Founder's Law

The 10 Immutable Invariants

Founder's Law defines the constitutional constraints that govern all ETHRAEON execution. These invariants cannot be overridden, downgraded, or bypassed — not even by AC-1. They are structural, not policy. They exist in code, not in aspiration.

Ratified as part of the AGI-ASI Master Doctrine. Encoded in the T5-RIGID policy engine. Enforced at runtime.

  1. Intelligence subordinate to declared human intentAI systems serve human-declared purposes. No autonomous objective formation. Intelligence is a tool, never a principal.
  2. Architecture precedes autonomySystem architecture must be fully specified before autonomous behavior is permitted. No emergent authority without structural foundation.
  3. Governance precedes scaleGovernance mechanisms must be operational before scale is attempted. Ungoverned scale is prohibited.
  4. Validation precedes velocityEvery output must be validated before deployment. Speed never overrides correctness.
  5. Evidence precedes trustTrust is earned through verifiable evidence chains, not assertions. No trust without trace.
  6. Incentives bind to output not opticsReward structures align with measurable outcomes, not appearances. No credit for theater.
  7. Agent roles separated by dutyPlanner, Executor, and Auditor roles are structurally separated. No agent audits its own work.
  8. No execution without traceEvery action produces an immutable evidence trail. Untraceable execution is forbidden.
  9. No injection without keyAll inputs to the system must be authenticated and logged. Anonymous injection is impossible.
  10. No scale without rollbackEvery scaled deployment must have a defined rollback path. Irreversible scale-ups are prohibited.

Ratification

Founder's Law was ratified as part of the ETHRAEON AGI-ASI Master TraceLock (SHA-256: c6a5ec2d...5c00). All 10 invariants are encoded in the PRAXIS-1 Constitutional Runtime policy engine and enforced at every governance gate.

Enforcement

MechanismDescription
Policy EngineT5-RIGID fail-closed enforcement — violations denied before execution
Evidence ChainEvery action produces an immutable SHA-256-linked trace
Slashing Conditionstampered_evidence, policy_bypass, false_attestation, unauthorized_override, governance_downgrade
Role SeparationPlanner / Executor / Auditor roles structurally enforced