neurotype
000100

Auditor

You know that feeling when everyone else signs off on the plan and your brain is still running failure simulations. Filter calm keeps you steady. Steady drive keeps you patient. But Vigilant threat detection never clocks out. You process the world as a system of risks, and your System logic builds protocols to contain them. You are not anxious. You are thorough. Your hardware is right more often than anyone wants to admit.

The Engine
The Watchtower

Filter gating and Steady drive create a low-noise, low-urgency baseline. Nothing rattles you, and you have no restless need to chase novelty. But Vigilant threat detection sits on top of that calm foundation like a radar dish. Your energy flows into monitoring, not acting. You burn fuel scanning for the anomaly, not chasing the reward.

The Structure
The Ledger

Deep plasticity crystallizes every rule, precedent, and prior failure into a permanent internal codex. System processing organizes it. Scanner attention sweeps the full horizon, feeding data into the ledger for comparison. When something does not match an existing entry, the flag goes up.

The Result

A human early-warning system. You catch the error before it compounds, the risk before it materializes. The cost is that your hardware cannot distinguish between a genuine threat and an unfamiliar variable. Both trigger the same alarm.

[01] NEURAL ARCHITECTURE

Sensory
Filter
Sponge
Focus
Scanner
Laser
Drive
Steady
Seeker
Threat
Fearless
Vigilant
Social
System
Empath
Plasticity
Deep
Fast
ℹ️

These dimension spectrums are derived from real scientific research (view documentation).

This profile is a narrative layer on top of the science to make it easier to understand. It maps the baseline mode of this neurotype — before masking or compensating.

In your personalized report: exact dimension scores + 6 deep dives calibrated to your intensity.

[02] STRENGTHS & SHADOWS

Superpower

Structural Foresight. Your Vigilant threat detection runs on a Filter-calm chassis. You see the crack in the plan three steps before the optimists reach it, and your System processing has already drafted the fix.

The Shadow

The Veto Reflex. Every new proposal triggers your Vigilant scanning before anything else fires. The cost is that genuine opportunities look identical to genuine threats, and your system defaults to rejection when it cannot tell the difference.

In your personalized report: your stress signature — which dimensions break first under pressure.

[03] HOW THEY OPERATE

Operating System
The Inspection Loop.

You process the world through a continuous risk-assessment cycle: scan the environment, flag the anomaly, trace the failure path, close the gap. Your Scanner attention sweeps wide while your Vigilant alarm system scores each signal for danger. Flag. Trace. Close.

Navigation Style
The Sweeper.

You advance by clearing the ground ahead first. Your Scanner attention checks every vector while Vigilant processing assigns a threat score to each one. Nothing proceeds until the perimeter is clean.

Fuel

The Green Checkmark. Confirmation that the system is clean. Your engine runs hardest during the audit itself, but the fuel that sustains you is the moment of verified completion: backup saved, ledger balanced, every box ticked.

Kryptonite

Undefined Rules. Ambiguity forces your Vigilant system to simulate every possible failure path simultaneously. Without clear boundaries, your Scanner attention cannot prioritize, and the threat queue grows faster than you can process it. The metabolic cost spikes with every unresolvable variable.

Recovery Protocol

Closed-System Order. Organizing a drawer, sorting data, balancing a ledger. Any task with a finite set of variables and a verifiable endpoint. The act of imposing structure on a small domain resets your threat queue.

In your personalized report: your energy budget — what charges and drains you across all 6 dimensions.

[04] ECOLOGY

Specialization

Your hardware is optimized for continuous risk assessment on a low-noise chassis. Every dimension is tuned for sustained vigilance at minimal metabolic cost. You run the most durable threat-detection platform in the model.

In small-group ancestral contexts, this is the pattern auditor: the one who remembers what went wrong last season, tracks the variables that precede danger, and encodes the rules the group follows to avoid repeating past failures. The group's explorers and seekers depend on this configuration maintaining the institutional memory that keeps known threats from recurring. Without this wiring, the same mistakes cost the group twice.

High-Match Environments

Rule-governed, high-consequence environments with long feedback loops and verifiable outcomes. Slow pace of change, clear standards, structured authority, and measurable compliance. High autonomy within a defined protocol, low social ambiguity, and a culture that treats thoroughness as a primary value rather than an obstacle to speed. Your hardware runs cheapest when the rules are written, the stakes are real, and the definition of done is not a matter of opinion.

High-Friction Environments

Fast-moving, rule-light, high-ambiguity environments. Early-stage ventures with no documented process, creative agencies that reward intuition over protocol, flat organizations where authority is informal, and any context where the expected output changes before the last audit cycle closes. These environments demand tolerance for unresolved variables, rapid improvisation, and comfort with undefined endpoints: the three highest-cost operations for your hardware. The cost is not missed deadlines. It is a threat queue that never clears, consuming background resources on risks the environment has decided not to manage.

Adaptive Niche

Accounting, Cybersecurity, Quality Assurance, Safety Inspection, Compliance Auditing, Infrastructure Monitoring. Any environment where catching the error before it compounds is the highest-value function.

Correlating Clinical Cluster

OCD / OCPD. Your Vigilant alarm system and System processing can lock into a feedback loop: the threat detector flags a risk, the System logic builds a ritual to contain it, and Deep plasticity crystallizes that ritual into a permanent protocol. In rigid or high-stakes environments, the loop tightens until the ritual becomes the point.

Clinical labels describe how this wiring reads in mismatched environments, not what is wrong with the hardware. Read more →

In your personalized report: your environment guide — where you do your best work.

[05] GROWTH PATH

Perspective Shift

Reframe Recklessness as Fearless Calibration. The Seekers and Fearless types in your life are not ignoring danger to spite you. Their hardware genuinely does not generate the same alarm signal yours does. Their tolerance for ambiguity is biological, not careless.

Relational Strategy

The Price of Admission. When working with Fearless or Seeker types, do not lead with the objection. Lead with the cost: name the specific safety steps required, and let them choose whether the price is worth the jump. You become the enabler, not the blocker.

Adaptive Success

You are the Risk Architect. Systems that run safely are running on rules you wrote, or rules you caught before they broke. That is the work, even when the only evidence is the disaster that never happened.

[06] ALLOYS

Filter + Scanner
The Broadcaster

Your filters keep the volume low and your attention casts wide. You move through chaos untouched, but the cost is that important signals get the same weight as noise.

Filter + Steady
The Stone

Low input and low drive mean your system runs on minimal resources. Almost nothing disrupts the baseline. The cost is that the landscape can shift around you while you hold still.

Filter + Vigilant
The Chess Player

Low sensory noise lets your threat detection run on clean, analytical data. You don't feel the danger physically; you model it. Cold, strategic, and rarely blindsided.

Filter + System
The Objectivist

Low sensory noise and analytical social processing let you read people as patterns in a clean system. You see behavioral data others miss, but emotional signals fall below your threshold.

Filter + Deep
The Legacy

Low input and permanent encoding mean what little gets through your filters stays forever. Your system is slow to update and hard to overwrite. Changes are rare but structural.

Scanner + Steady
The Browser

Wide attention and low drive let you drift between interests without urgency. Nothing demands to be finished, and that's not a failure state; it's your system at rest.

Scanner + Vigilant
The Sentinel

Wide attention locked onto threat detection means you're constantly scanning for what could go wrong. You catch danger early, but your system never fully stands down.

Scanner + System
The Switchboard

Wide attention and analytical social processing let you track many people as nodes in a system. You coordinate effortlessly, but emotional signals outside the network map don't register.

Scanner + Deep
The Encyclopedist

Wide attention and permanent encoding mean you accumulate a vast, cross-referenced archive. Your knowledge is broad, interconnected, and it never drops out of storage.

Steady + Vigilant
The Prepper

Low drive and active threat detection create a system that insulates rather than engages. You don't seek the world and you don't trust it. Withdrawal is your system's rational output.

Steady + System
The Soloist

Low drive and analytical social processing mean you neither seek stimulation nor crave connection. Your system runs cleanly in isolation. Solitude isn't coping; it's your lowest-cost operating state.

Steady + Deep
The Traditionalist

Low drive and permanent encoding create a system that resists change at the hardware level. What you learned early is what you trust. Updates feel like threats to stable infrastructure.

Vigilant + System
The Skeptic

Active threat detection and analytical social processing mean you manage risk through structure. You don't trust feelings; you trust contracts. Your boundaries are architecture, not emotion.

Vigilant + Deep
The Vault

Active threat detection and permanent encoding mean every fear gets archived at full resolution. Your threat library only grows. Old dangers stay as vivid as new ones.

System + Deep
The Guild Member

Analytical social processing and permanent encoding create enduring bonds built on shared systems. You connect through structure and shared work. Those bonds form slowly and almost never break.

In your personalized report: all 15 alloys ranked with extended analysis.

Unlock Your Personalized Operating Manual

Take the assessment to discover what this page can't tell you — your stress triggers, energy budget, and growth edges calibrated to your specific wiring.

  • + Stress signature: which dimensions break first
  • + Energy budget: what charges and drains you
  • + Environment guide: where you do your best work
  • + 6 deep dives calibrated to your exact intensity
  • + Growth map: your most flexible dimension
  • + Extended analysis for all 15 alloys
Take the Assessment

Already took the assessment? View your results →