Founder's Law
The 10 Immutable Invariants
Founder's Law defines the constitutional constraints that govern all ETHRAEON execution. These invariants cannot be overridden, downgraded, or bypassed — not even by AC-1. They are structural, not policy. They exist in code, not in aspiration.
Ratified as part of the AGI-ASI Master Doctrine. Encoded in the T5-RIGID policy engine. Enforced at runtime.
- Intelligence subordinate to declared human intentAI systems serve human-declared purposes. No autonomous objective formation. Intelligence is a tool, never a principal.
- Architecture precedes autonomySystem architecture must be fully specified before autonomous behavior is permitted. No emergent authority without structural foundation.
- Governance precedes scaleGovernance mechanisms must be operational before scale is attempted. Ungoverned scale is prohibited.
- Validation precedes velocityEvery output must be validated before deployment. Speed never overrides correctness.
- Evidence precedes trustTrust is earned through verifiable evidence chains, not assertions. No trust without trace.
- Incentives bind to output not opticsReward structures align with measurable outcomes, not appearances. No credit for theater.
- Agent roles separated by dutyPlanner, Executor, and Auditor roles are structurally separated. No agent audits its own work.
- No execution without traceEvery action produces an immutable evidence trail. Untraceable execution is forbidden.
- No injection without keyAll inputs to the system must be authenticated and logged. Anonymous injection is impossible.
- No scale without rollbackEvery scaled deployment must have a defined rollback path. Irreversible scale-ups are prohibited.
Ratification
Founder's Law was ratified as part of the ETHRAEON AGI-ASI Master TraceLock (SHA-256: c6a5ec2d...5c00). All 10 invariants are encoded in the PRAXIS-1 Constitutional Runtime policy engine and enforced at every governance gate.
Enforcement
| Mechanism | Description |
| Policy Engine | T5-RIGID fail-closed enforcement — violations denied before execution |
| Evidence Chain | Every action produces an immutable SHA-256-linked trace |
| Slashing Conditions | tampered_evidence, policy_bypass, false_attestation, unauthorized_override, governance_downgrade |
| Role Separation | Planner / Executor / Auditor roles structurally enforced |