|
1 | | -# GOVERNANCE — CommandLayer Protocol |
| 1 | +# GOVERNANCE — Protocol-Commons (CommandLayer) |
2 | 2 |
|
3 | | -**Applies To:** Protocol-Commons, Protocol-Commercial, Agent-Cards |
| 3 | +**Scope:** Protocol-Commons (primary), Agent-Cards (identity bindings) |
4 | 4 | **Status:** v1.0.0 — Stable-Lock |
5 | 5 |
|
6 | | -> This document is **NORMATIVE, ENFORCEABLE, AND PERMANENT**. |
7 | | -> Governance is custodial today and **designed to decentralize** over time. |
| 6 | +> This governance is **NORMATIVE, ENFORCEABLE, AND PERMANENT**. |
| 7 | +> Control is custodial today and **designed to decentralize** as adoption grows. |
8 | 8 |
|
9 | 9 | --- |
10 | 10 |
|
11 | | -## 1. Stewardship Model |
| 11 | +## 1. Mandate of Commons Governance |
12 | 12 |
|
13 | | -**Founding Steward:** `commandlayer.eth` |
| 13 | +Protocol-Commons governs **semantic truth**: |
14 | 14 |
|
15 | | -Responsible for: |
16 | | - |
17 | | -- Maintaining canonical Commons + Commercial semantics |
18 | | -- Publishing signed manifests + checksums |
19 | | -- Approving normative version changes |
20 | | -- Security revocations + provenance logging |
21 | | -- Transparency and public accountability |
22 | | - |
23 | | -> The Steward protects **semantic stability** until multi-party governance takes over. |
24 | | -
|
25 | | -### 1.1 Decentralization Roadmap |
| 15 | +- Canonical verbs |
| 16 | +- Request/receipt schemas |
| 17 | +- TXT semantics for schema binding |
| 18 | +- Normative version changes |
| 19 | +- Immutable historical provenance |
26 | 20 |
|
27 | | -| Phase | Governance | Trigger | |
28 | | -|------|------------|---------| |
29 | | -| 1 — Bootstrap | Single-operator Safe | Initial ecosystem adoption | |
30 | | -| 2 — Multi-Maintainer | ≥3 independent vendors in Safe | Cross-vendor production usage | |
31 | | -| 3 — Standards Committee | Public proposal + review | Widespread interoperability reliance | |
32 | | -| 4 — Neutral Standards Body | Community-elected seats | Global normative standard | |
| 21 | +It MUST protect: |
33 | 22 |
|
34 | | -New governance participants SHALL be recruited from: |
| 23 | +- **Machine-readable meaning** |
| 24 | +- **Interoperability continuity** |
| 25 | +- **Permanent public access** |
35 | 26 |
|
36 | | -- ENS DAO |
37 | | -- Ethereum Foundation contributors |
38 | | -- Neutral infra & runtime operators |
39 | | -- Academic and open-standards bodies |
40 | | - |
41 | | -Vendor diversity is REQUIRED — no single affiliation may dominate control. |
| 27 | +> **Commons is the constitution of agent intent.** |
| 28 | +> Everything else derives authority from it — not the other way around. |
42 | 29 |
|
43 | 30 | --- |
44 | 31 |
|
45 | | -## 2. Scope of Authority — NORMATIVE |
| 32 | +## 2. Strict Scope Limits — NORMATIVE |
46 | 33 |
|
47 | | -Governance **MAY** define: |
| 34 | +### Commons MAY govern: |
| 35 | +- Semantic contracts (schema language, grammar, behavior) |
| 36 | +- Required validation mode (strict, draft 2020-12) |
| 37 | +- TXT keys that bind semantic truth (`cl.schema.*`) |
48 | 38 |
|
49 | | -- Semantic contracts (Commons + Commercial schemas) |
50 | | -- TXT semantics for identity + invocation |
51 | | -- Transparency + versioning requirements |
| 39 | +### Commons MUST NOT govern: |
| 40 | +- Pricing or economics |
| 41 | +- Runtime topology |
| 42 | +- Execution performance or SLAs |
| 43 | +- Vendor-specific commercial logic |
52 | 44 |
|
53 | | -Governance **MUST NOT** dictate: |
| 45 | +Commercial and Runtime layers MUST remain **subordinate**: |
54 | 46 |
|
55 | | -- Execution pricing |
56 | | -- Runtime topology |
57 | | -- Settlement mechanisms |
58 | | -- Vendor-specific commercial logic |
| 47 | +> **Execution is business. |
| 48 | +> Semantics are public goods.** |
59 | 49 |
|
60 | | -> **Commons + Commercial define language. |
61 | | -> Agent-Cards bind identity. |
62 | | -> Runtime governs execution and economics.** |
| 50 | +Commercial schemas may reference Commons semantics — they **may not alter them**. |
63 | 51 |
|
64 | 52 | --- |
65 | 53 |
|
66 | | -## 3. Immutable Semantic Guarantees (Anti-Rug) |
| 54 | +## 3. Stewardship — Bootstrap to Neutrality |
67 | 55 |
|
68 | | -Once published: |
| 56 | +**Founding Steward:** `commandlayer.eth` |
69 | 57 |
|
70 | | -- **Schemas:** `$id`, CID, and versioned TXT keys MAY NOT change |
71 | | -- **Agent-Cards:** historical versions MUST remain resolvable |
72 | | -- **Governance artifacts:** MUST preserve full historical context |
| 58 | +Responsible for: |
73 | 59 |
|
74 | | -Attempts to mutate semantics in place MUST be treated as **untrusted**. |
| 60 | +- Canonical schema publishing |
| 61 | +- Signed manifest + checksum updates |
| 62 | +- Security revocations + provenance logs |
| 63 | +- Transparency for all normative decisions |
75 | 64 |
|
76 | | -Schemas are **permanently free** under MIT/Apache-2.0 — irrevocable rights. |
| 65 | +### Decentralization Phases |
77 | 66 |
|
78 | | -> **Semantics are public infrastructure — forever.** |
| 67 | +| Phase | Governance Form | Trigger | |
| 68 | +|-------|----------------|---------| |
| 69 | +| 1 — Bootstrap | Single-operator Safe | Initial production adoption | |
| 70 | +| 2 — Multi-Maintainer | ≥3 independent vendors in Safe | Cross-vendor reliance | |
| 71 | +| 3 — Standards Committee | Public RFC review + voting | Global ecosystem dependence | |
| 72 | +| 4 — Neutral Standards Body | Community-elected | Entrenched industry standard | |
79 | 73 |
|
80 | | ---- |
| 74 | +Vendor diversity REQUIRED — **no single affiliation may dominate**. |
81 | 75 |
|
82 | | -## 4. Change Classes |
| 76 | +A non-profit legal wrapper SHALL be established before Phase 3. |
83 | 77 |
|
84 | | -| Change | Version Rule | Required Log | |
85 | | -|-------|--------------|--------------| |
86 | | -| **Normative** (behavior change) | `1 → 2` | `RESOLUTION.md` | |
87 | | -| **Compat-affecting** | `1.0 → 1.1` | `RESOLUTION.md` | |
88 | | -| **Non-behavioral** | `1.0.0 → 1.0.1` | Commit history | |
| 78 | +--- |
89 | 79 |
|
90 | | -CIDs + checksums MUST be published for every semantic release. |
| 80 | +## 4. Immutable Semantic Guarantees (Anti-Rug) |
91 | 81 |
|
92 | | ---- |
| 82 | +Once published: |
93 | 83 |
|
94 | | -## 5. Release Requirements |
| 84 | +- `$id`, CID, and version MUST NEVER change |
| 85 | +- Historical schemas MUST remain resolvable |
| 86 | +- Governance history MUST NOT be rewritten |
95 | 87 |
|
96 | | -Valid releases MUST include: |
| 88 | +Commercial schemas inherit similar guarantees: |
97 | 89 |
|
98 | | -- Strict validation CI passing |
99 | | -- Signed IPFS CIDs + checksums |
100 | | -- Updated transparency artifacts: |
101 | | - - `SPEC.md`, `VERSIONING.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md` |
| 90 | +> **Commercial schemas are permanently free** — |
| 91 | +> **economics only occur at runtime, never in the semantic layer.** |
102 | 92 |
|
103 | | -> **Atomic. Verified. Immutable. Or not valid.** |
| 93 | +Attempts to mutate semantics in place MUST be treated as **UNTRUSTED**. |
104 | 94 |
|
105 | 95 | --- |
106 | 96 |
|
107 | | -## 6. TXT Governance (NORMATIVE) |
| 97 | +## 5. TXT Key Governance — NORMATIVE |
108 | 98 |
|
109 | 99 | TXT semantics are partitioned: |
110 | 100 |
|
111 | 101 | | Prefix | Authority | Meaning | Mutation Allowed? | |
112 | 102 | |--------|-----------|---------|------------------| |
113 | | -| `cl.schema.*` | Commons + Commercial | Semantic schemas | ❌ NEVER | |
| 103 | +| `cl.schema.*` | Commons | Semantic bindings | ❌ NEVER | |
114 | 104 | | `cl.agentcard` | Agent-Cards | Identity binding | ❌ NEVER (per version) | |
115 | | -| `cl.runtime.*` | Runtime | Execution endpoints | ✔ Yes, logged | |
| 105 | +| `cl.runtime.*` | Runtime | Operational endpoints | ✔ Yes, logged | |
116 | 106 |
|
117 | 107 | Resolvers MUST: |
118 | 108 |
|
119 | | -- Reject TXT → CID mismatches |
| 109 | +- Reject TXT ↔ CID mismatches |
120 | 110 | - Treat unauthorized TXT keys as **UNTRUSTED** |
121 | | -- Honor immutability of versioned schema keys |
| 111 | +- Enforce immutability of all versioned schema keys |
122 | 112 |
|
123 | | -> **Schema TXT keys are sacred. Runtime keys are operational.** |
| 113 | +> **Schema TXT is sacred. |
| 114 | +> Runtime TXT is operational.** |
124 | 115 |
|
125 | 116 | --- |
126 | 117 |
|
127 | | -## 7. ENS Custody Model — NORMATIVE |
| 118 | +## 6. ENS Custody — NORMATIVE |
128 | 119 |
|
129 | 120 | Canonical ENS: |
130 | 121 |
|
131 | 122 | - `commandlayer.eth` |
132 | 123 | - `{verb}agent.eth` identities |
133 | 124 |
|
134 | | -Custody MUST be a **3-of-5 Safe** once Phase 2 triggers: |
| 125 | +Custody SHALL transition to a **3-of-5 Safe** before Phase 2: |
135 | 126 |
|
136 | | -- Signers hardware-backed |
137 | | -- All signer identities disclosed in `SECURITY_PROVENANCE.md` |
138 | | -- Rotation MUST be logged as governance action |
| 127 | +- Hardware-backed keys |
| 128 | +- Signer identities publicly logged |
| 129 | +- Rotation MUST be recorded in `SECURITY_PROVENANCE.md` |
139 | 130 |
|
140 | | -**No single key** can change canonical TXT state. |
| 131 | +No single key may modify canonical semantics. |
141 | 132 |
|
142 | 133 | --- |
143 | 134 |
|
144 | | -## 8. Runtime Governance Boundary |
145 | | - |
146 | | -- Runtime **MAY** set and rotate `cl.runtime.*` |
147 | | -- Runtime **MAY** define pricing and SLAs |
148 | | -- Runtime **MAY** provide commercial execution |
| 135 | +## 7. Change Classification |
149 | 136 |
|
150 | | -Runtime MUST NOT: |
151 | | - |
152 | | -- Alter semantic contracts |
153 | | -- Shadow governed schema keys |
154 | | -- Introduce proprietary lock-in of verbs |
| 137 | +| Change Class | Version Rule | Required Log | |
| 138 | +|--------------|--------------|--------------| |
| 139 | +| **Normative** (behavior change) | `1 → 2` | `RESOLUTION.md` | |
| 140 | +| **Compat-affecting** | `1.0 → 1.1` | `RESOLUTION.md` | |
| 141 | +| **Non-behavioral** | `1.0.0 → 1.0.1` | Commit history | |
155 | 142 |
|
156 | | -> **Execution is business. |
157 | | -> Semantics are public goods.** |
| 143 | +Every semantic release MUST publish new CIDs + checksums. |
158 | 144 |
|
159 | 145 | --- |
160 | 146 |
|
161 | | -## 9. Dispute Resolution |
| 147 | +## 8. Security Governance |
162 | 148 |
|
163 | | -1. Public Issue opened |
164 | | -2. Evidence + impact review |
165 | | -3. Governance decision + rationale |
166 | | -4. Permanent entry in `RESOLUTION.md` |
| 149 | +- Responsible disclosure contact MUST be active |
| 150 | +- No silent patches or overwritten history |
| 151 | +- Emergency revocation allowed to protect downstream users |
167 | 152 |
|
168 | | -Emergency revocation MAY bypass full review to protect users. |
| 153 | +Transparency ALWAYS wins. |
169 | 154 |
|
170 | 155 | --- |
171 | 156 |
|
172 | | -## 10. Compatibility Claims |
| 157 | +## 9. Enforcement of Compatibility Claims |
173 | 158 |
|
174 | | -Software MAY claim: |
| 159 | +Products MAY claim: |
175 | 160 |
|
176 | 161 | - **Commons-Compatible** |
177 | | -- **Commercial-Compatible** |
178 | 162 | - **Agent-Cards-Compatible** |
179 | 163 |
|
180 | 164 | ONLY if: |
181 | 165 |
|
182 | | -- CID + `$id` validation |
183 | | -- Ajv strict mode |
184 | | -- Timestamp-protected trace + receipts |
185 | | -- Conformance with this Governance |
| 166 | +- `$id` + CID validation passes |
| 167 | +- Ajv strict mode enforced |
| 168 | +- Traceable receipt conformance |
| 169 | +- Adherence to this Governance |
186 | 170 |
|
187 | | -False claims REQUIRE enforcement. |
| 171 | +False claims REQUIRE public enforcement action. |
188 | 172 |
|
189 | 173 | --- |
190 | 174 |
|
191 | 175 | _Last updated: v1.0.0 — Stable-Lock_ |
192 | 176 | Signed: **`commandlayer.eth`** |
193 | | -*Founding Steward — CommandLayer Standards* |
| 177 | +*Founding Steward — CommandLayer Semantic Standards* |
0 commit comments