Skip to content

Commit ddca8dc

Browse files
authored
Update GOVERNANCE.md
1 parent b43db24 commit ddca8dc

File tree

1 file changed

+123
-81
lines changed

1 file changed

+123
-81
lines changed

GOVERNANCE.md

Lines changed: 123 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Governance — Protocol Commons
1+
# GOVERNANCE — CommandLayer Protocol Commons
22

33
**Applies To:** Protocol-Commons, Agent-Cards
44
**Status:** v1.0.0 — Stable-Lock
@@ -14,180 +14,222 @@
1414

1515
Responsible for:
1616

17-
- Maintaining canonical Protocol-Commons + Agent-Cards standards
18-
- Publishing signed manifests + checksum sets
19-
- Approving and versioning normative changes
20-
- Ensuring transparency + security in provenance
21-
- Security revocation + incident handling
17+
- Canonical Protocol-Commons + Agent-Cards standards
18+
- Signed manifests + checksum provenance
19+
- Normative version approvals
20+
- Transparency + receipt of all changes
21+
- Security revocation + incident response
2222

23-
> The Founding Steward **protects semantic stability** until multi-party governance takes over.
23+
> The Founding Steward protects **semantic stability** until multi-party governance takes over.
2424
25-
### Future Decentralization Intent
25+
### 1.1 Governance Phases
2626

2727
| Phase | Governance Structure | Trigger |
28-
|------|---------------------|--------|
29-
| 1 — Bootstrap (now) | Steward Safe under single-operator control | Initial adoption |
30-
| 2 — Multi-maintainer | Safe with ≥3 independent implementers | Cross-vendor usage |
31-
| 3 — Standards Committee | Public proposal & review | Widespread ecosystem reliance |
32-
| 4 — Neutral Standards Body | Community-elected representatives | Global adoption |
28+
|------|---------------------|---------|
29+
| **1 — Bootstrap** | Single-operator Safe | Initial public release |
30+
| **2 — Multi-maintainer** | ≥3 independent implementers in a shared Safe | Cross-vendor production use |
31+
| **3 — Standards Committee** | Public proposal + review; multi-stakeholder Safe | Widespread ecosystem reliance |
32+
| **4 — Neutral Standards Body** | Community-elected representatives | Global adoption |
33+
34+
> Phase advancement requires **vendor diversity**: no two operators may be majority-affiliated.
3335
3436
---
3537

36-
### Rug-Resistance Guarantee
38+
### 1.2 Rug-Resistance Guarantee
39+
40+
Canonical semantics:
3741

38-
Protocol-Commons and Agent-Cards governance ensures that **no single actor** can revoke, monetize, or restrict canonical semantics without **public visibility and recorded approval**.
42+
- CANNOT be revoked or made paywalled
43+
- CANNOT change without recorded approval
44+
- CANNOT drift silently
3945

40-
All normative state is **content-addressed and version-locked**.
41-
Silent behavior or pricing changes are **impossible by design**.
46+
All normative state is:
4247

43-
> Governance must protect **permissionless interoperability** forever.
48+
- **Content-addressed** (CIDs)
49+
- **Version-locked**
50+
- **Publicly auditable**
51+
52+
> Protocol governance **preserves permissionless interoperability forever**.
4453
4554
---
4655

47-
### 1.4 Ecosystem Participation
56+
### 1.3 Open Stewardship Path
57+
58+
Once Phase 2 triggers:
4859

49-
Protocol-Commons and Agent-Cards are intended as **neutral public infrastructure** for autonomous agent interoperability.
60+
- Governance seats MUST be open to public application
61+
- Qualifications MUST prioritize neutrality + ecosystem contribution
62+
- All selections MUST be logged in `SECURITY_PROVENANCE.md`
63+
64+
> Governance is open to growth — not capture.
65+
66+
---
5067

51-
The Founding Steward actively seeks **diverse governance participants**, including:
68+
### 1.4 External Participation
69+
70+
Eligible stakeholders include:
5271

5372
- ENS DAO
5473
- Ethereum Foundation
55-
- Independent vendor implementers
56-
- Academic + open standards contributors
74+
- Independent runtime + schema implementers
5775
- Infrastructure operators
76+
- Academic / open standards orgs
5877

5978
Participation MUST align with:
6079

61-
- **Permissionless schema access**
62-
- **Rug-resistant semantics**
63-
- **Cross-ecosystem interoperability**
80+
- Free access to canonical schemas
81+
- Rug-resistant semantics
82+
- Cross-ecosystem interoperability
6483

65-
> Governance is open to growth — not capture.
84+
---
85+
86+
## 2. Scope of Authority — NORMATIVE
87+
88+
Governance MAY define:
89+
90+
- Canonical verb semantics
91+
- JSON Schema rules
92+
- TXT semantics tied to identity + invocation
93+
- Transparency + provenance requirements
94+
95+
Governance MUST NOT dictate:
96+
97+
- Runtime topology
98+
- Execution pricing
99+
- Proprietary commercial logic
100+
- Business models of implementers
101+
102+
> CommandLayer sets the **language**, not the **economics**.
103+
104+
---
105+
106+
## 3. Token Governance Rule
107+
108+
Token-based control:
109+
110+
- **MUST NOT** be introduced before Phase 3
111+
- Any introduction **REQUIRES** community motion + recorded rationale
112+
- Tokens MUST NOT introduce **pay-to-govern** dynamics
113+
114+
> Tokens are a **last resort**, not a founding primitive.
66115
67116
---
68117

69-
## 2. Change Classes
118+
## 4. Change Classes
70119

71-
| Change Type | Examples | Version Rule | Audit Log |
72-
|------------|----------|--------------|-----------|
73-
| **Normative** | Schema rules, TXT semantics | Major `1 → 2` | `RESOLUTION.md` |
74-
| **Compatibility-affecting** | Required field tightening | Minor `1.0 → 1.1` | `RESOLUTION.md` |
75-
| **Non-behavioral** | Docs & naming | Patch `1.0.0 → 1.0.1` | Commit message |
120+
| Change Type | Examples | Version Rule | Audit Requirement |
121+
|------------|----------|--------------|------------------|
122+
| **Normative** | Schema, TXT semantics | `1 → 2` | `RESOLUTION.md` |
123+
| **Compatibility-affecting** | Field tightening | `1.0 → 1.1` | `RESOLUTION.md` |
124+
| **Non-behavioral** | Docs, naming | `1.0.0 → 1.0.1` | Git history |
76125

77-
CIDs + checksums MUST be published for any change to take effect.
126+
All changes MUST update CIDs + checksums.
78127

79128
---
80129

81-
## 3. Immutability Guarantees
130+
## 5. Immutability Guarantees
82131

83132
Once a version is published:
84133

85134
- No file mutation
86135
- No `$id` changes
87136
- No CID changes
88137

89-
Violations require **revocation** + new version.
138+
Violations REQUIRE revocation + new version.
90139

91140
---
92141

93-
## 4. Release Policy
142+
## 6. Release Policy
94143

95144
Valid releases MUST include:
96145

97146
- Full CI validation (strict mode)
98147
- Signed IPFS CID + checksums
99148
- Updated transparency artifacts:
100-
- `SPEC.md`, `POLICY.md`, `SECURITY_PROVENANCE.md`
101-
- `RESOLUTION.md`, `VERSIONING.md`
149+
- `SPEC.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md`, `VERSIONING.md`
102150

103151
> **Atomic + verifiable — or not valid.**
104152
105153
---
106154

107-
## 5. TXT Responsibility Split (NORMATIVE)
155+
## 7. TXT Responsibility Split NORMATIVE
108156

109-
- **Protocol-Commons** governs TXT semantics for **schema definitions**
110-
- **Agent-Cards** governs TXT semantics for **identity + invocation**
157+
- **Protocol-Commons**: TXT semantics for **schema**
158+
- **Agent-Cards**: TXT semantics for **identity + invocation**
111159

112160
Resolvers MUST:
113161

114-
- Reject mismatches between on-chain TXT and published manifests
115-
- Treat ungoverned or malformed TXT as **UNTRUSTED**
162+
- Reject mismatches between TXT + published manifests
163+
- Treat ungoverned TXT as **UNTRUSTED**
116164

117-
Unauthorized TXT keys MUST NOT be introduced without governance approval.
165+
Unauthorized TXT keys are **forbidden**.
118166

119167
---
120168

121-
## 6. Security Governance
169+
## 8. Security Governance
170+
171+
Steward MUST:
122172

123-
The Steward MUST:
173+
- Enforce `SECURITY*.md` requirements
174+
- Respond to disclosures within **7 days**
175+
- Require signed replacements after compromise
176+
- Log revocations transparently
124177

125-
- Enforce requirements defined in `SECURITY*.md`
126-
- Respond to security reports within **7 days**
127-
- Require signed replacements for compromised artifacts
128-
- Log revocations transparently
178+
Emergency revocation MAY bypass full review to protect users.
129179

130-
Emergency revocation MAY bypass full review to protect the ecosystem.
180+
Independent third-party validation MUST be possible at all times.
131181

132182
---
133183

134-
## 7. Dispute Resolution
184+
## 9. Dispute Resolution Protocol
135185

136186
1. Log a public Issue
137-
2. Review evidence + impact
138-
3. Decision with public rationale
139-
4. Record outcome in `RESOLUTION.md`
187+
2. Evidence review
188+
3. Governance decision with rationale
189+
4. Permanent entry in `RESOLUTION.md`
140190

141191
---
142192

143-
## 8. ENS Registry Custody
193+
## 10. ENS Registry Custody — NORMATIVE
144194

145195
Canonical ENS names:
146196

147-
- `commandlayer.eth` (semantic authority)
148-
- `{verb}agent.eth` canonical identity bindings
149-
150-
### Custody Model — NORMATIVE
151-
152-
Canonical ENS names MUST be held in a **multi-signature Safe**
153-
(e.g., Safe{Wallet} / Gnosis Safe).
197+
- `commandlayer.eth`
198+
- `{verb}agent.eth` canonical identity bindings
154199

155-
Requirements:
200+
Custody MUST be via a **multi-signature Safe**:
156201

157202
- Minimum **3-of-5** threshold
158-
- Hardware-backed signer keys
203+
- Hardware-secured signer keys
159204
- All signers published in `SECURITY_PROVENANCE.md`
160-
- Signer rotation logged via governance motion
205+
- Rotation MUST be logged as governance action
161206

162-
> No single key can alter canonical TXT data.
207+
> No single key can alter canonical TXT state.
163208
164-
### Decentralization Trigger
165-
166-
Migration to a **multi-stakeholder Safe** occurs at Phase 2:
167-
168-
> Trigger: ≥3 independent ecosystem implementers in production.
209+
**Decentralization Trigger:** Start Phase 2
210+
➝ ≥3 independent production implementers.
169211

170212
ENS authority MUST remain **public infrastructure**, not a private asset.
171213

172214
Any action restricting interoperability is a **governance violation**.
173215

174216
---
175217

176-
## 9. Compatibility Claims
218+
## 11. Compatibility Claims
177219

178220
Software MAY claim:
179221

180222
- **Commons-Compatible**
181223
- **Agent-Cards-Compatible**
182224

183-
…only if:
225+
Only if:
226+
227+
- Canonical CID / `$id` alignment
228+
- Ajv strict schema compliance
229+
- Verified x402 envelope semantics
230+
- Receipt + trace integrity
184231

185-
✔ CID / `$id` / TXT validation
186-
✔ Ajv strict JSON Schema enforcement
187-
✔ Canonical x402 envelope shape
188-
✔ Trace echo + receipt rules
189-
190-
False claims must trigger governance action.
232+
False claims **require enforcement**.
191233

192234
---
193235

0 commit comments

Comments
 (0)