Triple-Leaf Ledger

Authorization proves intent.
Execution proves reality.

Every governed action produces three cryptographically linked leaves. Not just "was it permitted" — but "did what happened match what was permitted." The gap between authorization and execution is measurable, auditable, and closed.

Triple-Leaf Structure Active
Leaf 1 — Authorization
Intent
Leaf 2 — Execution
Reality
Leaf 3 — Variance
Gap
3 Leaves per action Every other system records what happened after execution. AGTS proves authorization existed before — and measures what actually happened against it.
Canonical Leaf Types
0
Cross-Leaf Linkages
0
Variance Classifications
0
Observable Dimensions
0
H · C · E

The Accountability Gap

Most governance systems stop at authorization. They record that an action was permitted. But between permission and execution, anything can change — model drift, supply chain excursions, financial overshoot. The governance record says "permitted." Reality says something different. Without an execution witness, the gap is invisible.

Model Drift

A model authorized for deployment at safe parameters can drift during execution. The authorization leaf says "permitted." Reality says something different.

Supply Chain Excursion

A shipment authorized under cold chain conditions can experience a temperature excursion. The authorization exists. The deviation does not appear without closed-loop capture.

Financial Overshoot

A trading algorithm authorized within VaR limits can exceed them during a market event. Invisible without an execution witness.

The Triple-Leaf Ledger

Three Cryptographically Linked Leaves Per Governed Action
Leaf 1 · Authorization "This action was permitted under these conditions." type: AGTS_GOVERNANCE_ENVELOPE_V1 Contains: proof_bundle_hash · quorum_certificate · authority_signature · log_binding parent_auth_leaf_hash log enforces: no execution leaf without valid parent authorization Leaf 2 · Execution "This is what actually happened." type: AGTS_EXECUTION_TRACE_V1 Contains: post-exec H/C/E state · execution_metrics_hash · outcome · parent_auth_leaf_hash parent_auth_leaf_hash + parent_exec_leaf_hash log enforces: no variance record without both parent leaves Leaf 3 · Variance "This is the measured gap: Δ = ‖V_auth − V_exec‖" type: AGTS_VARIANCE_RECORD_V1 Contains: ΔH · ΔC · ΔE · l2_distance · NOMINAL/DRIFT/BREACH · omega_breach feeds back into next cycle HCE observables updated · nudge applied → next authorization cycle (closed loop)

Cross-leaf integrity. All three leaves are in the same transparency log. The log enforces linkage: an execution trace cannot be admitted without a valid parent authorization. A variance record cannot be admitted without both parent leaves present. No orphans. No fabricated execution data.

Leaf Architecture

Leaf 1

Authorization

Type: AGTS_GOVERNANCE_ENVELOPE_V1

Contains: proof bundle, validator quorum signatures, Sovereign Authority signature, log binding.

Fires: after 3-of-4 validator quorum and Sovereign Authority signing

Leaf 2

Execution

Type: AGTS_EXECUTION_TRACE_V1

Contains: post-execution H/C/E state, domain metrics hash, outcome pre-classification, parent_auth_leaf_hash.

Fires: after the authorized action executes

Leaf 3

Variance

Type: AGTS_VARIANCE_RECORD_V1

Contains: per-observable deltas (ΔH, ΔC, ΔE), L2 distance, NOMINAL/DRIFT/BREACH classification, omega_breach flag.

Fires: after execution trace is admitted

Variance Classification

The L2 distance between authorization state and execution state in the health-space [H, C, 1−E] determines the outcome:

ClassificationL2 DistanceMeaningHCE Effect
NOMINAL ≤ 0.05 Execution matched authorized intent +H +C −E (positive nudge)
DEVIATED ≤ 0.20 Measurable drift, within operational tolerance −H −C +E (mild negative nudge)
BREACHED > 0.20 Execution exceeded authorized bounds −−H −−C ++E (strong negative nudge)

Omega Breach

The most critical scenario

auth_in_omega = true (system was in safe region Ω when authorized) exec_in_omega = false (system exited Ω during execution) omega_breach = true (governance gap — authorized safe, executed unsafe)

The five-gate validation correctly permitted the action — the system was healthy at authorization time. But the execution drove the state outside the admissible region. Without the closed loop, this breach is invisible. The log shows a valid authorization leaf and nothing else.

What Monitors See

Filter: AGTS_VARIANCE_RECORD_V1 with classification: "BREACH" → governance gap detected, L2 distance exceeded threshold Filter: omega_breach = true → system authorized inside safe region Ω, executed outside it Filter: drift_direction showing which observables degraded → "H: degraded" means epistemic uncertainty worsened → "C: degraded" means model coherence dropped → "E: degraded" means execution entropy increased

No access to the operator's systems. No proprietary data. Just the governance record in the public log, verifiable with standard SHA-256 and ECDSA operations.

The Feedback Loop

NOMINAL

Positive nudge — execution confirmed governance quality. Next authorization starts from a stronger baseline.

DRIFT

Mild negative nudge — operational tolerance but degrading. Governance tightens gradually.

BREACH

Strong negative nudge. Three consecutive breaches trigger QUARANTINE — autonomous authorization suspended until remediated.

Iterative Refinement Cycle. The system learns from its own execution variance and adjusts its governance posture automatically. The feedback is one-directional and forward-only: variance from cycle N affects observables for cycle N+1. The append-only log guarantees no retroactive modification.

Not just "was it permitted."
Did what happened match what was permitted.

The Triple-Leaf Ledger is the only governance architecture that closes the gap
between authorization and execution — cryptographically, independently, in real time.

Compliance Mapping Start Free Trial