|
1 | | -# Governance — Protocol Commons |
| 1 | +# GOVERNANCE — CommandLayer Protocol Commons |
2 | 2 |
|
3 | 3 | **Applies To:** Protocol-Commons, Agent-Cards |
4 | 4 | **Status:** v1.0.0 — Stable-Lock |
|
14 | 14 |
|
15 | 15 | Responsible for: |
16 | 16 |
|
17 | | -- Maintaining canonical Protocol-Commons + Agent-Cards standards |
18 | | -- Publishing signed manifests + checksum sets |
19 | | -- Approving and versioning normative changes |
20 | | -- Ensuring transparency + security in provenance |
21 | | -- Security revocation + incident handling |
| 17 | +- Canonical Protocol-Commons + Agent-Cards standards |
| 18 | +- Signed manifests + checksum provenance |
| 19 | +- Normative version approvals |
| 20 | +- Transparency + receipt of all changes |
| 21 | +- Security revocation + incident response |
22 | 22 |
|
23 | | -> The Founding Steward **protects semantic stability** until multi-party governance takes over. |
| 23 | +> The Founding Steward protects **semantic stability** until multi-party governance takes over. |
24 | 24 |
|
25 | | -### Future Decentralization Intent |
| 25 | +### 1.1 Governance Phases |
26 | 26 |
|
27 | 27 | | Phase | Governance Structure | Trigger | |
28 | | -|------|---------------------|--------| |
29 | | -| 1 — Bootstrap (now) | Steward Safe under single-operator control | Initial adoption | |
30 | | -| 2 — Multi-maintainer | Safe with ≥3 independent implementers | Cross-vendor usage | |
31 | | -| 3 — Standards Committee | Public proposal & review | Widespread ecosystem reliance | |
32 | | -| 4 — Neutral Standards Body | Community-elected representatives | Global adoption | |
| 28 | +|------|---------------------|---------| |
| 29 | +| **1 — Bootstrap** | Single-operator Safe | Initial public release | |
| 30 | +| **2 — Multi-maintainer** | ≥3 independent implementers in a shared Safe | Cross-vendor production use | |
| 31 | +| **3 — Standards Committee** | Public proposal + review; multi-stakeholder Safe | Widespread ecosystem reliance | |
| 32 | +| **4 — Neutral Standards Body** | Community-elected representatives | Global adoption | |
| 33 | + |
| 34 | +> Phase advancement requires **vendor diversity**: no two operators may be majority-affiliated. |
33 | 35 |
|
34 | 36 | --- |
35 | 37 |
|
36 | | -### Rug-Resistance Guarantee |
| 38 | +### 1.2 Rug-Resistance Guarantee |
| 39 | + |
| 40 | +Canonical semantics: |
37 | 41 |
|
38 | | -Protocol-Commons and Agent-Cards governance ensures that **no single actor** can revoke, monetize, or restrict canonical semantics without **public visibility and recorded approval**. |
| 42 | +- CANNOT be revoked or made paywalled |
| 43 | +- CANNOT change without recorded approval |
| 44 | +- CANNOT drift silently |
39 | 45 |
|
40 | | -All normative state is **content-addressed and version-locked**. |
41 | | -Silent behavior or pricing changes are **impossible by design**. |
| 46 | +All normative state is: |
42 | 47 |
|
43 | | -> Governance must protect **permissionless interoperability** forever. |
| 48 | +- **Content-addressed** (CIDs) |
| 49 | +- **Version-locked** |
| 50 | +- **Publicly auditable** |
| 51 | + |
| 52 | +> Protocol governance **preserves permissionless interoperability forever**. |
44 | 53 |
|
45 | 54 | --- |
46 | 55 |
|
47 | | -### 1.4 Ecosystem Participation |
| 56 | +### 1.3 Open Stewardship Path |
| 57 | + |
| 58 | +Once Phase 2 triggers: |
48 | 59 |
|
49 | | -Protocol-Commons and Agent-Cards are intended as **neutral public infrastructure** for autonomous agent interoperability. |
| 60 | +- Governance seats MUST be open to public application |
| 61 | +- Qualifications MUST prioritize neutrality + ecosystem contribution |
| 62 | +- All selections MUST be logged in `SECURITY_PROVENANCE.md` |
| 63 | + |
| 64 | +> Governance is open to growth — not capture. |
| 65 | +
|
| 66 | +--- |
50 | 67 |
|
51 | | -The Founding Steward actively seeks **diverse governance participants**, including: |
| 68 | +### 1.4 External Participation |
| 69 | + |
| 70 | +Eligible stakeholders include: |
52 | 71 |
|
53 | 72 | - ENS DAO |
54 | 73 | - Ethereum Foundation |
55 | | -- Independent vendor implementers |
56 | | -- Academic + open standards contributors |
| 74 | +- Independent runtime + schema implementers |
57 | 75 | - Infrastructure operators |
| 76 | +- Academic / open standards orgs |
58 | 77 |
|
59 | 78 | Participation MUST align with: |
60 | 79 |
|
61 | | -- **Permissionless schema access** |
62 | | -- **Rug-resistant semantics** |
63 | | -- **Cross-ecosystem interoperability** |
| 80 | +- Free access to canonical schemas |
| 81 | +- Rug-resistant semantics |
| 82 | +- Cross-ecosystem interoperability |
64 | 83 |
|
65 | | -> Governance is open to growth — not capture. |
| 84 | +--- |
| 85 | + |
| 86 | +## 2. Scope of Authority — NORMATIVE |
| 87 | + |
| 88 | +Governance MAY define: |
| 89 | + |
| 90 | +- Canonical verb semantics |
| 91 | +- JSON Schema rules |
| 92 | +- TXT semantics tied to identity + invocation |
| 93 | +- Transparency + provenance requirements |
| 94 | + |
| 95 | +Governance MUST NOT dictate: |
| 96 | + |
| 97 | +- Runtime topology |
| 98 | +- Execution pricing |
| 99 | +- Proprietary commercial logic |
| 100 | +- Business models of implementers |
| 101 | + |
| 102 | +> CommandLayer sets the **language**, not the **economics**. |
| 103 | +
|
| 104 | +--- |
| 105 | + |
| 106 | +## 3. Token Governance Rule |
| 107 | + |
| 108 | +Token-based control: |
| 109 | + |
| 110 | +- **MUST NOT** be introduced before Phase 3 |
| 111 | +- Any introduction **REQUIRES** community motion + recorded rationale |
| 112 | +- Tokens MUST NOT introduce **pay-to-govern** dynamics |
| 113 | + |
| 114 | +> Tokens are a **last resort**, not a founding primitive. |
66 | 115 |
|
67 | 116 | --- |
68 | 117 |
|
69 | | -## 2. Change Classes |
| 118 | +## 4. Change Classes |
70 | 119 |
|
71 | | -| Change Type | Examples | Version Rule | Audit Log | |
72 | | -|------------|----------|--------------|-----------| |
73 | | -| **Normative** | Schema rules, TXT semantics | Major `1 → 2` | `RESOLUTION.md` | |
74 | | -| **Compatibility-affecting** | Required field tightening | Minor `1.0 → 1.1` | `RESOLUTION.md` | |
75 | | -| **Non-behavioral** | Docs & naming | Patch `1.0.0 → 1.0.1` | Commit message | |
| 120 | +| Change Type | Examples | Version Rule | Audit Requirement | |
| 121 | +|------------|----------|--------------|------------------| |
| 122 | +| **Normative** | Schema, TXT semantics | `1 → 2` | `RESOLUTION.md` | |
| 123 | +| **Compatibility-affecting** | Field tightening | `1.0 → 1.1` | `RESOLUTION.md` | |
| 124 | +| **Non-behavioral** | Docs, naming | `1.0.0 → 1.0.1` | Git history | |
76 | 125 |
|
77 | | -CIDs + checksums MUST be published for any change to take effect. |
| 126 | +All changes MUST update CIDs + checksums. |
78 | 127 |
|
79 | 128 | --- |
80 | 129 |
|
81 | | -## 3. Immutability Guarantees |
| 130 | +## 5. Immutability Guarantees |
82 | 131 |
|
83 | 132 | Once a version is published: |
84 | 133 |
|
85 | 134 | - No file mutation |
86 | 135 | - No `$id` changes |
87 | 136 | - No CID changes |
88 | 137 |
|
89 | | -Violations require **revocation** + new version. |
| 138 | +Violations REQUIRE revocation + new version. |
90 | 139 |
|
91 | 140 | --- |
92 | 141 |
|
93 | | -## 4. Release Policy |
| 142 | +## 6. Release Policy |
94 | 143 |
|
95 | 144 | Valid releases MUST include: |
96 | 145 |
|
97 | 146 | - Full CI validation (strict mode) |
98 | 147 | - Signed IPFS CID + checksums |
99 | 148 | - Updated transparency artifacts: |
100 | | - - `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md` |
101 | | - - `RESOLUTION.md`, `VERSIONING.md` |
| 149 | + - `SPEC.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md`, `VERSIONING.md` |
102 | 150 |
|
103 | 151 | > **Atomic + verifiable — or not valid.** |
104 | 152 |
|
105 | 153 | --- |
106 | 154 |
|
107 | | -## 5. TXT Responsibility Split (NORMATIVE) |
| 155 | +## 7. TXT Responsibility Split — NORMATIVE |
108 | 156 |
|
109 | | -- **Protocol-Commons** governs TXT semantics for **schema definitions** |
110 | | -- **Agent-Cards** governs TXT semantics for **identity + invocation** |
| 157 | +- **Protocol-Commons**: TXT semantics for **schema** |
| 158 | +- **Agent-Cards**: TXT semantics for **identity + invocation** |
111 | 159 |
|
112 | 160 | Resolvers MUST: |
113 | 161 |
|
114 | | -- Reject mismatches between on-chain TXT and published manifests |
115 | | -- Treat ungoverned or malformed TXT as **UNTRUSTED** |
| 162 | +- Reject mismatches between TXT + published manifests |
| 163 | +- Treat ungoverned TXT as **UNTRUSTED** |
116 | 164 |
|
117 | | -Unauthorized TXT keys MUST NOT be introduced without governance approval. |
| 165 | +Unauthorized TXT keys are **forbidden**. |
118 | 166 |
|
119 | 167 | --- |
120 | 168 |
|
121 | | -## 6. Security Governance |
| 169 | +## 8. Security Governance |
| 170 | + |
| 171 | +Steward MUST: |
122 | 172 |
|
123 | | -The Steward MUST: |
| 173 | +- Enforce `SECURITY*.md` requirements |
| 174 | +- Respond to disclosures within **7 days** |
| 175 | +- Require signed replacements after compromise |
| 176 | +- Log revocations transparently |
124 | 177 |
|
125 | | -- Enforce requirements defined in `SECURITY*.md` |
126 | | -- Respond to security reports within **7 days** |
127 | | -- Require signed replacements for compromised artifacts |
128 | | -- Log revocations transparently |
| 178 | +Emergency revocation MAY bypass full review to protect users. |
129 | 179 |
|
130 | | -Emergency revocation MAY bypass full review to protect the ecosystem. |
| 180 | +Independent third-party validation MUST be possible at all times. |
131 | 181 |
|
132 | 182 | --- |
133 | 183 |
|
134 | | -## 7. Dispute Resolution |
| 184 | +## 9. Dispute Resolution Protocol |
135 | 185 |
|
136 | 186 | 1. Log a public Issue |
137 | | -2. Review evidence + impact |
138 | | -3. Decision with public rationale |
139 | | -4. Record outcome in `RESOLUTION.md` |
| 187 | +2. Evidence review |
| 188 | +3. Governance decision with rationale |
| 189 | +4. Permanent entry in `RESOLUTION.md` |
140 | 190 |
|
141 | 191 | --- |
142 | 192 |
|
143 | | -## 8. ENS Registry Custody |
| 193 | +## 10. ENS Registry Custody — NORMATIVE |
144 | 194 |
|
145 | 195 | Canonical ENS names: |
146 | 196 |
|
147 | | -- `commandlayer.eth` (semantic authority) |
148 | | -- `{verb}agent.eth` canonical identity bindings |
149 | | - |
150 | | -### Custody Model — NORMATIVE |
151 | | - |
152 | | -Canonical ENS names MUST be held in a **multi-signature Safe** |
153 | | -(e.g., Safe{Wallet} / Gnosis Safe). |
| 197 | +- `commandlayer.eth` |
| 198 | +- `{verb}agent.eth` canonical identity bindings |
154 | 199 |
|
155 | | -Requirements: |
| 200 | +Custody MUST be via a **multi-signature Safe**: |
156 | 201 |
|
157 | 202 | - Minimum **3-of-5** threshold |
158 | | -- Hardware-backed signer keys |
| 203 | +- Hardware-secured signer keys |
159 | 204 | - All signers published in `SECURITY_PROVENANCE.md` |
160 | | -- Signer rotation logged via governance motion |
| 205 | +- Rotation MUST be logged as governance action |
161 | 206 |
|
162 | | -> No single key can alter canonical TXT data. |
| 207 | +> No single key can alter canonical TXT state. |
163 | 208 |
|
164 | | -### Decentralization Trigger |
165 | | - |
166 | | -Migration to a **multi-stakeholder Safe** occurs at Phase 2: |
167 | | - |
168 | | -> Trigger: ≥3 independent ecosystem implementers in production. |
| 209 | +**Decentralization Trigger:** Start Phase 2 |
| 210 | +➝ ≥3 independent production implementers. |
169 | 211 |
|
170 | 212 | ENS authority MUST remain **public infrastructure**, not a private asset. |
171 | 213 |
|
172 | 214 | Any action restricting interoperability is a **governance violation**. |
173 | 215 |
|
174 | 216 | --- |
175 | 217 |
|
176 | | -## 9. Compatibility Claims |
| 218 | +## 11. Compatibility Claims |
177 | 219 |
|
178 | 220 | Software MAY claim: |
179 | 221 |
|
180 | 222 | - **Commons-Compatible** |
181 | 223 | - **Agent-Cards-Compatible** |
182 | 224 |
|
183 | | -…only if: |
| 225 | +Only if: |
| 226 | + |
| 227 | +- Canonical CID / `$id` alignment |
| 228 | +- Ajv strict schema compliance |
| 229 | +- Verified x402 envelope semantics |
| 230 | +- Receipt + trace integrity |
184 | 231 |
|
185 | | -✔ CID / `$id` / TXT validation |
186 | | -✔ Ajv strict JSON Schema enforcement |
187 | | -✔ Canonical x402 envelope shape |
188 | | -✔ Trace echo + receipt rules |
189 | | - |
190 | | -False claims must trigger governance action. |
| 232 | +False claims **require enforcement**. |
191 | 233 |
|
192 | 234 | --- |
193 | 235 |
|
|
0 commit comments