You notice the thing no one else notices. The hum of a failing bulb, the misaligned margin on page forty-seven, the faint smell that means something is off. Your Sponge sensitivity absorbs every detail in the room, your Scanner attention sweeps across all of them simultaneously, and your Vigilant threat detection flags anything that deviates from the stored template. You do not choose to notice. Your hardware does not give you the option.
Sponge input and Vigilant threat detection feed each other in a continuous loop. Every new sensory detail is routed through the threat filter, and every anomaly generates a low-level alert. Your Steady drive keeps the engine idling at a constant hum rather than spiking and crashing; the cost is that the alert state never fully resolves. You are always monitoring.
Your Scanner attention distributes processing across the full environment while your System cognition builds categorical rules for how things should be. Deep plasticity stores every past error, every confirmed threat, every resolved anomaly in a template that never gets cleared. The template grows more detailed over time, which means you catch more, but the comparison process costs more with every addition.
A person who makes the environment safer, cleaner, and more precise for everyone in it, at the cost of never being fully at rest. You carry the sensory debt of a system that was built to detect, not to relax.
These dimension spectrums are derived from real scientific research (view documentation).
This profile is a narrative layer on top of the science to make it easier to understand. It maps the baseline mode of this neurotype — before masking or compensating.
In your personalized report: exact dimension scores + 6 deep dives calibrated to your intensity.
Defect Detection. Your Sponge sensitivity absorbs every detail in the room while your Vigilant threat system flags the one that does not belong. You find the fault before it becomes a failure.
The Permanent Watch. Your alarm system never fully powers down. Sponge input feeds Vigilant scanning around the clock, and the metabolic cost of sustained high-resolution threat monitoring accumulates as chronic tension, fatigue, and sensory debt.
In your personalized report: your stress signature — which dimensions break first under pressure.
You receive raw sensory data, match it against a stored template of how things should be, and flag every deviation. Your System processing builds the template; your Deep plasticity never lets it go. Detect. Compare. Correct.
You move through a space the way a beam moves across a grid. Your Scanner attention checks every zone, your Sponge sensitivity reads the texture of each one, and your Vigilant system catalogues what needs fixing.
The Clean Sweep. The moment every item is in its place, every deviation is resolved, and the environment matches the internal template. Your Steady drive does not need novelty. It needs confirmation that the perimeter is secure.
Uncontrolled Entropy. Clutter, ambient noise, and unpredictable social input force your Sponge sensitivity into overload while your Vigilant system generates threat flags faster than your Scanner attention can process them. The queue backs up. The cost is not annoyance; it is genuine system strain.
Closed-Loop Restoration. Cleaning, sorting, or any repetitive, low-stimulus task that gives your Scanner attention a narrow, predictable channel and lets your Vigilant system confirm that everything is in order.
In your personalized report: your energy budget — what charges and drains you across all 6 dimensions.
Your hardware is optimized for high-resolution environmental monitoring with permanent deviation storage. Every sensory channel is open, every anomaly is flagged, and every confirmed pattern is written into a template that never degrades. You carry the most thorough quality-control architecture in the model.
In small-group ancestral contexts, this is the perimeter inspector: the one who walks the boundary, checks every seal, and remembers every past breach. The group's builders and risk-takers depend on this configuration catching what they miss. You are not the one who designs the structure or leads the expedition. You are the reason the structure holds and the expedition does not walk into the same trap twice.
Controlled, rule-governed environments with measurable standards and high consequences for undetected error. Slow pace of change, clear criteria for pass/fail, long time horizons, low social demand, high autonomy within a defined inspection scope. Roles where thoroughness is rewarded and nothing ships without sign-off. Your hardware runs cheapest when the environment holds still long enough for your template to match it and the cost of missing a defect is higher than the cost of checking twice.
Chaotic, fast-changing, socially improvisational environments. Open-plan offices with constant interruption, brainstorming sessions with no agenda, roles requiring rapid emotional negotiation, and contexts where standards shift weekly. These environments demand fast rewiring, high ambiguity tolerance, and social fluency through felt resonance: the three highest-cost operations for your hardware. The cost is not rigidity. It is a precision instrument being asked to operate in conditions that exceed its designed noise tolerance.
Quality Assurance, Safety Inspection, Copy Editing, Security Monitoring, Lab Technician, Forensic Accounting. Any role where catching the single flaw in a thousand data points is the entire job.
SPD / OCD (Checking Subtype). When Sponge sensitivity floods the system with raw data and Vigilant processing treats every anomaly as a potential threat, the resulting loop of detect-verify-correct can present as compulsive checking. This is not a broken system. It is a high-resolution threat scanner operating in an environment with more noise than signal.
In your personalized report: your environment guide — where you do your best work.
Reframe Carelessness as Filtered Calibration. People with Filter sensitivity are not being negligent. Their hardware genuinely does not register the sensory data that overwhelms yours. Their tolerance for disorder is not laziness; it is a different gating threshold.
The Buffer Zone. Designate one physical space that meets your sensory standards completely, and grant yourself permission to keep it that way. Outside that space, practice treating deviations as data rather than threats. A Steward or Anchor who respects the boundary of your clean zone without needing to understand it makes a reliable long-term partner.
You are the Final Gate. You catch the flaw that would have passed every other checkpoint. That is the work, even when the people you protect never learn how close they came.
Your senses take in everything and your attention tries to track all of it. You catch every signal in the room, but your system burns through bandwidth fast.
High sensory cost and low drive make withdrawal the most rational strategy your system has. The world is expensive to process and the rewards don't offset the price.
High sensory input feeds directly into an active threat system. The world registers as loud and dangerous, and your resting processing cost is higher than most people's crisis mode.
You absorb every social signal but run it through logic instead of feeling. You see more interpersonal data than anyone in the room; you just process it through a different system.
You absorb everything at full resolution and encode it permanently. Old pains stay vivid. Old joys stay accessible. Your archive is the richest and heaviest in the room.
Wide attention and low drive let you drift between interests without urgency. Nothing demands to be finished, and that's not a failure state; it's your system at rest.
Wide attention locked onto threat detection means you're constantly scanning for what could go wrong. You catch danger early, but your system never fully stands down.
Wide attention and analytical social processing let you track many people as nodes in a system. You coordinate effortlessly, but emotional signals outside the network map don't register.
Wide attention and permanent encoding mean you accumulate a vast, cross-referenced archive. Your knowledge is broad, interconnected, and it never drops out of storage.
Low drive and active threat detection create a system that insulates rather than engages. You don't seek the world and you don't trust it. Withdrawal is your system's rational output.
Low drive and analytical social processing mean you neither seek stimulation nor crave connection. Your system runs cleanly in isolation. Solitude isn't coping; it's your lowest-cost operating state.
Low drive and permanent encoding create a system that resists change at the hardware level. What you learned early is what you trust. Updates feel like threats to stable infrastructure.
Active threat detection and analytical social processing mean you manage risk through structure. You don't trust feelings; you trust contracts. Your boundaries are architecture, not emotion.
Active threat detection and permanent encoding mean every fear gets archived at full resolution. Your threat library only grows. Old dangers stay as vivid as new ones.
Analytical social processing and permanent encoding create enduring bonds built on shared systems. You connect through structure and shared work. Those bonds form slowly and almost never break.
In your personalized report: all 15 alloys ranked with extended analysis.
Take the assessment to discover what this page can't tell you — your stress triggers, energy budget, and growth edges calibrated to your specific wiring.
Already took the assessment? View your results →