Governance Tier
Active Tier
T5-RIGID
Highest enforcement level — constitutional, immutable, fail-closed
Failure Mode
FAIL-CLOSED
When in doubt, the system halts. Never assumes. Never guesses.
Evidence Required
ALWAYS
Every meaningful change produces a cryptographically traceable artifact
Constitutional Principles
ENFORCED No Fabrication
If real data does not exist, the system marks it HOLD or unknown. Synthetic data
is never generated or presented as real.
ENFORCED No Self-Escalation
No agent, system, or process can elevate its own authority level. Escalation
requires AC-1 override with evidence trail.
ENFORCED No Downgrading
IP status, valuations, governance tiers, and authority levels only increase —
never decrease.
ENFORCED Evidence-Required
Every directive produces an evidence receipt. Every deployment emits a seal.
Every state change is auditable.
ENFORCED Promotion-Only
Files are never deleted — only deprecated with pointers. The system only grows.
Retirement is by reference, not by erasure.
ENFORCED Vendor-Agnostic
No vendor lock-in. Infrastructure is portable. Governance runs on any cloud, any
runtime, any jurisdiction.
Mutation Protocol
All changes to the ETHRAEON canonical state follow a strict mutation protocol:
1. Directive Emission — AC-1 authorizes a numbered directive with scope, phases, and
constraints.
2. Implementation — Agent executes within directive bounds. No out-of-scope changes.
3. Validation — Canon pack validation, forbidden pattern scan, test suite, secret scan.
4. Seal — SHA-locked seal file with HEAD commit, file manifest, and validation results.
5. Push — Rebase onto main, push, purge CDN cache. Seal becomes immutable.
Evidence Chain
Directive Ledger
Append-Only
Every directive recorded in canon/DIRECTIVE_LEDGER.md — never edited, only
appended
Evidence Graph (EDG)
TRACELET 1.1
Every agent action emits a JSON node with agent, task, result, timestamp
Canonical Hashes
DELTASUM 2.0.1
SHA-256 verification of all data files before load — integrity guaranteed
Security Guarantees
- ACTIVE Token-only authentication — No global API keys. Scoped Bearer tokens only. (Directive 0630)
- ACTIVE No hidden API keys — Secret scanning runs before every commit. Forbidden patterns block deployment.
- ACTIVE HTTPS-only — All surfaces enforce TLS. No cleartext traffic. No mixed content.
- ACTIVE Content Security Policy — Strict CSP headers on all deployed surfaces.
- ACTIVE No surveillance — No invasive tracking. No third-party analytics. No user fingerprinting.
- ACTIVE No synthetic data — All numbers, metrics, and claims are real or explicitly marked HOLD.
Privacy Stance
ETHRAEON does not collect personal data. No cookies for tracking. No analytics pixels. No
behavioral profiling. Operational metrics only — page views, cache ratios, worker invocations. All metrics
are aggregate and infrastructure-level.
Authority Model
AC-1 · Founder
Full Override
S. Jason Prohaska — Constitutional authority over all systems
AC-2 · CFO
Capital + Audit
Rick Disick — Financial decisions and audit authority
AC-3 · Technical
/app + /ops
Technical lead — application and operations scope
AC-4 · Operator
Execute-Only
No override capability — execute within defined bounds
Live Trust Snapshot
Loaded from /trust_snapshot_v2.json — real-time canonical
state.
Loading trust snapshot...