Foundation Design
Build the proof commons in a neutral home.
OpenCompliance should not look like one vendor's side project with a good essay attached. If the semantic layer is meant to be shared by vendors, customers, auditors, and end users, it needs a public home, explicit anti-capture rules, and a review process that punishes hand-waving.
0
sponsor-weighted votes in the proposed model
7
day-one public repositories in the proposed org map
3
artifact classes kept separate: proofs, attestations, judgment
1
hard honesty rule: say what is not built yet
Principle 1
Do not flatten epistemology
Proofs, signed attestations, and judgment calls are different things. The commons must keep them separate instead of compressing them into one status light.
Principle 2
Keep semantics public
Mappings, proof boundaries, schemas, and conformance rules should be versioned, reviewable, and reusable by anyone.
Principle 3
Sponsors fund work, not meaning
Commercial support is welcome. Buying extra control over normative text is not.
Principle 4
Stay explicit about limits
If something is incomplete, mark it incomplete. If legal judgment is still required, say so directly.
Principle 5
Publish inspectable trust chains
Prefer signed artifacts, canonical digests, append-only transparency, witness reruns, and visible revocation over static PDFs and unverifiable prose.
Principle 6
Optimise for the full trust chain
The project should improve trust for vendors, their customers, and the people at the far end of the chain who bear the real-world consequences.
opencompliance-foundation/
site public docs and project explanation
governance charter, governance, sponsor model, conflicts
specs normative public artifact formats
lean4-controls formal control corridor in Lean 4
evidence-schema typed evidence claim schemas
conformance tests and verifier behaviour checks
examples synthetic bundles and replay fixtures
later, only when justified:
reference-verifier
connectors
Round 0
Honesty gate
Run a blunt pre-flight review first. Kill hype, separate current reality from aspiration, and make every document say what is not built yet.
Round 1
Verifier and trust chain
Pressure-test the formal methods story, signed artifacts, transparency, witness reruns, and conformance claims.
Round 2
Law, privacy, and compliance
Force the docs to survive hostile readings from privacy, legal-formalisation, and compliance-semantics perspectives.
Round 3
Security and incentives
Ask how the trust claims can be gamed, how the incentives can drift, and which shortcuts the market will try the moment the docs look successful.
Round 4
Foundation realism
Check that the governance and funding model could survive real contributors, real sponsors, and real maintenance burden.
Round 5
Actual industry review
Bring in vendors, buyers, auditors, privacy counsel, standards maintainers, and public-interest reviewers before treating the documents as settled.