|
1 | | -# GOVERNANCE — CommandLayer Protocol Commons |
| 1 | +# GOVERNANCE — CommandLayer Protocol |
2 | 2 |
|
3 | | -**Applies To:** Protocol-Commons, Agent-Cards |
| 3 | +**Applies To:** Protocol-Commons, Protocol-Commercial, Agent-Cards |
4 | 4 | **Status:** v1.0.0 — Stable-Lock |
5 | 5 |
|
6 | | -> This document is **NORMATIVE and ENFORCEABLE**. |
| 6 | +> This document is **NORMATIVE, ENFORCEABLE, AND PERMANENT**. |
7 | 7 | > Governance is custodial today and **designed to decentralize** over time. |
8 | 8 |
|
9 | 9 | --- |
|
14 | 14 |
|
15 | 15 | Responsible for: |
16 | 16 |
|
17 | | -- Canonical Protocol-Commons + Agent-Cards standards |
18 | | -- Signed manifests + checksum provenance |
19 | | -- Normative version approvals |
20 | | -- Transparency + receipt of all changes |
21 | | -- Security revocation + incident response |
| 17 | +- Maintaining canonical Commons + Commercial semantics |
| 18 | +- Publishing signed manifests + checksums |
| 19 | +- Approving normative version changes |
| 20 | +- Security revocations + provenance logging |
| 21 | +- Transparency and public accountability |
22 | 22 |
|
23 | | -> The Founding Steward protects **semantic stability** until multi-party governance takes over. |
| 23 | +> The Steward protects **semantic stability** until multi-party governance takes over. |
24 | 24 |
|
25 | | -### 1.1 Governance Phases |
| 25 | +### 1.1 Decentralization Roadmap |
26 | 26 |
|
27 | | -| Phase | Governance Structure | Trigger | |
28 | | -|------|---------------------|---------| |
29 | | -| **1 — Bootstrap** | Single-operator Safe | Initial public release | |
30 | | -| **2 — Multi-maintainer** | ≥3 independent implementers in a shared Safe | Cross-vendor production use | |
31 | | -| **3 — Standards Committee** | Public proposal + review; multi-stakeholder Safe | Widespread ecosystem reliance | |
32 | | -| **4 — Neutral Standards Body** | Community-elected representatives | Global adoption | |
| 27 | +| Phase | Governance | Trigger | |
| 28 | +|------|------------|---------| |
| 29 | +| 1 — Bootstrap | Single-operator Safe | Initial ecosystem adoption | |
| 30 | +| 2 — Multi-Maintainer | ≥3 independent vendors in Safe | Cross-vendor production usage | |
| 31 | +| 3 — Standards Committee | Public proposal + review | Widespread interoperability reliance | |
| 32 | +| 4 — Neutral Standards Body | Community-elected seats | Global normative standard | |
33 | 33 |
|
34 | | -> Phase advancement requires **vendor diversity**: no two operators may be majority-affiliated. |
35 | | -
|
36 | | ---- |
37 | | - |
38 | | -### 1.2 Rug-Resistance Guarantee |
39 | | - |
40 | | -Canonical semantics: |
41 | | - |
42 | | -- CANNOT be revoked or made paywalled |
43 | | -- CANNOT change without recorded approval |
44 | | -- CANNOT drift silently |
45 | | - |
46 | | -All normative state is: |
47 | | - |
48 | | -- **Content-addressed** (CIDs) |
49 | | -- **Version-locked** |
50 | | -- **Publicly auditable** |
51 | | - |
52 | | -> Protocol governance **preserves permissionless interoperability forever**. |
53 | | -
|
54 | | ---- |
55 | | - |
56 | | -### 1.3 Open Stewardship Path |
57 | | - |
58 | | -Once Phase 2 triggers: |
59 | | - |
60 | | -- Governance seats MUST be open to public application |
61 | | -- Qualifications MUST prioritize neutrality + ecosystem contribution |
62 | | -- All selections MUST be logged in `SECURITY_PROVENANCE.md` |
63 | | - |
64 | | -> Governance is open to growth — not capture. |
65 | | -
|
66 | | ---- |
67 | | - |
68 | | -### 1.4 External Participation |
69 | | - |
70 | | -Eligible stakeholders include: |
| 34 | +New governance participants SHALL be recruited from: |
71 | 35 |
|
72 | 36 | - ENS DAO |
73 | | -- Ethereum Foundation |
74 | | -- Independent runtime + schema implementers |
75 | | -- Infrastructure operators |
76 | | -- Academic / open standards orgs |
| 37 | +- Ethereum Foundation contributors |
| 38 | +- Neutral infra & runtime operators |
| 39 | +- Academic and open-standards bodies |
77 | 40 |
|
78 | | -Participation MUST align with: |
79 | | - |
80 | | -- Free access to canonical schemas |
81 | | -- Rug-resistant semantics |
82 | | -- Cross-ecosystem interoperability |
| 41 | +Vendor diversity is REQUIRED — no single affiliation may dominate control. |
83 | 42 |
|
84 | 43 | --- |
85 | 44 |
|
86 | 45 | ## 2. Scope of Authority — NORMATIVE |
87 | 46 |
|
88 | | -Governance MAY define: |
| 47 | +Governance **MAY** define: |
89 | 48 |
|
90 | | -- Canonical verb semantics |
91 | | -- JSON Schema rules |
92 | | -- TXT semantics tied to identity + invocation |
93 | | -- Transparency + provenance requirements |
| 49 | +- Semantic contracts (Commons + Commercial schemas) |
| 50 | +- TXT semantics for identity + invocation |
| 51 | +- Transparency + versioning requirements |
94 | 52 |
|
95 | | -Governance MUST NOT dictate: |
| 53 | +Governance **MUST NOT** dictate: |
96 | 54 |
|
97 | | -- Runtime topology |
98 | 55 | - Execution pricing |
99 | | -- Proprietary commercial logic |
100 | | -- Business models of implementers |
| 56 | +- Runtime topology |
| 57 | +- Settlement mechanisms |
| 58 | +- Vendor-specific commercial logic |
101 | 59 |
|
102 | | -> CommandLayer sets the **language**, not the **economics**. |
| 60 | +> **Commons + Commercial define language. |
| 61 | +> Agent-Cards bind identity. |
| 62 | +> Runtime governs execution and economics.** |
103 | 63 |
|
104 | 64 | --- |
105 | 65 |
|
106 | | -## 3. Token Governance Rule |
107 | | - |
108 | | -Token-based control: |
| 66 | +## 3. Immutable Semantic Guarantees (Anti-Rug) |
109 | 67 |
|
110 | | -- **MUST NOT** be introduced before Phase 3 |
111 | | -- Any introduction **REQUIRES** community motion + recorded rationale |
112 | | -- Tokens MUST NOT introduce **pay-to-govern** dynamics |
| 68 | +Once published: |
113 | 69 |
|
114 | | -> Tokens are a **last resort**, not a founding primitive. |
| 70 | +- **Schemas:** `$id`, CID, and versioned TXT keys MAY NOT change |
| 71 | +- **Agent-Cards:** historical versions MUST remain resolvable |
| 72 | +- **Governance artifacts:** MUST preserve full historical context |
115 | 73 |
|
116 | | ---- |
117 | | - |
118 | | -## 4. Change Classes |
| 74 | +Attempts to mutate semantics in place MUST be treated as **untrusted**. |
119 | 75 |
|
120 | | -| Change Type | Examples | Version Rule | Audit Requirement | |
121 | | -|------------|----------|--------------|------------------| |
122 | | -| **Normative** | Schema, TXT semantics | `1 → 2` | `RESOLUTION.md` | |
123 | | -| **Compatibility-affecting** | Field tightening | `1.0 → 1.1` | `RESOLUTION.md` | |
124 | | -| **Non-behavioral** | Docs, naming | `1.0.0 → 1.0.1` | Git history | |
| 76 | +Schemas are **permanently free** under MIT/Apache-2.0 — irrevocable rights. |
125 | 77 |
|
126 | | -All changes MUST update CIDs + checksums. |
| 78 | +> **Semantics are public infrastructure — forever.** |
127 | 79 |
|
128 | 80 | --- |
129 | 81 |
|
130 | | -## 5. Immutability Guarantees |
131 | | - |
132 | | -Once a version is published: |
| 82 | +## 4. Change Classes |
133 | 83 |
|
134 | | -- No file mutation |
135 | | -- No `$id` changes |
136 | | -- No CID changes |
| 84 | +| Change | Version Rule | Required Log | |
| 85 | +|-------|--------------|--------------| |
| 86 | +| **Normative** (behavior change) | `1 → 2` | `RESOLUTION.md` | |
| 87 | +| **Compat-affecting** | `1.0 → 1.1` | `RESOLUTION.md` | |
| 88 | +| **Non-behavioral** | `1.0.0 → 1.0.1` | Commit history | |
137 | 89 |
|
138 | | -Violations REQUIRE revocation + new version. |
| 90 | +CIDs + checksums MUST be published for every semantic release. |
139 | 91 |
|
140 | 92 | --- |
141 | 93 |
|
142 | | -## 6. Release Policy |
| 94 | +## 5. Release Requirements |
143 | 95 |
|
144 | 96 | Valid releases MUST include: |
145 | 97 |
|
146 | | -- Full CI validation (strict mode) |
147 | | -- Signed IPFS CID + checksums |
| 98 | +- Strict validation CI passing |
| 99 | +- Signed IPFS CIDs + checksums |
148 | 100 | - Updated transparency artifacts: |
149 | | - - `SPEC.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md`, `VERSIONING.md` |
| 101 | + - `SPEC.md`, `VERSIONING.md`, `SECURITY_PROVENANCE.md`, `RESOLUTION.md` |
150 | 102 |
|
151 | | -> **Atomic + verifiable — or not valid.** |
| 103 | +> **Atomic. Verified. Immutable. Or not valid.** |
152 | 104 |
|
153 | 105 | --- |
154 | 106 |
|
155 | | -## 7. TXT Responsibility Split — NORMATIVE |
| 107 | +## 6. TXT Governance (NORMATIVE) |
| 108 | + |
| 109 | +TXT semantics are partitioned: |
156 | 110 |
|
157 | | -- **Protocol-Commons**: TXT semantics for **schema** |
158 | | -- **Agent-Cards**: TXT semantics for **identity + invocation** |
| 111 | +| Prefix | Authority | Meaning | Mutation Allowed? | |
| 112 | +|--------|-----------|---------|------------------| |
| 113 | +| `cl.schema.*` | Commons + Commercial | Semantic schemas | ❌ NEVER | |
| 114 | +| `cl.agentcard` | Agent-Cards | Identity binding | ❌ NEVER (per version) | |
| 115 | +| `cl.runtime.*` | Runtime | Execution endpoints | ✔ Yes, logged | |
159 | 116 |
|
160 | 117 | Resolvers MUST: |
161 | 118 |
|
162 | | -- Reject mismatches between TXT + published manifests |
163 | | -- Treat ungoverned TXT as **UNTRUSTED** |
| 119 | +- Reject TXT → CID mismatches |
| 120 | +- Treat unauthorized TXT keys as **UNTRUSTED** |
| 121 | +- Honor immutability of versioned schema keys |
164 | 122 |
|
165 | | -Unauthorized TXT keys are **forbidden**. |
| 123 | +> **Schema TXT keys are sacred. Runtime keys are operational.** |
166 | 124 |
|
167 | 125 | --- |
168 | 126 |
|
169 | | -## 8. Security Governance |
170 | | - |
171 | | -Steward MUST: |
172 | | - |
173 | | -- Enforce `SECURITY*.md` requirements |
174 | | -- Respond to disclosures within **7 days** |
175 | | -- Require signed replacements after compromise |
176 | | -- Log revocations transparently |
| 127 | +## 7. ENS Custody Model — NORMATIVE |
177 | 128 |
|
178 | | -Emergency revocation MAY bypass full review to protect users. |
| 129 | +Canonical ENS: |
179 | 130 |
|
180 | | -Independent third-party validation MUST be possible at all times. |
| 131 | +- `commandlayer.eth` |
| 132 | +- `{verb}agent.eth` identities |
181 | 133 |
|
182 | | ---- |
| 134 | +Custody MUST be a **3-of-5 Safe** once Phase 2 triggers: |
183 | 135 |
|
184 | | -## 9. Dispute Resolution Protocol |
| 136 | +- Signers hardware-backed |
| 137 | +- All signer identities disclosed in `SECURITY_PROVENANCE.md` |
| 138 | +- Rotation MUST be logged as governance action |
185 | 139 |
|
186 | | -1. Log a public Issue |
187 | | -2. Evidence review |
188 | | -3. Governance decision with rationale |
189 | | -4. Permanent entry in `RESOLUTION.md` |
| 140 | +**No single key** can change canonical TXT state. |
190 | 141 |
|
191 | 142 | --- |
192 | 143 |
|
193 | | -## 10. ENS Registry Custody — NORMATIVE |
| 144 | +## 8. Runtime Governance Boundary |
194 | 145 |
|
195 | | -Canonical ENS names: |
| 146 | +- Runtime **MAY** set and rotate `cl.runtime.*` |
| 147 | +- Runtime **MAY** define pricing and SLAs |
| 148 | +- Runtime **MAY** provide commercial execution |
196 | 149 |
|
197 | | -- `commandlayer.eth` |
198 | | -- `{verb}agent.eth` canonical identity bindings |
| 150 | +Runtime MUST NOT: |
199 | 151 |
|
200 | | -Custody MUST be via a **multi-signature Safe**: |
| 152 | +- Alter semantic contracts |
| 153 | +- Shadow governed schema keys |
| 154 | +- Introduce proprietary lock-in of verbs |
201 | 155 |
|
202 | | -- Minimum **3-of-5** threshold |
203 | | -- Hardware-secured signer keys |
204 | | -- All signers published in `SECURITY_PROVENANCE.md` |
205 | | -- Rotation MUST be logged as governance action |
| 156 | +> **Execution is business. |
| 157 | +> Semantics are public goods.** |
206 | 158 |
|
207 | | -> No single key can alter canonical TXT state. |
| 159 | +--- |
208 | 160 |
|
209 | | -**Decentralization Trigger:** Start Phase 2 |
210 | | -➝ ≥3 independent production implementers. |
| 161 | +## 9. Dispute Resolution |
211 | 162 |
|
212 | | -ENS authority MUST remain **public infrastructure**, not a private asset. |
| 163 | +1. Public Issue opened |
| 164 | +2. Evidence + impact review |
| 165 | +3. Governance decision + rationale |
| 166 | +4. Permanent entry in `RESOLUTION.md` |
213 | 167 |
|
214 | | -Any action restricting interoperability is a **governance violation**. |
| 168 | +Emergency revocation MAY bypass full review to protect users. |
215 | 169 |
|
216 | 170 | --- |
217 | 171 |
|
218 | | -## 11. Compatibility Claims |
| 172 | +## 10. Compatibility Claims |
219 | 173 |
|
220 | 174 | Software MAY claim: |
221 | 175 |
|
222 | 176 | - **Commons-Compatible** |
| 177 | +- **Commercial-Compatible** |
223 | 178 | - **Agent-Cards-Compatible** |
224 | 179 |
|
225 | | -Only if: |
| 180 | +ONLY if: |
226 | 181 |
|
227 | | -- Canonical CID / `$id` alignment |
228 | | -- Ajv strict schema compliance |
229 | | -- Verified x402 envelope semantics |
230 | | -- Receipt + trace integrity |
| 182 | +- CID + `$id` validation |
| 183 | +- Ajv strict mode |
| 184 | +- Timestamp-protected trace + receipts |
| 185 | +- Conformance with this Governance |
231 | 186 |
|
232 | | -False claims **require enforcement**. |
| 187 | +False claims REQUIRE enforcement. |
233 | 188 |
|
234 | 189 | --- |
235 | 190 |
|
236 | 191 | _Last updated: v1.0.0 — Stable-Lock_ |
237 | | -Signed: **commandlayer.eth** |
| 192 | +Signed: **`commandlayer.eth`** |
238 | 193 | *Founding Steward — CommandLayer Standards* |
0 commit comments