Canonical organization-governance repository for the Verifrax perimeter, responsible for shared GitHub-level defaults, governed-repository registration, organization policy surfaces, and cross-repository coordination rules without becoming the authored protocol source, authority issuer, governed execution runtime, proof publisher, verifier surface, archive surface, intake surface, or commercial host.
- Repository role: organization governance and shared GitHub defaults only
- Surface class: governance root and repository-perimeter control surface
- Public host ownership: none
- Package status: repository only
- Stack position: upstream GitHub governance surface for the governed repository set
- Authority relation: governance authority is external and bound through AUCTORISEAL plus the governed repository set declared here
- Artifact relation: governance surfaces here must remain aligned with the artifact-0005 boundary in the wider Verifrax system
- License: Apache License Version 2.0
.github defines the Verifrax organization’s GitHub-level governance perimeter, governed-repository registry surfaces, shared defaults, and required coordination rules so the rest of the stack can remain legible, bounded, and cross-repository consistent without turning this repository into protocol authority, runtime authority, proof publication, verification tooling, or evidence-root chain truth.
This repository is the organization-governance root for the Verifrax GitHub perimeter.
Its job is to define the shared GitHub-facing control surfaces that apply across repositories.
That includes:
- organization profile content
- shared community defaults
- shared issue and pull-request templates where used
- governed and non-governed repository manifests
- current governance linkage files
- required GitHub-level discipline for repository changes
- cross-repository legibility rules
- repository-perimeter truth that should not be duplicated inconsistently elsewhere
This repository exists so a reader can determine:
- which repositories are governed
- which repositories are not governed
- how organization-level governance is expressed on GitHub
- where shared authority linkage files live
- which repositories are supposed to remain aligned
- which repositories must not silently claim the same host, role, or authority level
This repository is not:
VERIFRAXAUCTORISEALCORPIFORMVERIFRAX-SPECVERIFRAX-verifyproofSIGILLARIUMapplyVERIFRAX-DOCSARCHITECTURE
It is not:
- the authored protocol source
- the authority issuer
- the governed execution runtime
- the proof publication repository
- the public verifier repository
- the archive/catalog repository
- the intake repository
- the documentation repository
- the evidence-root chain registry
- a package distribution surface
- a catch-all narrative repo
It must not:
- claim to verify truth
- claim to issue authority objects
- claim to execute governed actions
- claim to publish proof material as the proof surface
- claim to archive seal history as the archive surface
- claim to be the primary artifact registry
- contain placeholder quickstarts
- contain fake install flows
- contain generic template prose that outruns live system truth
Governance is not protocol authorship. Governance is not execution. Governance is not verification. Governance is not proof publication.
Without a dedicated governance root, the repository perimeter drifts in predictable ways:
- two repos start claiming the same function
- a derived publication repo starts sounding like the authored source
- a surface repo starts implying protocol authority it does not hold
- package truth and README truth drift apart
- host ownership becomes ambiguous
- organization policy lives only in scattered prose
This repository exists to stop that drift at the GitHub boundary.
The main system split is:
.github— GitHub governance rootVERIFRAX— authored source, maintained implementation surface, and evidence-root chain recordAUCTORISEAL— authority issuance and authority referenceCORPIFORM— governed execution and receipt boundaryVERIFRAX-SPEC— derived publication surface for specification artifactsVERIFRAX-verify— public verifier surfaceproof— public proof publication surfaceSIGILLARIUM— seal/archive reference surfaceapply— intake surface
This repository governs the organization perimeter around those repositories. It does not replace any of them.
These statements must remain explicit and stable:
VERIFRAXauthors normative source material.VERIFRAX-SPECpublishes derived specification artifacts fromVERIFRAX.- Derived artifacts are not upstream authority.
- Governance authority is external and bound through
AUCTORISEALplus the governed repository set declared in this repository.
That boundary matters because the easiest failure mode is dual authority language.
A limiting case shows why:
If .github sounded like the authored source, then VERIFRAX would no longer be the authored source.
If VERIFRAX-SPEC sounded upstream, then derivation would collapse.
If neither boundary is explicit, any repo can start sounding canonical by accident.
This repository should remain the home of the organization-level manifests that define perimeter membership.
Load-bearing governance files include surfaces such as:
governance/GOVERNED_REPOS.txtgovernance/NON_GOVERNED_REPOS.txtgovernance/AUTHORITY_CURRENT.txtgovernance/AUTHORITY_DIGEST.txtgovernance/AUTHORITY_VERSION.txtgovernance/SEAL_SCOPE.txt
Those files exist so governance is inspectable without reading all repositories one by one.
This repository is not the evidence-root registry for artifact-0005. That belongs in the evidence-root surfaces of the wider system.
But this repository must still stay aligned with artifact-0005 because organization governance, governed repo membership, authority linkage, and repository-perimeter truth are part of the chain’s surrounding control boundary.
So the precise relationship is:
.githubdoes not author artifact-0005.githubdoes not issue the artifact-0005 authority object.githubdoes not emit the artifact-0005 governed receipt.githubdoes not register artifact-0005 as the evidence root of record.githubdoes maintain the organization-governance perimeter that artifact-0005 depends on remaining consistent
That is the right level. Anything stronger becomes false.
This repository owns no product host.
It does not own:
https://api.verifrax.net/https://proof.verifrax.net/https://auctoriseal.verifrax.net/https://corpiform.verifrax.net/https://cicullis.verifrax.net/https://verify.verifrax.net/https://sigillarium.verifrax.net/https://apply.verifrax.net/https://docs.verifrax.net/https://status.verifrax.net/
A governance root with no product host should say exactly that.
A reader should land here to answer questions like:
- Which repositories are governed?
- What is the GitHub-level organization boundary?
- What is the authority wording that all repos must preserve?
- Which shared defaults exist across the org?
- What repository is supposed to own which kind of truth?
- Where is the shared governance anchor on GitHub?
A reader should not land here expecting:
- a verifier UI
- a proof viewer
- a runtime API
- a documentation site
- a proof archive
- package installation instructions for the whole system
This repository consumes organization-level governance requirements and the declared repository perimeter.
This repository emits governance-facing GitHub surfaces only, such as:
- shared profile content
- organization-level defaults
- governance manifests
- authority-linkage references
- contribution and review discipline at the organization boundary
It does not emit:
- authority objects
- governed execution receipts
- proof publication outputs
- verifier verdicts
- archive catalogs
- primary evidence-root chain records
A reader trying to understand the system should use this repository as the perimeter entry for governance only.
Typical reading order:
.github— organization governance perimeterVERIFRAX— authored source and evidence-root chain contextAUCTORISEAL— authority layerCORPIFORM— governed execution layerVERIFRAX-SPEC— derived spec publicationVERIFRAX-verify/proof/SIGILLARIUM/apply— outward public surfaces by role
If a reader tries to learn protocol semantics from .github, they are already in the wrong repo.
Changes here affect organization-wide presentation or governance surfaces.
So changes here must be stricter than normal repository prose changes.
At minimum, changes should preserve these rules:
- one repository role per repository
- no host claimed by two repositories
- no derived repo phrased as upstream authority
- no README allowed to outrun package, deployment, or evidence truth
- no placeholder or speculative present-tense language
- no fake CI claims
- no drift between governed-repo manifests and actual repository perimeter
This repository should reflect the org’s intended review boundary.
The working rule is:
- work is prepared on repository branches
- review flows through pull requests
- branch discipline remains explicit
- merge authority is not hidden in ad hoc prose edits
Where the operating policy requires the midiakiasat to verifrax-systems review/merge path, this repository should remain consistent with that discipline instead of implying direct unreviewed mutation.
A governance repository should expose mechanical discipline, not ceremonial language.
Expected governance-facing checks include:
- identity checks for governance files
- determinism checks where governance artifacts must remain reproducible
- repository-perimeter consistency checks
- governed/non-governed manifest consistency checks
- authority-linkage consistency checks
- README truth checks where applicable
A green check here proves governance-surface consistency only. It does not prove authority issuance, runtime execution, verifier parity, or proof publication correctness.
The public organization profile belongs here.
That means this repository is the correct place for:
- organization profile presentation
- org-facing GitHub explanation
- repository-perimeter framing
But it is the wrong place for:
- protocol tutorials that belong in docs
- verifier UX copy that belongs in
VERIFRAX-verify - proof-publication copy that belongs in
proof - runtime contract copy that belongs in
CORPIFORMor the execution surface
A reader should be able to answer these in under fifteen seconds:
- Is this the GitHub governance root? Yes.
- Does it own a public product host? No.
- Does it issue authority? No.
- Does it execute governed runtime actions? No.
- Does it publish proofs? No.
- Does it verify proofs as the verifier surface? No.
- Does it define the governed repository perimeter? Yes.
- Must it stay aligned with artifact-0005 in the wider system? Yes.
If those answers are not immediate, the README is still too weak.
The governed Verifrax path that this README must stay compatible with is:
.github— organization governance and governed repository boundaryAUCTORISEAL— authority issuance and public authority referenceCORPIFORM— governed execution and receipt emissionVERIFRAX— authored protocol, evidence root, and artifact-chain registration boundaryVERIFRAX-SPEC— derived specification publication surfaceVERIFRAX-PROFILES— deterministic profile-constraint surfaceVERIFRAX-SAMPLES— pinned sample and reproducibility surfaceVERIFRAX-verify— public verification repository and UI boundaryVERIFRAX-DOCS— explanatory documentation surfacecicullis— enforcement boundaryproof— proof publication surfaceSIGILLARIUM— seal and archive reference surfaceapply— intake surface
The live host-label map that must remain explicit and non-contradictory is:
https://api.verifrax.net/— execution surfacehttps://proof.verifrax.net/— proof publication surfacehttps://auctoriseal.verifrax.net/— authority issuance and authority reference surfacehttps://corpiform.verifrax.net/— runtime and receipt reference surfacehttps://cicullis.verifrax.net/— enforcement reference surfacehttps://verify.verifrax.net/— public verification surfacehttps://sigillarium.verifrax.net/— seal and archive reference surfacehttps://apply.verifrax.net/— intake surfacehttps://docs.verifrax.net/— documentation surface
This README must remain compatible with artifact-0005 as the load-bearing authority → execution → verification → evidence boundary without claiming that this repository alone authors, proves, seals, or registers artifact-0005 unless that role is actually true for this repository.
Treat this repository as organization-governance infrastructure.
Do not use public issues for sensitive findings. If repository-specific security handling exists elsewhere, follow that repository’s security boundary too.
Governance drift is not harmless here because a wrong governance README can make multiple other repositories sound wrong at once.
A contribution here is wrong if it:
- makes
.githubsound like the authored protocol source - makes
.githubsound like the authority issuer - makes
.githubsound like the execution runtime - makes
.githubsound like the proof or verifier surface - introduces placeholder quickstarts
- introduces fake host claims
- weakens the authority-direction wording
- drops artifact-0005 perimeter alignment from the organization view
- blurs governed and non-governed repository membership
Apache License Version 2.0. See LICENSE.