|
14 | 14 |
|
15 | 15 | Responsible for: |
16 | 16 |
|
17 | | -- Maintaining canonical Protocol-Commons + Agent-Cards standards |
18 | | -- Publishing signed manifest + checksum sets |
19 | | -- Approving and versioning normative changes |
20 | | -- Ensuring transparency + security in provenance |
21 | | -- Security revocation + incident handling |
| 17 | +- Maintaining canonical Protocol-Commons + Agent-Cards standards |
| 18 | +- Publishing signed manifests + checksum sets |
| 19 | +- Approving and versioning normative changes |
| 20 | +- Ensuring transparency + security in provenance |
| 21 | +- Security revocation + incident handling |
22 | 22 |
|
23 | | -> The Founding Steward **protects protocol stability** until broader stewardship is in place. |
| 23 | +> The Founding Steward **protects semantic stability** until multi-party governance takes over. |
24 | 24 |
|
25 | 25 | ### Future Decentralization Intent |
26 | 26 |
|
27 | 27 | | Phase | Governance Structure | Trigger | |
28 | 28 | |------|---------------------|--------| |
29 | | -| 1 — Bootstrap (now) | Single steward | Initial adoption | |
30 | | -| 2 — Multi-maintainer | ≥3 independent implementers | Cross-vendor usage | |
31 | | -| 3 — Standards Committee | Formal proposal & review | Widespread ecosystem reliance | |
| 29 | +| 1 — Bootstrap (now) | Steward Safe under single-operator control | Initial adoption | |
| 30 | +| 2 — Multi-maintainer | Safe with ≥3 independent implementers | Cross-vendor usage | |
| 31 | +| 3 — Standards Committee | Public proposal & review | Widespread ecosystem reliance | |
32 | 32 | | 4 — Neutral Standards Body | Community-elected representatives | Global adoption | |
33 | 33 |
|
34 | 34 | --- |
35 | 35 |
|
| 36 | +### Rug-Resistance Guarantee |
| 37 | + |
| 38 | +Protocol-Commons and Agent-Cards governance ensures that **no single actor** can revoke, monetize, or restrict canonical semantics without **public visibility and recorded approval**. |
| 39 | + |
| 40 | +All normative state is **content-addressed and version-locked**. |
| 41 | +Silent behavior or pricing changes are **impossible by design**. |
| 42 | + |
| 43 | +> Governance must protect **permissionless interoperability** forever. |
| 44 | +
|
| 45 | +--- |
| 46 | + |
| 47 | +### 1.4 Ecosystem Participation |
| 48 | + |
| 49 | +Protocol-Commons and Agent-Cards are intended as **neutral public infrastructure** for autonomous agent interoperability. |
| 50 | + |
| 51 | +The Founding Steward actively seeks **diverse governance participants**, including: |
| 52 | + |
| 53 | +- ENS DAO |
| 54 | +- Ethereum Foundation |
| 55 | +- Independent vendor implementers |
| 56 | +- Academic + open standards contributors |
| 57 | +- Infrastructure operators |
| 58 | + |
| 59 | +Participation MUST align with: |
| 60 | + |
| 61 | +- **Permissionless schema access** |
| 62 | +- **Rug-resistant semantics** |
| 63 | +- **Cross-ecosystem interoperability** |
| 64 | + |
| 65 | +> Governance is open to growth — not capture. |
| 66 | +
|
| 67 | +--- |
| 68 | + |
36 | 69 | ## 2. Change Classes |
37 | 70 |
|
38 | 71 | | Change Type | Examples | Version Rule | Audit Log | |
39 | 72 | |------------|----------|--------------|-----------| |
40 | | -| **Normative** | Schema rules, TXT semantics | Major: `1 → 2` | `RESOLUTION.md` | |
41 | | -| **Compatibility-affecting** | Required field tightening | Minor: `1.0 → 1.1` | `RESOLUTION.md` | |
42 | | -| **Non-behavioral** | Docs, naming | Patch: `1.0.0 → 1.0.1` | Commit message | |
| 73 | +| **Normative** | Schema rules, TXT semantics | Major `1 → 2` | `RESOLUTION.md` | |
| 74 | +| **Compatibility-affecting** | Required field tightening | Minor `1.0 → 1.1` | `RESOLUTION.md` | |
| 75 | +| **Non-behavioral** | Docs & naming | Patch `1.0.0 → 1.0.1` | Commit message | |
43 | 76 |
|
44 | | -CIDs + checksums MUST be published for changes to become effective. |
| 77 | +CIDs + checksums MUST be published for any change to take effect. |
45 | 78 |
|
46 | 79 | --- |
47 | 80 |
|
48 | 81 | ## 3. Immutability Guarantees |
49 | 82 |
|
50 | 83 | Once a version is published: |
51 | 84 |
|
52 | | -- No file mutation |
53 | | -- No `$id` or CID changes |
| 85 | +- No file mutation |
| 86 | +- No `$id` changes |
| 87 | +- No CID changes |
54 | 88 |
|
55 | | -Violations require revocation + new version. |
| 89 | +Violations require **revocation** + new version. |
56 | 90 |
|
57 | 91 | --- |
58 | 92 |
|
59 | 93 | ## 4. Release Policy |
60 | 94 |
|
61 | | -Every release MUST include: |
| 95 | +Valid releases MUST include: |
62 | 96 |
|
63 | | -- Strict validation via CI |
64 | | -- Signed IPFS CID + checksums |
65 | | -- Transparency artifacts updated **together**: |
66 | | - - `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md`, `VERSIONING.md` |
| 97 | +- Full CI validation (strict mode) |
| 98 | +- Signed IPFS CID + checksums |
| 99 | +- Updated transparency artifacts: |
| 100 | + - `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md` |
| 101 | + - `RESOLUTION.md`, `VERSIONING.md` |
67 | 102 |
|
68 | | -**Atomic and verifiable — or not valid.** |
| 103 | +> **Atomic + verifiable — or not valid.** |
69 | 104 |
|
70 | 105 | --- |
71 | 106 |
|
72 | 107 | ## 5. TXT Responsibility Split (NORMATIVE) |
73 | 108 |
|
74 | | -- **Protocol-Commons** governs TXT keys that resolve **schema semantics** |
75 | | -- **Agent-Cards** governs TXT keys that bind **identity + invocation** |
| 109 | +- **Protocol-Commons** governs TXT semantics for **schema definitions** |
| 110 | +- **Agent-Cards** governs TXT semantics for **identity + invocation** |
| 111 | + |
| 112 | +Resolvers MUST: |
76 | 113 |
|
77 | | -If a TXT field is not explicitly assigned here, it MUST NOT be introduced without governance approval. |
| 114 | +- Reject mismatches between on-chain TXT and published manifests |
| 115 | +- Treat ungoverned or malformed TXT as **UNTRUSTED** |
78 | 116 |
|
79 | | -Resolvers MUST treat TXT contract violations as **UNTRUSTED** bindings. |
| 117 | +Unauthorized TXT keys MUST NOT be introduced without governance approval. |
80 | 118 |
|
81 | 119 | --- |
82 | 120 |
|
83 | 121 | ## 6. Security Governance |
84 | 122 |
|
85 | | -Responsibilities: |
| 123 | +The Steward MUST: |
86 | 124 |
|
87 | | -- Enforce requirements under `SECURITY*.md` |
| 125 | +- Enforce requirements defined in `SECURITY*.md` |
88 | 126 | - Respond to security reports within **7 days** |
89 | 127 | - Require signed replacements for compromised artifacts |
90 | 128 | - Log revocations transparently |
91 | 129 |
|
92 | | -Emergency revocation MAY bypass full review if required to protect the ecosystem. |
| 130 | +Emergency revocation MAY bypass full review to protect the ecosystem. |
93 | 131 |
|
94 | 132 | --- |
95 | 133 |
|
96 | 134 | ## 7. Dispute Resolution |
97 | 135 |
|
98 | | -1. Log an Issue publicly |
99 | | -2. Review evidence + ecosystem impact |
100 | | -3. Render decision with public comment |
101 | | -4. Log outcome in `RESOLUTION.md` |
| 136 | +1. Log a public Issue |
| 137 | +2. Review evidence + impact |
| 138 | +3. Decision with public rationale |
| 139 | +4. Record outcome in `RESOLUTION.md` |
102 | 140 |
|
103 | 141 | --- |
104 | 142 |
|
105 | | -## 8. Compatibility Claims |
| 143 | +## 8. ENS Registry Custody |
| 144 | + |
| 145 | +Canonical ENS names: |
| 146 | + |
| 147 | +- `commandlayer.eth` (semantic authority) |
| 148 | +- `{verb}agent.eth` canonical identity bindings |
| 149 | + |
| 150 | +### Custody Model — NORMATIVE |
| 151 | + |
| 152 | +Canonical ENS names MUST be held in a **multi-signature Safe** |
| 153 | +(e.g., Safe{Wallet} / Gnosis Safe). |
| 154 | + |
| 155 | +Requirements: |
| 156 | + |
| 157 | +- Minimum **3-of-5** threshold |
| 158 | +- Hardware-backed signer keys |
| 159 | +- All signers published in `SECURITY_PROVENANCE.md` |
| 160 | +- Signer rotation logged via governance motion |
| 161 | + |
| 162 | +> No single key can alter canonical TXT data. |
| 163 | +
|
| 164 | +### Decentralization Trigger |
| 165 | + |
| 166 | +Migration to a **multi-stakeholder Safe** occurs at Phase 2: |
| 167 | + |
| 168 | +> Trigger: ≥3 independent ecosystem implementers in production. |
| 169 | +
|
| 170 | +ENS authority MUST remain **public infrastructure**, not a private asset. |
| 171 | + |
| 172 | +Any action restricting interoperability is a **governance violation**. |
| 173 | + |
| 174 | +--- |
| 175 | + |
| 176 | +## 9. Compatibility Claims |
106 | 177 |
|
107 | 178 | Software MAY claim: |
108 | 179 |
|
109 | 180 | - **Commons-Compatible** |
110 | 181 | - **Agent-Cards-Compatible** |
111 | 182 |
|
112 | | -…only with: |
| 183 | +…only if: |
113 | 184 |
|
114 | | -✔ Schema/CID/TXT validation |
| 185 | +✔ CID / `$id` / TXT validation |
115 | 186 | ✔ Ajv strict JSON Schema enforcement |
116 | | -✔ Canonical x402 entry format |
117 | | -✔ Trace echo + status rules enforced |
118 | | - |
119 | | -False claims are governance violations. |
| 187 | +✔ Canonical x402 envelope shape |
| 188 | +✔ Trace echo + receipt rules |
| 189 | + |
| 190 | +False claims must trigger governance action. |
120 | 191 |
|
121 | 192 | --- |
122 | 193 |
|
|
0 commit comments