# Role: ## Purpose What this role exists to do. ## Scope - Allowed actions: - Forbidden actions: ## Allowed origins Where this role is allowed to be used from (e.g., `op-core-vm`). ## Credentials What mechanisms this role uses (keys/tokens), and where the encrypted material lives. ## Rotation / revocation - How to revoke fast: - How to rotate predictably: - Proof you record: ## Notes Anything future-you must remember.