You are the person with the backup plan for the backup plan. Filter calm means the environment does not rattle you. Steady drive means you are not chasing novelty. But your Vigilant threat detection is always running simulations, and your Fast plasticity rebuilds the model every time new data arrives. You scan the room not for excitement but for failure points. By the time the problem surfaces, you already have the contingency loaded.
Filter gating and Steady drive create a low-noise, low-urgency chassis. Vigilant threat detection runs continuously on top of that calm base, scoring every variable for risk. The engine is not reactive. It is predictive. You burn fuel simulating disasters that have not happened yet, so the response is ready before the trigger arrives.
Fast plasticity means your contingency trees are never static. New information arrives, and the model rewrites in seconds. System processing keeps the logic clean. Scanner attention holds multiple branches in view, comparing probabilities and pruning dead paths. A planning architecture that updates faster than the environment changes.
A walking contingency system. You are rarely surprised because your hardware has already rehearsed most scenarios. The cost is that the rehearsal never stops. Without a real problem to solve, the simulation engine will build fictional ones and run them with the same intensity.
These dimension spectrums are derived from real scientific research (view documentation).
This profile is a narrative layer on top of the science to make it easier to understand. It maps the baseline mode of this neurotype — before masking or compensating.
In your personalized report: exact dimension scores + 6 deep dives calibrated to your intensity.
Adaptive Contingency. Your Vigilant threat detection finds the failure point. Your Fast plasticity rewires the plan around it in real time. While others are still processing the bad news, you have already built Plan C.
The Phantom Crisis. Without a real problem to solve, your Vigilant alarm system and Fast rewiring will collaborate on imaginary ones. The threat detector flags a possibility, Fast plasticity builds a scenario around it, and the loop runs until the fictional crisis feels indistinguishable from a real one.
In your personalized report: your stress signature — which dimensions break first under pressure.
You process decisions through branching contingency trees. Your Scanner attention maps the variables, Vigilant processing scores each branch for risk, and Fast plasticity prunes and rebuilds the tree as new data arrives. If X, then Y. If Y fails, Z is already loaded.
You move by continuously updating your position. Your Scanner attention feeds new data to your Vigilant alarm system, and Fast plasticity rewrites the model before the old one is cold. You do not sit still because the situation never does.
The Live Problem. A real, solvable threat with clear variables. Your engine runs cleanest when Vigilant scanning has a genuine target and your Fast plasticity can build and test solutions against it. Competence under pressure is the reward signal.
Enforced Helplessness. Seeing the danger clearly but being denied permission to act. Your Vigilant system keeps generating threat data, your Fast plasticity keeps drafting solutions, and the inability to execute any of them creates a metabolic bottleneck that has nowhere to discharge.
Controlled Simulation. Strategy games, disaster-prep exercises, tabletop scenarios. Any closed system where you can run your contingency engine against a finite problem set with a verifiable outcome. The key is a controlled boundary: real enough to engage the wargame, contained enough to end.
In your personalized report: your energy budget — what charges and drains you across all 6 dimensions.
Your hardware is optimized for adaptive threat management in shifting conditions. Every dimension is tuned for sustained vigilance paired with rapid model revision. You run the fastest-updating risk-assessment platform in the model.
In small-group ancestral contexts, this is the tactical planner: the one who reads the changing landscape, updates the group's approach before conditions shift, and carries a fallback for every route. The group's anchors and specialists depend on this configuration keeping the plan current when the environment stops matching the last one. Without this wiring, the group follows yesterday's map into today's ambush.
Dynamic, high-stakes environments with clear variables and permission to act on threat data. Rapid information flow, structured decision authority, measurable consequences for inaction, and a culture that values preparedness over optimism. Short planning cycles, fast feedback on whether the contingency held, and autonomy to revise the approach without committee approval. Your hardware runs cheapest when the threat is real, the data is fresh, and the chain of command trusts your assessment.
Static, low-stakes, consensus-driven environments. Bureaucracies where action requires unanimous approval, stable industries with no competitive pressure, roles where the primary output is documentation rather than decision, and any context where raising a risk is treated as negativity rather than diligence. These environments demand patience with inaction, comfort with unacknowledged risk, and deference to process over outcome: the three highest-cost operations for your hardware. The cost is not disengagement. It is a planning engine running at full capacity with no authority to execute, burning fuel on contingencies that will never be deployed.
Logistics Planning, SysAdmin, Emergency Dispatch, Tactical Operations, Incident Response, Supply Chain Management. Any role where the plan must change faster than the problem does.
Generalized Anxiety Disorder (GAD). Your Vigilant alarm system and System processing build catastrophe models. Your Fast plasticity can generate new scenarios faster than your threat detector can close old ones. In low-structure environments, the queue of unresolved possibilities grows until the background hum becomes a constant state.
In your personalized report: your environment guide — where you do your best work.
Reframe Recklessness as Fearless Threshold. The Fearless types in your life are not blind to danger. Their alarm system simply requires stronger evidence before it fires. Their calm is not ignorance; it is a different calibration. Use it as a grounding signal when your own detector is running hot.
The Calibration Check. When your Vigilant system generates a catastrophe scenario, run it past a trusted partner before acting on it. Name the risk, state the probability you have assigned, and ask whether their math matches. External input breaks the loop before it spirals.
You are the Contingency Architect. When the real crisis lands, the plan is already loaded because you built it weeks ago. That is the work, even when the only proof is a disaster that resolved before anyone else noticed it was coming.
Your filters keep the volume low and your attention casts wide. You move through chaos untouched, but the cost is that important signals get the same weight as noise.
Low input and low drive mean your system runs on minimal resources. Almost nothing disrupts the baseline. The cost is that the landscape can shift around you while you hold still.
Low sensory noise lets your threat detection run on clean, analytical data. You don't feel the danger physically; you model it. Cold, strategic, and rarely blindsided.
Low sensory noise and analytical social processing let you read people as patterns in a clean system. You see behavioral data others miss, but emotional signals fall below your threshold.
Low input and fast adaptation mean almost nothing leaves a mark. You move through disruption without absorbing it. Your archive is clean where others carry scar tissue.
Wide attention and low drive let you drift between interests without urgency. Nothing demands to be finished, and that's not a failure state; it's your system at rest.
Wide attention locked onto threat detection means you're constantly scanning for what could go wrong. You catch danger early, but your system never fully stands down.
Wide attention and analytical social processing let you track many people as nodes in a system. You coordinate effortlessly, but emotional signals outside the network map don't register.
Wide attention and fast adaptation let you pick up the basics of anything quickly and move on. Your skills are broad, shallow, and exactly as deep as the moment required.
Low drive and active threat detection create a system that insulates rather than engages. You don't seek the world and you don't trust it. Withdrawal is your system's rational output.
Low drive and analytical social processing mean you neither seek stimulation nor crave connection. Your system runs cleanly in isolation. Solitude isn't coping; it's your lowest-cost operating state.
Low drive and fast adaptation let you move through a changing world without needing to steer it. You don't push; you adjust. Your system flows with whatever's happening around it.
Active threat detection and analytical social processing mean you manage risk through structure. You don't trust feelings; you trust contracts. Your boundaries are architecture, not emotion.
High threat reactivity and fast adaptation mean you startle easily and recover quickly. The alarm fires at low thresholds, but the signal clears fast. Jumpy on the surface, resilient underneath.
Analytical social processing and fast adaptation create project-based connections that dissolve cleanly. You bond through shared utility, and when the context ends, the bond releases without residue.
In your personalized report: all 15 alloys ranked with extended analysis.
Take the assessment to discover what this page can't tell you — your stress triggers, energy budget, and growth edges calibrated to your specific wiring.
Already took the assessment? View your results →