Skip to content

Commit b43db24

Browse files
authored
Update GOVERNANCE.md
1 parent a056da1 commit b43db24

File tree

1 file changed

+111
-40
lines changed

1 file changed

+111
-40
lines changed

GOVERNANCE.md

Lines changed: 111 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -14,109 +14,180 @@
1414

1515
Responsible for:
1616

17-
- Maintaining canonical Protocol-Commons + Agent-Cards standards
18-
- Publishing signed manifest + checksum sets
19-
- Approving and versioning normative changes
20-
- Ensuring transparency + security in provenance
21-
- Security revocation + incident handling
17+
- Maintaining canonical Protocol-Commons + Agent-Cards standards
18+
- Publishing signed manifests + checksum sets
19+
- Approving and versioning normative changes
20+
- Ensuring transparency + security in provenance
21+
- Security revocation + incident handling
2222

23-
> The Founding Steward **protects protocol stability** until broader stewardship is in place.
23+
> The Founding Steward **protects semantic stability** until multi-party governance takes over.
2424
2525
### Future Decentralization Intent
2626

2727
| Phase | Governance Structure | Trigger |
2828
|------|---------------------|--------|
29-
| 1 — Bootstrap (now) | Single steward | Initial adoption |
30-
| 2 — Multi-maintainer | ≥3 independent implementers | Cross-vendor usage |
31-
| 3 — Standards Committee | Formal proposal & review | Widespread ecosystem reliance |
29+
| 1 — Bootstrap (now) | Steward Safe under single-operator control | Initial adoption |
30+
| 2 — Multi-maintainer | Safe with ≥3 independent implementers | Cross-vendor usage |
31+
| 3 — Standards Committee | Public proposal & review | Widespread ecosystem reliance |
3232
| 4 — Neutral Standards Body | Community-elected representatives | Global adoption |
3333

3434
---
3535

36+
### Rug-Resistance Guarantee
37+
38+
Protocol-Commons and Agent-Cards governance ensures that **no single actor** can revoke, monetize, or restrict canonical semantics without **public visibility and recorded approval**.
39+
40+
All normative state is **content-addressed and version-locked**.
41+
Silent behavior or pricing changes are **impossible by design**.
42+
43+
> Governance must protect **permissionless interoperability** forever.
44+
45+
---
46+
47+
### 1.4 Ecosystem Participation
48+
49+
Protocol-Commons and Agent-Cards are intended as **neutral public infrastructure** for autonomous agent interoperability.
50+
51+
The Founding Steward actively seeks **diverse governance participants**, including:
52+
53+
- ENS DAO
54+
- Ethereum Foundation
55+
- Independent vendor implementers
56+
- Academic + open standards contributors
57+
- Infrastructure operators
58+
59+
Participation MUST align with:
60+
61+
- **Permissionless schema access**
62+
- **Rug-resistant semantics**
63+
- **Cross-ecosystem interoperability**
64+
65+
> Governance is open to growth — not capture.
66+
67+
---
68+
3669
## 2. Change Classes
3770

3871
| Change Type | Examples | Version Rule | Audit Log |
3972
|------------|----------|--------------|-----------|
40-
| **Normative** | Schema rules, TXT semantics | Major: `1 → 2` | `RESOLUTION.md` |
41-
| **Compatibility-affecting** | Required field tightening | Minor: `1.0 → 1.1` | `RESOLUTION.md` |
42-
| **Non-behavioral** | Docs, naming | Patch: `1.0.0 → 1.0.1` | Commit message |
73+
| **Normative** | Schema rules, TXT semantics | Major `1 → 2` | `RESOLUTION.md` |
74+
| **Compatibility-affecting** | Required field tightening | Minor `1.0 → 1.1` | `RESOLUTION.md` |
75+
| **Non-behavioral** | Docs & naming | Patch `1.0.0 → 1.0.1` | Commit message |
4376

44-
CIDs + checksums MUST be published for changes to become effective.
77+
CIDs + checksums MUST be published for any change to take effect.
4578

4679
---
4780

4881
## 3. Immutability Guarantees
4982

5083
Once a version is published:
5184

52-
- No file mutation
53-
- No `$id` or CID changes
85+
- No file mutation
86+
- No `$id` changes
87+
- No CID changes
5488

55-
Violations require revocation + new version.
89+
Violations require **revocation** + new version.
5690

5791
---
5892

5993
## 4. Release Policy
6094

61-
Every release MUST include:
95+
Valid releases MUST include:
6296

63-
- Strict validation via CI
64-
- Signed IPFS CID + checksums
65-
- Transparency artifacts updated **together**:
66-
- `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md`, `VERSIONING.md`
97+
- Full CI validation (strict mode)
98+
- Signed IPFS CID + checksums
99+
- Updated transparency artifacts:
100+
- `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md`
101+
- `RESOLUTION.md`, `VERSIONING.md`
67102

68-
**Atomic and verifiable — or not valid.**
103+
> **Atomic + verifiable — or not valid.**
69104
70105
---
71106

72107
## 5. TXT Responsibility Split (NORMATIVE)
73108

74-
- **Protocol-Commons** governs TXT keys that resolve **schema semantics**
75-
- **Agent-Cards** governs TXT keys that bind **identity + invocation**
109+
- **Protocol-Commons** governs TXT semantics for **schema definitions**
110+
- **Agent-Cards** governs TXT semantics for **identity + invocation**
111+
112+
Resolvers MUST:
76113

77-
If a TXT field is not explicitly assigned here, it MUST NOT be introduced without governance approval.
114+
- Reject mismatches between on-chain TXT and published manifests
115+
- Treat ungoverned or malformed TXT as **UNTRUSTED**
78116

79-
Resolvers MUST treat TXT contract violations as **UNTRUSTED** bindings.
117+
Unauthorized TXT keys MUST NOT be introduced without governance approval.
80118

81119
---
82120

83121
## 6. Security Governance
84122

85-
Responsibilities:
123+
The Steward MUST:
86124

87-
- Enforce requirements under `SECURITY*.md`
125+
- Enforce requirements defined in `SECURITY*.md`
88126
- Respond to security reports within **7 days**
89127
- Require signed replacements for compromised artifacts
90128
- Log revocations transparently
91129

92-
Emergency revocation MAY bypass full review if required to protect the ecosystem.
130+
Emergency revocation MAY bypass full review to protect the ecosystem.
93131

94132
---
95133

96134
## 7. Dispute Resolution
97135

98-
1. Log an Issue publicly
99-
2. Review evidence + ecosystem impact
100-
3. Render decision with public comment
101-
4. Log outcome in `RESOLUTION.md`
136+
1. Log a public Issue
137+
2. Review evidence + impact
138+
3. Decision with public rationale
139+
4. Record outcome in `RESOLUTION.md`
102140

103141
---
104142

105-
## 8. Compatibility Claims
143+
## 8. ENS Registry Custody
144+
145+
Canonical ENS names:
146+
147+
- `commandlayer.eth` (semantic authority)
148+
- `{verb}agent.eth` canonical identity bindings
149+
150+
### Custody Model — NORMATIVE
151+
152+
Canonical ENS names MUST be held in a **multi-signature Safe**
153+
(e.g., Safe{Wallet} / Gnosis Safe).
154+
155+
Requirements:
156+
157+
- Minimum **3-of-5** threshold
158+
- Hardware-backed signer keys
159+
- All signers published in `SECURITY_PROVENANCE.md`
160+
- Signer rotation logged via governance motion
161+
162+
> No single key can alter canonical TXT data.
163+
164+
### Decentralization Trigger
165+
166+
Migration to a **multi-stakeholder Safe** occurs at Phase 2:
167+
168+
> Trigger: ≥3 independent ecosystem implementers in production.
169+
170+
ENS authority MUST remain **public infrastructure**, not a private asset.
171+
172+
Any action restricting interoperability is a **governance violation**.
173+
174+
---
175+
176+
## 9. Compatibility Claims
106177

107178
Software MAY claim:
108179

109180
- **Commons-Compatible**
110181
- **Agent-Cards-Compatible**
111182

112-
…only with:
183+
…only if:
113184

114-
Schema/CID/TXT validation
185+
✔ CID / `$id` / TXT validation
115186
✔ Ajv strict JSON Schema enforcement
116-
✔ Canonical x402 entry format
117-
✔ Trace echo + status rules enforced
118-
119-
False claims are governance violations.
187+
✔ Canonical x402 envelope shape
188+
✔ Trace echo + receipt rules
189+
190+
False claims must trigger governance action.
120191

121192
---
122193

0 commit comments

Comments
 (0)