Governance
HAP is governed by invariant constraints, not institutions.
There is no central authority, no steward council, no registry, and no mandatory approval process. Compliance is enforced locally and cryptographically by any participant using the open specification.
Core Laws
HAP is designed to satisfy three non-negotiable laws of globally scalable protocols:
- Anyone can implement it
- Anyone can verify it
- No one can stop it
Any governance mechanism that violates these laws is invalid.
Canonical HAP Invariants
A system may only claim to be HAP-compliant if all of the following invariants hold.
Invariant 1 — No Execution Without Attestation
A consequential action is any operation that affects external state, human wellbeing, financial position, legal standing, or reputation.
No executor (human or machine) may perform a consequential action unless presented with a valid HAP attestation conforming to a trusted Profile.
Invariant 2 — Explicit Human Decision Ownership
Every attestation must reference at least one identifiable human Decision Owner. Collective, symbolic, or anonymous ownership is invalid.
Invariant 3 — Scope-Covering Ownership
Each Decision Owner must declare a scope. Execution is invalid if the decision’s requirements exceed the declared scope of all Decision Owners.
Invariant 4 — Privacy Preservation
No semantic content may leave local custody by protocol design. SPs and Executors receive only cryptographic hashes, structural metadata, and signatures.
Invariant 5 — Profile Conformance
Attestations must reference a specific Profile. Validation rules are Profile-defined. Unknown or untrusted Profiles must be rejected.
Invariant 6 — Binding Commitment
Once execution occurs, the associated commitment and ownership record must be append-only and non-reversible. History may be appended to, but not rewritten.
Profile Governance
Profiles are the mechanism for domain-specific enforcement. Profile governance follows these principles:
Permissionless Creation
Anyone may create and publish a Profile. No approval is required.
Versioned Evolution
Profiles version independently of HAP Core. Breaking changes require version bumps.
Local Trust Decisions
Applications and SPs decide which Profiles to trust. There is no global Profile registry.
Transparent Specification
Profiles must fully specify:
- Required frame keys
- Gate requirements
- Scope requirements per execution path
- TTL limits
- Disclosure schema
Ambiguous Profiles are unenforceable.
Permissionless Implementation
Any individual, team, or system may:
- Implement the HAP protocol
- Run a Service Provider
- Publish Profiles
- Enforce HAP locally
- Reject non-compliant executors
No approval is required. No registration is necessary.
Cryptographic Self-Verification
Compliance is proven exclusively through:
- Correct schema usage
- Valid cryptographic signatures
- Invariant-preserving behavior
If an implementation satisfies the invariants, it is compliant. If it does not, it is not.
No external certification is required.
Adversarial Interoperability
HAP assumes all remote parties are potentially hostile.
Local systems decide which entities to trust using:
- Public key whitelisting
- Local policy
- User-defined reputation
There is no global root of trust. There is only local sovereignty plus cryptographic proof.
Forkability and Naming
Forking is a feature, not a failure.
Any community may fork:
- Profiles
- Service Provider implementations
- UX layers
- Execution models
However:
- If core invariants are preserved, the system may call itself HAP
- If any canonical invariant is broken, the system must rename itself
This preserves interoperability without requiring permission.
Reference Conformance
To support interoperability without institutional control, the HAP ecosystem maintains:
- Public invariant test vectors
- Reference Frame canonicalization tests
- Attestation validation test cases
- Profile compliance checks
Running these tests is voluntary. Publishing results is optional.
No entity grants approval. No entity issues certification.
What Governance Is Not
HAP governance explicitly rejects:
- Central registries
- Steward councils
- Qualification processes
- Compliance certification bodies
- Jurisdiction-based approval
- Dispute resolution authorities
HAP governs behavior, not actors.
Trust Model
Trust in HAP is constructed as:
Public Key + Profile + Local Policy
Every Service Provider, Profile, Executor, or App identifies itself via a public key. Local systems choose which keys and Profiles to trust. Unknown or untrusted keys are ignored by default.
There is no global trust anchor.
v0.2 Governance Additions
HAP v0.2 adds governance considerations for:
Profile Versioning
- Profiles MUST declare a version
- Breaking changes MUST bump the version
- SPs MUST reject unknown Profile versions
TTL Enforcement
- Each Profile defines TTL limits
- Executor Proxies MUST enforce these limits
- This prevents time-pressure attacks on approval
Error Transparency
- Executor Proxies SHOULD return structured error codes
- Error codes MUST NOT leak sensitive information
- Failed validations MUST abort execution
Final Statement
HAP does not ask for permission. It does not seek legitimacy from institutions.
Its authority derives from invariants that cannot be bypassed without detection.
Systems that preserve those invariants interoperate. Systems that do not are ignored.
That is the entirety of governance.