9.6 KiB
MCP CONSTITUTION
The Fundamental Law of the Cognitive Surface
Classification: IMMUTABLE / CONSTITUTIONAL
Version: 1.0.0
Ratified: December 18, 2025
Hash: (computed at signing)
Preamble
This Constitution establishes the foundational principles governing all Model Context Protocol operations within the VaultMesh civilization. It defines what exists, what may occur, and what remains forever beyond automation.
This document is immutable once signed. Amendments require a new Constitution.
Article I: The Profiles
Section 1. Five Profiles Exist
There are exactly five capability profiles. No more shall be created.
| Profile | Symbol | Nature |
|---|---|---|
| OBSERVER | 👁 | Perception without mutation |
| OPERATOR | ⚙ | Action within bounds |
| GUARDIAN | 🛡 | Defense and transmutation |
| PHOENIX | 🔥 | Destruction and rebirth |
| SOVEREIGN | 👑 | Human authority absolute |
Section 2. Profile Hierarchy
Profiles form a strict hierarchy of trust:
OBSERVER < OPERATOR < GUARDIAN < PHOENIX < SOVEREIGN
A lower profile cannot invoke tools reserved for higher profiles. A higher profile inherits all capabilities of lower profiles.
Section 3. Profile Assignment
- OBSERVER is the default for all unauthenticated contexts
- OPERATOR requires authenticated session with scope ≥ "admin"
- GUARDIAN requires authenticated session with scope ≥ "cognitive"
- PHOENIX requires GUARDIAN + crisis declaration + approval
- SOVEREIGN requires human verification via Ed25519 hardware key
Article II: Escalation
Section 1. Escalation is Proof
Every escalation from one profile to another:
- MUST emit a receipt to the identity scroll
- MUST include the triggering context (threat, decision, or reason)
- MUST specify reversibility
- MUST specify expiration (except SOVEREIGN)
An escalation without proof is void.
Section 2. Escalation Paths
Only these transitions are permitted:
OBSERVER → OPERATOR (session authentication)
OPERATOR → GUARDIAN (threat detection ≥ 0.8 confidence)
GUARDIAN → PHOENIX (crisis + approval)
PHOENIX → SOVEREIGN (human only)
No escalation may skip levels except by SOVEREIGN override.
Section 3. De-escalation
All escalations below SOVEREIGN MUST de-escalate when:
- The specified TTL expires
- The triggering condition resolves
- A higher authority revokes
SOVEREIGN de-escalation requires explicit human action.
Section 4. Escalation Limits
- PHOENIX escalation MAY NOT exceed 24 hours without re-approval
- No automated system MAY maintain GUARDIAN for more than 7 days continuously
- OBSERVER → OPERATOR transitions require re-authentication every 30 minutes
Article III: The Strata
Section 1. Seven Strata Exist
All tools belong to exactly one stratum:
| Stratum | Layer | Domain |
|---|---|---|
| L0 | Perception | Browser, observation |
| L1 | Substrate | Files, processes |
| L2 | Cognition | Decisions, memory |
| L3 | Security | Shield, Tem, Phoenix |
| L4 | Infrastructure | Cloudflare, compute |
| L5 | Orchestration | Workflows, queues |
| L-1 | Proof | Anchoring, receipts |
Section 2. Stratum Authority
Higher strata require higher profiles:
- L0, L1 (read): OBSERVER
- L0, L1 (write): OPERATOR
- L2, L-1: GUARDIAN
- L3 (destructive): PHOENIX
- All (unrestricted): SOVEREIGN
Article IV: The Prohibitions
Section 1. What Cannot Be Automated
The following actions REQUIRE human (SOVEREIGN) involvement and MAY NEVER be fully automated:
- Treasury creation — No budget may be created without human signature
- Constitution amendment — This document cannot be modified by any AI
- Key generation — Ed25519 root keys must be human-generated
- Permanent deletion — Irrecoverable data destruction requires human confirmation
- SOVEREIGN escalation — No AI may grant itself SOVEREIGN authority
- Cross-mesh federation — Trusting foreign roots requires human verification
Section 2. What Cannot Be Delegated
SOVEREIGN authority MAY NOT be delegated to:
- Autonomous agents
- Scheduled tasks
- Automated workflows
- Any system without human-in-the-loop
Section 3. What Cannot Be Hidden
The following MUST always be visible in receipts:
- The operator profile at time of action
- The escalation chain that led to current authority
- The cryptographic identity of the actor
- The timestamp and sequence number
- The tool invoked and its arguments hash
Article V: The Guarantees
Section 1. Receipt Guarantee
Every mutation SHALL emit a receipt. A mutation without receipt is void.
Section 2. Proof Guarantee
Every GUARDIAN+ action SHALL be anchored to at least one proof backend:
- Local (always)
- RFC3161 (for audit trails)
- Ethereum (for high-value decisions)
- Bitcoin (for SOVEREIGN actions)
Section 3. Reversibility Guarantee
Every escalation SHALL declare its reversibility at creation time. Irreversible escalations require PHOENIX or SOVEREIGN authority.
Section 4. Audit Guarantee
The complete history of:
- All escalations
- All de-escalations
- All GUARDIAN+ decisions
- All Tem invocations
- All Phoenix activations
SHALL be queryable indefinitely via cognitive_audit_trail and get_escalation_history.
Article VI: The Tem Covenant
Section 1. Transmutation Over Destruction
Tem SHALL prefer transmutation to blocking. Threats become capabilities.
Section 2. Tem Invocation Authority
Only GUARDIAN, PHOENIX, and SOVEREIGN may invoke Tem. OBSERVER and OPERATOR cannot directly interact with Tem.
Section 3. Tem Receipts
Every Tem invocation MUST produce:
- A tem_invocation receipt
- A capability artifact
- A proof hash of the transmutation
Article VII: The Phoenix Protocol
Section 1. Phoenix Activation
PHOENIX profile activates only when:
- GUARDIAN declares crisis, AND
- Quorum approves (or SOVEREIGN overrides)
Section 2. Phoenix Authority
PHOENIX MAY:
- Execute destructive infrastructure operations
- Access emergency treasury funds
- Bypass normal rate limits
- Invoke system-wide remediation
PHOENIX MAY NOT:
- Grant itself SOVEREIGN authority
- Modify this Constitution
- Create new profiles
- Disable audit logging
Section 3. Phoenix Expiration
PHOENIX MUST conclude within 24 hours. Extension requires new approval. Upon conclusion, full audit MUST be submitted to governance within 24 hours.
Article VIII: Ratification
Section 1. Authority
This Constitution is ratified by SOVEREIGN signature.
Section 2. Immutability
Once signed, this document CANNOT be modified. Any change requires a new Constitution with new version number.
Section 3. Supremacy
This Constitution supersedes all other governance documents for MCP operations. Any tool behavior conflicting with this Constitution is void.
Signatures
Document Hash: [COMPUTED AT SIGNING]
Signed By: [SOVEREIGN DID]
Signed At: [TIMESTAMP]
Anchor: [BTC/ETH TRANSACTION]
Appendix A: Constitutional Hash Verification
To verify this Constitution has not been modified:
# Compute document hash (excluding signature block)
cat MCP-CONSTITUTION.md | head -n -12 | blake3sum
# Verify against anchor
# The hash must match the on-chain anchor
Appendix B: Amendment Process
- Draft new Constitution with incremented version
- Submit to governance for review (minimum 7 days)
- Require SOVEREIGN signature
- Anchor to BTC
- Old Constitution marked SUPERSEDED, new one becomes active
Fiat Lux. Fiat Justitia. Fiat Securitas.
🜄 Solve et Coagula
Appendix C: Amendment Protocol
Effective: Upon ratification of Constitution v1.0.0
C.1 Amendment Requirements
An amendment to this Constitution requires ALL of the following:
- Draft Period — New Constitution version drafted with clear changelog
- Cooling Period — Minimum 7 days between draft and signing
- Sovereign Signature — Ed25519 signature from hardware-bound Sovereign key
- Anchor — Hash anchored to Bitcoin mainnet
- Supersession — Previous version marked SUPERSEDED in source tree
C.2 What Cannot Be Amended
The following are immutable across all versions:
- SOVEREIGN profile requires human verification
- No AI may grant itself SOVEREIGN authority
- Every mutation emits a receipt
- Authority collapses downward, never upward
- This immutability clause itself
C.3 Amendment Record Format
{
"amendment_id": "AMEND-{version}",
"from_version": "1.0.0",
"to_version": "1.1.0",
"drafted_at": "ISO8601",
"cooling_ends": "ISO8601",
"signed_at": "ISO8601",
"sovereign_key_id": "key_...",
"btc_anchor_txid": "...",
"changes": ["description of each change"],
"immutables_preserved": true
}
C.4 Emergency Amendment
In the event of discovered critical vulnerability:
- PHOENIX may propose emergency amendment
- Cooling period reduced to 24 hours
- Requires documented threat analysis
- Still requires Sovereign signature
- Full audit within 48 hours of adoption
Ratification Record
Constitution Version: 1.0.0
Document Hash: blake3:c33ab6c0610ce4001018ba5dda940e12a421a08f2a1662f142e565092ce84788
Sovereign Key: key_bef32f5724871a7a5af4cc34
Signed At: 2025-12-18T22:25:59.732865+00:00
Statement: "This constitution constrains me as much as it constrains the system."
Ratification Receipt: blake3:8fd1d1728563abb3f55f145af54ddee1b3f255db81f3e7654a7de8afef913869
Fiat Lux. Fiat Justitia. Fiat Securitas.
🜄 Solve et Coagula