This document defines what it means to be Protocol-Commons compliant and how to assert and maintain that status over time.
These rules apply to:
- Schemas under
schemas/v*/commons/ - Shared primitives under
schemas/v*/_shared/ - Examples under
examples/v*/commons/
ENS TXT Summary
This document only summarizes TXT responsibilities.
The canonical definitions and enforcement rules are specified in:
SPEC.md(Protocol-Commons)
Compliance cannot override normative definitions in SPEC.md.
Compliance covers semantics and schema integrity only—identity bindings are governed by Agent-Cards.
For any directory schemas/vX.Y.Z/:
No in-place edits to:
- Request/receipt schemas
_sharedprimitives$idvalues- Normative behavior
Any semantic change requires:
- New version directory
- Updated CIDs + checksums
- Logged update in
RESOLUTION.md - Governance approval
Mutating a published version is not compliant.
All Protocol-Commons schemas MUST:
- Use JSON Schema Draft 2020-12
- Validate under Ajv strict mode
- Use deterministic HTTPS-resolvable
$idvalues matching SPEC.md - Enforce verb-specific input + receipt contract
Loose validation or altered $id resolution is not compliant.
Each release MUST:
- Pin the entire version folder to IPFS
- Provide SHA-256 checksums
- Publish
manifest.json
Compliance requires:
cl.cid.schemasresolves to the correct CID- IPFS mirrors match HTTP mirrors exactly
Consumers SHOULD verify checksums.txt against the published schema
artifacts prior to use.
Automated resolvers and runtimes MUST verify checksums as part of canonical compliance, and MUST reject mismatches.
Mismatch = integrity failure
Schemas are semantic infrastructure, not application output.
Therefore:
- No PII
- No secrets or private routing data
- No execution logic
Security incidents MUST follow SECURITY.md.
Every canonical change MUST be reflected in:
RESOLUTION.md(what + why + who)SECURITY_PROVENANCE.md(CIDs + checksums)
An artifact without a governance trail is not canonical.
Commons-compliant implementations SHOULD:
- Support ERC-8004 discovery where relevant
- Enforce canonical x402 envelope + trace rules
Divergence is allowed — but compliance claims then MUST NOT be made.
If a deviation is found:
- File an Issue (or follow
SECURITY.mdif sensitive) - Describe affected version and impact
- Steward determines whether to publish a corrected version
- Changes documented in
RESOLUTION.md
You may claim Protocol-Commons compliant if:
- Strict Ajv validation enforced
- Version directories treated as immutable
$idURLs resolve correctly- CIDs and checksums match content
- Changes logged and signed
- ENS TXT duties respected per SPEC.md
If uncertain → treat the implementation as experimental.