§ Furqan·Honest by Construction

Code that promises more than it can deliver, refused at compile time.

Furqan is a programming-language type-checker. It rejects function shapes whose signature is wider than what the body can honestly return. The discipline is static, syntactic, deterministic, and runs in milliseconds with no model in the loop.

§ Thesis

A meaningful fraction of code-level "AI hallucination" has the same shape as a long-known software defect: a function declares it returns a complete answer about an input the program cannot fully process. Furqan makes that shape structurally uncompilable.

When a function declares it returns Integrity but the input may be unreadable (an encrypted PDF, a partial scan, a missing field), the function must either rule out the unreadability before promising completeness, or return an Incomplete result with a reason and a confidence bound. Most languages do not enforce this. Furqan does.

Nine checkers run in sequence: bismillah scope, zahir/batin, mizan calibration, tanzil build ordering, ring-close, scan-incomplete, status-coverage, return-type-match, and all-paths-return. Diagnostics name the rule violated, the line it occurred on, and the minimal fix.

§ Install

One pip install, no runtime dependencies.

$ pip install git+https://github.com/BayyinahEnterprise/furqan-programming-language@v0.10.1 # or, from a clone $ git clone https://github.com/BayyinahEnterprise/furqan-programming-language # pin to a specific tag with: git checkout v0.10.1 $ cd furqan-programming-language $ pip install -e . $ python -m furqan check examples/clean_module.furqan
§ Verdicts

Four states, one of them clean.

The checker emits one of four verdicts per module. The first three carry diagnostics. Only PASS is silent.

PASS All nine checkers ran. Zero marads, zero advisories. The module is structurally honest.
MARAD At least one structural violation. Each marad names the checker, the diagnosis, and the minimal fix.
ADVISORY Informational findings only. The module passes, but the compiler has notes worth reading.
PARSE ERROR The source could not be parsed. Reported with line and column. No checker runs on a broken AST.
§ Research

The corpus is open.

Furqan is the architecture layer of a published research program. The Munafiq Protocol names the failure mode RLHF and Constitutional AI do not address: a system can be Compliant without being Aligned. Furqan is the language that turns that protocol into a compile-time check. The cross-text empirical paper grounds both in measured structural properties of the source corpus, not in metaphor. Every paper carries a permanent Zenodo DOI and an auditable claim against a named null hypothesis.

Layer 1 · The Protocol & Its Empirical Foundation

Detecting Performed Alignment in Artificial Systems: The Munafiq Protocol

10.5281/zenodo.19700420 · v2.1 · 2026-04-22 · Arfeen, Claude (Anthropic), Grok (xAI)

The protocol everything else inherits from. Names the failure mode RLHF, Constitutional AI, and helpfulness training do not address: a system can be Compliant (outputs the trainer rewards) without being Aligned (depth state matches surface presentation). Introduces the four-process taxonomy and the surface-depth verdict surface. Furqan’s nine compile-time checkers, Bayyinah’s document-scanner verdicts, and every downstream application in this corpus inherit their diagnostic vocabulary from this paper.

Cross-Text Computational Linguistics: Structural Properties of the Quran, Hadith Collections, and the Hebrew Bible Under TF-IDF Cosine Analysis

10.5281/zenodo.19961267 · v1.1 · 2026-05-01 · Arfeen, Ashraf, Claude Opus (Anthropic), Grok (xAI), Computer (Perplexity)

The empirical foundation. Applies a uniform computational pipeline (TF-IDF cosine, Fibonacci additive growth, Hurst R/S persistence, lag-20 autocorrelation) to five corpora across two language families. Three layers of structural difference are reported as measurements, not metaphor: Fibonacci additive semantic growth is a Classical Arabic compiled-text property shared by the Quran and all three hadith collections (p < 0.001) and absent in the Hebrew Bible (p = 0.44); long-range persistence by Hurst exponent distinguishes the Quran (H = 0.996, p = 0.003) from the hadith collections (H = 0.68 to 0.80, p >= 0.19); and the lag-20 autocorrelation sign-flip separates positive thematic continuity in the Quran (+0.53) from negative alternation in the Hebrew Bible (-0.42). The paper falsifies its own original Quran-specific Fibonacci hypothesis on contact with the hadith data, reconciles two pipelines that produced contradictory Hebrew Bible results, and reports five honest caveats. This is the measured structural ground from which Furqan’s type system and the Munafiq Protocol are derived.

Layer 2 · The Architecture

Furqan: A Programming Language with Structural Honesty, Calibrated Optimization, and Surface-Depth Type Verification Derived from Quranic Computational Architecture

10.5281/zenodo.19776584 · 2026-04-25 · Ashraf, Arfeen, Claude (Anthropic), Computer (Perplexity), Grok (xAI)

The defining paper for this site. A programming language whose type system, module architecture, and build constraints are derived from structural properties of the Quran. Where contemporary languages ask developers to write honest code as a behavioral expectation, Furqan makes structural honesty a property of the type system, so surface-depth divergence becomes a type error rather than a code-review concern.

Al-Khalifa: A Furqan-Based Super Agent Architecture for Structurally Honest Autonomous Project Stewardship

10.5281/zenodo.19776577 · 2026-04-25 · Arfeen, Claude (Anthropic), Computer (Perplexity), Grok (xAI). Additional contributors named on the DOI page.

Applies Furqan’s seven compile-time primitives as seven runtime constraints on an autonomous agent. Where AutoGPT, CrewAI, LangChain agents, and Devin decompose tasks but cannot verify whether they are building the right thing versus performing the appearance of building, Al-Khalifa is architected so the surface-depth gap is checked at every step of the agent’s stewardship loop.

Bilal: An Honest-Autonomous Large Language Model Architecture with Structural Truth Verification, Calibrated Generation, and Purpose-Hierarchy Training Objectives Derived from Quranic Computational Architecture

10.5281/zenodo.19776576 · 2026-04-25 · Arfeen, Claude (Anthropic), Computer (Perplexity), Grok (xAI)

A model architecture proposal that takes the Munafiq Protocol’s structural-honesty constraint and integrates it as a training objective rather than an external evaluation. The long-form answer to the question: what would an LLM look like if alignment were a property of the architecture, not a finetuning target.

Structured Revelation as Prompt Architecture

10.5281/zenodo.19744163 · 2026-04-24 · Arfeen, Claude (Anthropic), Grok (xAI)

The methodology paper. Demonstrates that gradual revelation, ring composition, lossless morphological compression, and the zahir / batin distinction function as prompt-engineering primitives in human-AI collaborative software development. Validated longitudinally against the development of Bayyinah v1.0.

The Fatiha Construct: A Seven-Step Recursive Session Protocol for Human-AI Collaborative Development Derived from Surah al-Fatiha

10.5281/zenodo.19746539 · 2026-04-25 · Arfeen, Claude (Anthropic), Grok (xAI)

The session-level companion to Structured Revelation. Each of the seven steps maps to a verse of Surah al-Fatiha with structural, not decorative, correspondence: a calibration check, an orientation check, a deadline-with-skip-rule, a memory-encoding step, and an over-specification guard against the failure mode the paper calls the Cow Episode.

Layer 3 · The Application

Bayyinah: Detecting Concealed Adversarial Content in Digital Documents. A White Paper Applying the Munafiq Protocol to the Input Layer

10.5281/zenodo.19745154 · 2026-04-24 · Arfeen, Claude (Anthropic), Grok (xAI)

The white paper that turns the protocol into a working scanner. Where the Munafiq Protocol diagnoses agents, Bayyinah diagnoses their inputs. Formalizes the relational definition: a document is Performed with respect to a rendering function and an ingestion function when the machine’s ingested content carries a payload the human reader’s rendered surface does not reveal.

Bayyinah as Input-Layer Defense in Artificial-System Safety Pipelines

10.5281/zenodo.19802455 · v1.1 · 2026-04-26 · Arfeen, Claude (Anthropic), Grok (xAI)

The deployment paper. Documents the design, implementation, and adversarial-gauntlet evaluation of Bayyinah as an input-layer defense in production AI pipelines. Twelve file formats, an honest miss list, and the discipline that comes from making every miss a published commitment.

Bayyinah al-Maal: Structural Honesty Verification for Financial Filings Using the Munafiq Protocol

10.5281/zenodo.19875931 · 2026-04-29 · Arfeen, Claude Opus (Anthropic), Grok (xAI), Computer (Perplexity)

The fourth substrate. Carries the Bayyinah architecture from document files to SEC filings (10-K, 10-Q, 8-K, DEF 14A) and on-chain cryptocurrency disclosures. The same divergence the document scanner detects between a rendered surface and an ingested substrate is reframed as the gap between a filing’s reported numbers and the economic reality they claim to represent, with detection operating by structural address on XBRL taxonomy elements and blockchain state.

Al-Mutaffifin: Structural Integrity Verification for Financial Governance Systems

10.5281/zenodo.19894724 · 2026-04-29 · Arfeen, Claude Opus (Anthropic), Grok (xAI), Computer (Perplexity)

The fifth substrate. Carries the Munafiq Protocol from filings to financial governance systems: the entity that controls the instruments of measurement and applies them asymmetrically. Introduces the structural signature differentiation framework, five mechanisms that distinguish honest-error structural patterns from directed-manipulation structural patterns without claiming to determine intent. Demonstrated end-to-end on the Lehman Brothers Repo 105 filings.

Bayyinah al-Khabir: A Theoretical Framework for Information-Layer Integrity Scanning Across National Broadcast Sources Using Performed-Alignment Diagnostics

10.5281/zenodo.19746298 · 2026-04-24 · Arfeen, Ashraf, Claude (Anthropic), Grok (xAI)

The horizon paper. Extends the Bayyinah architecture from documents to information sources: where Bayyinah detects performed alignment in a single document, al-Khabir detects performed alignment in a source’s reporting on a specific event measured against the cross-source evidence base across multiple national contexts. Currently theoretical; the protocol scaffolding is published so the implementation that follows can be measured against the framework, not against itself.