Authority-governed execution and receipt surface for the governed Verifrax system.
Current release identity:
- Version: v0.1.4
- State: PRE-FINAL EXECUTION SURFACE
- Release type: PUBLIC PRE-SEAL
- Authority model: EXTERNAL (AUCTORISEAL-GOVERNED)
- Determinism: REQUIRED
- Replay: FORBIDDEN (ENFORCED BY RECEIPT)
- Compatibility: GUARANTEED WITHIN RECORDED EXECUTION BOUNDARY (artifact-0004)
- Layer: Execution
- Repository class: governed runtime surface
- Public host ownership:
corpiform.verifrax.net - npm package:
@verifrax/corpiform - Current repository posture: public pre-seal execution surface
- License: Apache License Version 2.0
CORPIFORM consumes recorded authority, admits or refuses bounded execution, and emits deterministic receipts that VERIFRAX and public verifier surfaces can inspect without treating execution itself as truth.
CORPIFORM is the execution layer of the Verifrax stack.
It exists to provide:
- authority-gated execution admission
- deterministic refusal behavior
- execute-once and replay-resistant runtime control
- receipt emission for governed execution
- explicit runtime boundary between authority, execution, and verification
- inspectable execution semantics for the recorded artifact chain
This repository is where authority becomes bounded consequence.
This repository is not:
- the authored protocol repository
- the authority issuance repository
- the derived specification publication surface
- the public proof publication surface
- the public verifier UI
- the intake surface
- the commercial landing surface
- a substitute for VERIFRAX evidence judgment
- a source of authority minting
CORPIFORM does not:
- issue authority objects
- decide normative truth on its own
- replace VERIFRAX verification
- replace public verifier inspection
- act as marketing or docs fallback
Execution here is permitted consequence, not upstream truth.
The governed path reads in this order:
.github— governed repository boundary and governance linkageAUCTORISEAL— authority issuance and authority publicationCORPIFORM— governed execution and receipt emissionVERIFRAX— evidence root, artifact chain, and verification boundaryVERIFRAX-verify— public verification surface
CORPIFORM sits after authority issuance and before evidence judgment.
CORPIFORM requires externally grounded authority.
The required authority direction across the governed system is:
- VERIFRAX authors normative source material.
- VERIFRAX-SPEC publishes derived specification artifacts from VERIFRAX.
- Derived artifacts are not upstream authority.
- Governance authority is external and bound through AUCTORISEAL plus the governed repo set in
.github.
CORPIFORM must therefore remain authority-dependent.
It may consume authority. It may not mint authority. It may not override authority.
This repository owns the runtime reference surface for:
https://corpiform.verifrax.net/
That host must remain execution-reference only.
It must not become:
api.verifrax.net- proof publication
- verifier UI
- intake flow
- docs mirror
- commercial landing
If a second live execution host exists, this README must say so explicitly. Otherwise CORPIFORM remains runtime/reference only while api.verifrax.net remains the sole execution surface.
Package identity for this repository is:
- npm package:
@verifrax/corpiform - repository:
Verifrax/CORPIFORM
Any version, tag, README status line, release note, and evidence reference must agree exactly.
This README must not imply broader compatibility than the recorded execution boundary proves.
CORPIFORM exists to turn a valid authority state into either:
- permitted execution with receipt emission
- explicit refusal with deterministic refusal output
Execution is allowed only when required runtime conditions hold, including at minimum:
- authority presence
- authority validity
- scope match
- admissible runtime boundary
- non-revoked state
- non-replayed execution state
If those conditions fail, execution must not occur.
A refusal is not a soft warning. It is the runtime result.
The load-bearing runtime outputs are:
Receipts bind the admitted execution to a bounded record that downstream evidence and verifier surfaces can inspect.
A receipt must remain deterministic enough to support:
- recorded artifact linkage
- digest reproduction
- cross-implementation verification where declared
- evidence registration in VERIFRAX
Refusals are canonical runtime outcomes when admission conditions fail.
This repository must treat refusal as first-class, not as an implementation afterthought.
CORPIFORM is already part of the recorded chain through artifact-0004 and is load-bearing for artifact-0005.
The currently recorded compatibility boundary is the artifact-0004 execution boundary.
That means this README may describe artifact-0004 as the recorded bounded execution boundary.
It must not describe artifact-0004 as equivalent to full public canonical seal.
CORPIFORM is required for artifact-0005 because artifact-0005 depends on:
- execution under public canonical authority
- recorded CORPIFORM receipt output
- reproducible receipt linkage into VERIFRAX evidence
- matching downstream verification interpretation
This repository must therefore mention artifact-0005 as an active dependency boundary.
It must not describe artifact-0005 as sealed or complete unless the VERIFRAX evidence root proves that state.
CORPIFORM produces runtime material that downstream verifier surfaces interpret.
That means this repository must remain legible to both:
VERIFRAXas the evidence and verification boundaryVERIFRAX-verifyas the public verification surface
If receipt semantics drift without evidence repair, the execution layer becomes unreadable downstream.
This repository consumes:
- authority references produced by AUCTORISEAL
- governed boundary truth from
.github - runtime input sets for bounded execution
- command and scope material required by the selected execution body
This repository produces:
- permitted execution results
- receipt artifacts
- refusal artifacts
- deterministic runtime state transitions within its declared boundary
It does not produce:
- authority objects
- authored protocol source material
- derived specification publication
- proof landing content
- public verifier UI
Read this repository for runtime semantics, receipt semantics, and execution admission/refusal boundaries.
Read these neighboring repositories for the rest of the chain:
.github— governance rootAUCTORISEAL— authority issuance and publicationVERIFRAX— evidence root and artifact chainVERIFRAX-verify— public verification surfaceVERIFRAX-SPEC— derived specification publicationVERIFRAX-DOCS— documentation/reference surface
Any CI described here must be real and load-bearing.
At minimum, CORPIFORM should enforce real checks for:
- identity alignment
- version and tag alignment
- deterministic receipt behavior on fixed input
- receipt schema stability
- authority-reference consistency
- runtime boundary drift detection
This README must not use badge theater to imply execution guarantees that the runtime and evidence do not actually prove.
The governed Verifrax path that this README must stay compatible with is:
.github— organization governance and governed repository boundaryAUCTORISEAL— authority issuance and public authority referenceCORPIFORM— governed execution and receipt emissionVERIFRAX— authored protocol, evidence root, and artifact-chain registration boundaryVERIFRAX-SPEC— derived specification publication surfaceVERIFRAX-PROFILES— deterministic profile-constraint surfaceVERIFRAX-SAMPLES— pinned sample and reproducibility surfaceVERIFRAX-verify— public verification repository and UI boundaryVERIFRAX-DOCS— explanatory documentation surfacecicullis— enforcement boundaryproof— proof publication surfaceSIGILLARIUM— seal and archive reference surfaceapply— intake surface
The live host-label map that must remain explicit and non-contradictory is:
https://api.verifrax.net/— execution surfacehttps://proof.verifrax.net/— proof publication surfacehttps://auctoriseal.verifrax.net/— authority issuance and authority reference surfacehttps://corpiform.verifrax.net/— runtime and receipt reference surfacehttps://cicullis.verifrax.net/— enforcement reference surfacehttps://verify.verifrax.net/— public verification surfacehttps://sigillarium.verifrax.net/— seal and archive reference surfacehttps://apply.verifrax.net/— intake surfacehttps://docs.verifrax.net/— documentation surface
This README must remain compatible with artifact-0005 as the load-bearing authority → execution → verification → evidence boundary without claiming that this repository alone authors, proves, seals, or registers artifact-0005 unless that role is actually true for this repository.
Do not publish authority secrets, private runtime credentials, hidden execution inputs, unpublished emergency controls, or compromise details that would weaken the governed execution boundary.
Runtime compromise is not a documentation-only problem. It is an execution-integrity event.
A contribution is wrong if it:
- blurs execution with authority issuance
- blurs execution with truth verification
- overclaims compatibility beyond the recorded boundary
- hides receipt semantics behind prose only
- weakens refusal semantics
- weakens replay resistance
- introduces future-state claims as current truth
Apache License Version 2.0. See LICENSE.