Skip to main content

Part III — Protocol & Operations

last updated: 2026-03-01

This part covers how the system is composed and operated:

  • reference architectures and component boundaries
  • economic-security mechanisms as operational constraints
  • monitoring and dispute handling in adversarial environments
  • contributor workflows and operational playbooks
  1. Factory Architecture Diagram — the one-page mental model.
  2. Reference Architecture — system components and boundaries.
  3. Economic Security — how acceptance constraints show up operationally.
  4. Operations — monitoring, drift detection, dispute handling.
  5. Developer Guides — day-to-day working rules.

What you can do after Part III

  • Operate the protocol factory with audit-grade logs and reproducible bundles
  • Investigate and respond to disputes using watcher-grade evidence
  • Onboard contributors safely