Trust

Safety is architecture in MAPLE, not a policy memo

The platform is built around hard runtime guarantees: explicit authority, deny-by-default capability grants, immutable receipts, and a commitment boundary that cannot be bypassed by application code.

Architectural Invariants

Runtime guarantees that shape all governed execution

Invariant 1

Presence precedes meaning

Invariant 2

Meaning precedes intent

Invariant 3

Intent precedes commitment

Invariant 4

Commitment precedes consequence

Invariant 5

Coupling is bounded by attention

Invariant 6

Safety overrides optimization

Invariant 7

Human agency cannot be bypassed

Invariant 8

Failure must be explicit

Control Tiers

Higher-risk actions demand stronger gate posture

TierExampleTypical control posture
Tier 0Read-only and simulation flowsLogging plus lightweight validation
Tier 1External I/O and low-risk side effectsCommitment receipt, policy check, capability grant
Tier 2Funds movement or regulated data handlingApprovals, stronger evidence requirements, richer audit trails
Tier 3Operator upgrades and self-modifying behaviorHighest scrutiny, staged rollout, replay verification

Audit Surfaces

What operators can inspect after a decision

maple commit submit --file payment.json
maple provenance worldline-history <worldline-id>
GET /api/v1/commitments/:id/audit-trail
GET /api/v1/provenance/worldline/:id/history

Need the detailed trust model?

The docs section includes the architectural invariants, profiles, and commitment-boundary details behind MAPLE's trust posture.