Canonical Specifications

Deterministic execution standards, conformance profiles, and RFCs that define what "trustworthy" means in machine-readable terms.

Conformance Ladder

L3Hardware Root of Trust & Attested ExecutionL2Cryptographic Identity & ProofGraph GenerationL1Policy Guardrails (PEP over CPI)L0No Governance (Direct LLM Integration)
L1

Structured Output

Actions are typed proposals. Every tool call returns a deterministic JSON envelope with schema validation.

L2

Cryptographic Identity & ProofGraph Generation

Every action produces a hash-linked receipt chain. Proofs form a directed acyclic graph anchored to the session root.

L3

Hardware Root of Trust & Attested Execution

Execution runs in a TEE. Attestation reports are bound to the ProofGraph, making receipts tamper-evident at the silicon level.