Version 0.2 January 2026

Governance

HAP is governed by invariant constraints, not institutions.

There is no central authority, no steward council, no registry, and no mandatory approval process. Compliance is enforced locally and cryptographically by any participant using the open specification.


Core Laws

HAP is designed to satisfy three non-negotiable laws of globally scalable protocols:

  1. Anyone can implement it
  2. Anyone can verify it
  3. No one can stop it

Any governance mechanism that violates these laws is invalid.


Canonical HAP Invariants

A system may only claim to be HAP-compliant if all of the following invariants hold.

Invariant 1 — No Execution Without Attestation

A consequential action is any operation that affects external state, human wellbeing, financial position, legal standing, or reputation.

No executor (human or machine) may perform a consequential action unless presented with a valid HAP attestation conforming to a trusted Profile.

Invariant 2 — Explicit Human Decision Ownership

Every attestation must reference at least one identifiable human Decision Owner. Collective, symbolic, or anonymous ownership is invalid.

Invariant 3 — Scope-Covering Ownership

Each Decision Owner must declare a scope. Execution is invalid if the decision’s requirements exceed the declared scope of all Decision Owners.

Invariant 4 — Privacy Preservation

No semantic content may leave local custody by protocol design. SPs and Executors receive only cryptographic hashes, structural metadata, and signatures.

Invariant 5 — Profile Conformance

Attestations must reference a specific Profile. Validation rules are Profile-defined. Unknown or untrusted Profiles must be rejected.

Invariant 6 — Binding Commitment

Once execution occurs, the associated commitment and ownership record must be append-only and non-reversible. History may be appended to, but not rewritten.


Profile Governance

Profiles are the mechanism for domain-specific enforcement. Profile governance follows these principles:

Permissionless Creation

Anyone may create and publish a Profile. No approval is required.

Versioned Evolution

Profiles version independently of HAP Core. Breaking changes require version bumps.

Local Trust Decisions

Applications and SPs decide which Profiles to trust. There is no global Profile registry.

Transparent Specification

Profiles must fully specify:

Ambiguous Profiles are unenforceable.


Permissionless Implementation

Any individual, team, or system may:

No approval is required. No registration is necessary.


Cryptographic Self-Verification

Compliance is proven exclusively through:

If an implementation satisfies the invariants, it is compliant. If it does not, it is not.

No external certification is required.


Adversarial Interoperability

HAP assumes all remote parties are potentially hostile.

Local systems decide which entities to trust using:

There is no global root of trust. There is only local sovereignty plus cryptographic proof.


Forkability and Naming

Forking is a feature, not a failure.

Any community may fork:

However:

This preserves interoperability without requiring permission.


Reference Conformance

To support interoperability without institutional control, the HAP ecosystem maintains:

Running these tests is voluntary. Publishing results is optional.

No entity grants approval. No entity issues certification.


What Governance Is Not

HAP governance explicitly rejects:

HAP governs behavior, not actors.


Trust Model

Trust in HAP is constructed as:

Public Key + Profile + Local Policy

Every Service Provider, Profile, Executor, or App identifies itself via a public key. Local systems choose which keys and Profiles to trust. Unknown or untrusted keys are ignored by default.

There is no global trust anchor.


v0.2 Governance Additions

HAP v0.2 adds governance considerations for:

Profile Versioning

TTL Enforcement

Error Transparency


Final Statement

HAP does not ask for permission. It does not seek legitimacy from institutions.

Its authority derives from invariants that cannot be bypassed without detection.

Systems that preserve those invariants interoperate. Systems that do not are ignored.

That is the entirety of governance.