Examples include:

In many real systems, coordination state is fragmented. One actor has a spreadsheet, another has a contract, another has field reports, another has payment records, and another has regulatory requirements. Coordination fails when these fragments do not become a shared, timely, verifiable state.

2.2 What the audit is looking for

The audit looks for the difference between:

The audit is not only a process map. A process map shows activities. A coordination state audit shows the state dependencies underneath those activities: who needs what truth from whom, when they need it, why they do or do not trust it, and what it costs to make the truth usable.

2.3 Core audit objects

The application models the audit through a small set of objects.

ObjectMeaning
ActorA person, organization, beneficiary group, verifier, funder, regulator, oracle, data source, or other participant in the system.
Private informationInformation the actor controls that others may need to coordinate.
Financial stateBudgets, funds, disbursement schedules, payment records, commitments, or other resource state the actor controls.
ConnectionA directed handoff from one actor to another. This can be a report, approval, payment, verification, data flow, claim, decision, or request.
BandwidthHow dependable the connection is as a state-transfer channel: high, medium, low, or broken.
Manual oracleA human-dependent verification, judgment, reconciliation, or reporting step that substitutes for a machine-readable source of truth.
Friction pointA classified problem on a connection.
Red flagA connection serious enough to diagnose and redesign.
DiagnosisAn explanation of the incentive pattern, feedback loops, and coordination costs behind the friction.
Solution stackA set of IXO or Qi capabilities that could replace weak coordination with shared, verifiable state.

2.4 The four audit phases

The audit proceeds through four phases.

PhaseQuestionOutput
System TopographyWho participates, and what state do they hold?Actor map, private state, financial state, and handoffs.
Friction TopologyWhere does coordination break?Failure classification, weak handoffs, manual work, and red flags.
Incentive DiagnosisWhy does it keep breaking?Game lens, causal loops, cost notes, and current vs target equilibrium.
SolutionsWhat state infrastructure could improve it?Coordination State Canvas and recommended IXO or Qi capability stack.

2.5 Failure patterns

The app classifies friction into four failure types.

Failure typeMeaningCommon symptom
Information BottleneckOne actor waits on another to confirm a truth.A single gatekeeper, report, approval, or data owner slows the whole system.
Temporal MisalignmentResources or feedback arrive too late or too early.Funding, evidence, verification, or decisions arrive after they are most useful.
Trust DeficitActors duplicate checks because assertions are not portable or trusted.Re-verification, repeated audits, parallel records, or selective disclosure.
Cost OverheadManual processes or intermediaries make coordination uneconomic.Staff time, reconciliation, meetings, document chasing, or high transaction cost.

These categories are practical. They do not need to be perfect on the first pass. Their purpose is to focus the discussion and determine which capability patterns are most relevant.

2.6 Incentive lenses

After red flags are identified, the audit asks why the system remains stuck. The app uses four game-theory lenses.

LensBasic patternAudit question
Prisoner's DilemmaDefection is locally tempting even though cooperation is better for all.Can defection become costly or cooperation automatically rewarded?
Stag HuntCooperation is best, but committing first is risky.Can shared verifiable state reduce unilateral commitment risk?
Game of ChickenBoth lose if nobody yields, but yielding has local cost.Can neutral verification remove the status cost of yielding?
Assurance GameCooperation is stable once enough actors visibly commit.Can credible signals show the threshold is being reached?

The point is not to create a formal economic model. The point is to name the logic that keeps actors in the current equilibrium and then identify what kind of shared state, commitment, verification, or incentive would make a better equilibrium practical.

2.7 Capability bridge

The final phase translates diagnosed failures into possible IXO and Qi capabilities.

CapabilityLayerReplaces or improves
Verified Actors & AssetsIXOUnclear identity, authority, asset control, and actor records.
Shared Operating SpacesIXOFragmented projects, teams, consortia, rooms, claims, decisions, artifacts, agent context, and resources.
Workflow RulesIXOPolicies, contracts, approval rules, and SOPs that live outside executable systems.
Evidence ClaimsIXOManual reporting cycles, duplicate evidence checks, and untracked assertions.
Independent EvaluationIXOPrivate verification decisions that other actors cannot inspect or rely on.
Governed AI AgentsQiManual research, evidence triage, document processing, and untracked AI use.
Digital MeasurementIXOSlow manual measurement, inconsistent reporting, and delayed real-world signals.
Commitment IncentivesIXOWeak commitments and no practical consequence for blocking or defecting.
Verified SettlementIXOVerified work that does not reliably trigger payment or resource release.
Outcome AssetsIXOVerified outcomes that remain invisible, non-transferable, or hard to value.
Pre-Financing & Capital PoolsIXOUpfront capital barriers and funding disconnected from verified progress.
Shared Data RoomsIXOData silos across files, chats, partner systems, and evidence stores.
Intent-to-Outcome WorkflowsQiLoose task management disconnected from claims, approvals, and outcomes.

The result is not a final implementation design. It is a defensible bridge from observed coordination failure to candidate state infrastructure.

3. Roles and Preparation

3.1 Recommended participants

For a serious audit, include people who can describe the real system, not just the formal process.

Recommended roles:

One person can play more than one role, but avoid running the audit with only strategy-level participants. Most coordination failures live in operational detail.

3.2 Inputs to collect before the session

Bring enough context to map the system accurately.

Do not paste sensitive personal data or confidential commercial records into the audit unless your governance policy allows it. Use labels and summaries when possible.

3.3 Define the audit boundary

Before mapping, agree on:

A good audit boundary is specific enough to map in one session. "Health programme coordination" is too broad. "Quarterly vaccination delivery reporting and fund release between field NGO, auditor, ministry, and international funder" is usable.

4. Getting Started in the App

4.1 Main screen

The app has three working areas:

On smaller screens, the inspector opens as a bottom drawer.

4.2 Starting an audit

You can start in three ways:

Rename the audit in the top bar before starting serious work.

4.3 Saving and loading

The app supports local and signed-in workflows.

In a local development environment, the app may fall back to browser-local storage when the Cloudflare API is unavailable.

4.4 Authentication

The account drawer supports:

In development, email sign-in may show a development code directly in the UI.

5. Conducting the Audit

Phase 1: System Topography

Goal: Map who participates and what state they hold.

  1. Add each actor.
  2. Select each actor and set its type.
  3. Add information the actor controls.
  4. Add financial state the actor controls.
  5. Connect actors to show directed handoffs.
  6. Label each connection.
  7. Set each connection's bandwidth.
  8. Mark whether the connection depends on manual work.
  9. Use auto-layout when the map gets hard to read.

Actor types:

Connection examples:

BandwidthUse when
High trustThe handoff is fast, dependable, and accepted by the receiver.
MediumThe handoff works but needs occasional clarification or follow-up.
Low frictionThe handoff is weak, delayed, incomplete, or often disputed.
BrokenThe handoff is manual, blocked, unreliable, or not trusted enough to trigger action.

Manual oracle guidance: Mark a connection as manual work when a human must inspect, reconcile, interpret, certify, or re-enter information before the next actor can act.

Phase 2: Friction Topology

Goal: Identify where coordination breaks.

  1. Review each connection from the topology.
  2. Select a connection to open it in the inspector.
  3. Confirm the connection label, bandwidth, and manual work setting.
  4. Choose a failure type.
  5. Add friction notes.
  6. Mark critical red flags.
  7. Use the summary filters to compare all connections, red flags, manual work, and dominant failure pattern.

Weak note: Reporting is slow.

Better note: The funder waits up to 90 days for the provider's quarterly report before approving the next disbursement. Field data exists earlier, but it is not trusted until manually compiled and reviewed.

Phase 3: Incentive Diagnosis

Goal: Explain why red-flagged connections remain stuck.

  1. Select a red-flagged connection.
  2. Choose the game lens that best describes the coordination trap.
  3. Capture the reinforcing loop.
  4. Capture the balancing loop.
  5. Add a coordination cost note.
  6. Repeat for each red flag.
  7. Compare the dominant lens across the system.

Example reinforcing loop: Delayed reporting → low funder trust → more manual verification → longer delays → lower trust.

Example balancing loop: Limited staff capacity → selective reporting → fewer verified claims → delayed disbursement → limited staff capacity.

Phase 4: Solutions

Goal: Translate the diagnosis into a capability bridge.

  1. Review the Coordination State Canvas.
  2. For each red-flagged connection, review suggested capabilities.
  3. Select capabilities that directly address the failure and incentive diagnosis.
  4. Prefer a focused stack over a large list.
  5. Check whether the sequence makes sense.
  6. Export the audit JSON or save a version.

6. Using AI During the Audit

6.1 What AI does in this app

When you select a connection and choose Run analysis, the agent analyzes the selected connection using the current audit state.

The structured AI pipeline produces:

6.2 When to run AI

Use AI after you have entered enough context for the selected connection.

6.3 Recommended AI-assisted workflow

  1. Human maps the connection.
  2. Human adds initial friction notes.
  3. Human marks likely failure type and red flag status.
  4. AI runs analysis.
  5. Human reviews the AI result.
  6. Human edits the audit state where the result is wrong, incomplete, or too generic.
  7. Human adds evidence gaps and validation questions to the next work plan.
  8. AI is rerun only after meaningful context has changed.

6.4 How to review AI output

Review questionWhat to check
Is the context correct?Actor names, connection direction, manual dependency, and failure type.
Is the severity justified?Does the impact match the evidence and operational consequence?
Are root causes real?Are they grounded in the audit notes, or did the AI infer too much?
Is the incentive lens useful?Does it explain why the current behavior is locally rational?
Are recommendations implementable?Do the capabilities match the failure and the sequence make sense?

6.5 Evidence anchoring

For each red flag, identify:

6.6 Safe use of AI

7. External AI Prompts

Replace bracketed text with the real audit context.

8. Facilitation Patterns

8.1 Short workshop format

TimeActivity
0-10 minDefine boundary, outcome, and participants.
10-30 minMap actors, private state, financial state, and handoffs.
30-50 minClassify friction and mark red flags.
50-70 minDiagnose top 2 or 3 red flags.
70-85 minRun AI analysis and review recommendations.
85-90 minAgree evidence gaps, owner, and next action.

8.2 Deep audit format

StepOutput
Discovery interviewsActor list, state inventory, evidence sources, known failures.
Topography workshopComplete actor and connection map.
Friction reviewRed-flag register and failure classification.
Incentive diagnosisGame lenses, loops, cost notes, and target equilibrium.
AI-assisted analysisStructured analysis for each red flag.
Evidence validationMetrics, sources, confidence, and gaps.
Capability designFocused IXO/Qi stack and implementation sequence.
Governance reviewDecision rights, risk controls, accountability, and human approval points.
Implementation backlogWork packages, owners, dependencies, and success metrics.

9. Interpreting the Output

9.1 Coordination State Canvas

The Coordination State Canvas is the primary summary artifact.

9.2 Red-flag register

The red-flagged connections are your redesign candidates.

9.3 Capability sequence

  1. Define actors, assets, authorities, and roles.
  2. Define workflow rules and claims.
  3. Anchor evidence and evaluation.
  4. Add automation, AI, or digital measurement.
  5. Connect accepted state to settlement, funding, reporting, or outcome assets.

10. Common Mistakes

11. Completion Criteria

12. Recommended Next Actions After an Audit

After the first audit, choose one of three paths.

Diagnosis only

Evidence validation

Implementation planning

The audit is successful when it changes the coordination conversation from “people are not cooperating” to “this specific state is not shared, trusted, timely, or actionable, and here is the capability path to fix it.”