Why this layer exists
The blockchain suite applies LockJaw doctrine to high-value chain systems where unauthorized execution, governance abuse, and key misuse still routinely survive ordinary controls.
Blockchain Integrity Suite
Can mint, burn, governance, bridge, or privileged execution be proven legitimate before it happens?
The blockchain suite applies LockJaw doctrine to high-value chain systems where unauthorized execution, governance abuse, and key misuse still routinely survive ordinary controls.
Why this layer exists
The blockchain suite applies LockJaw doctrine to high-value chain systems where unauthorized execution, governance abuse, and key misuse still routinely survive ordinary controls.
Question boundary
Can mint, burn, governance, bridge, or privileged execution be proven legitimate before it happens?
Systems
Transaction gating before protected execution.
TXG is the pre-execution gate for protected blockchain actions. A transaction must not execute unless authority, policy, timing, governance, and chain context have already been proven.
Supply integrity for mint and burn systems.
SAE is the supply-integrity specialist for mint and burn actions. It verifies backing, authority, rate, and state constraints before supply changes execute.
Governance attestation for proposals, votes, and upgrades.
GAC determines whether a governance-derived action is legitimate under proposal, quorum, timelock, finality, and scope rules before it can justify execution.
Proof of halted or refused on-chain execution.
NEO produces durable, verifiable proof that a protected blockchain action was refused, halted, or never authorized to execute.
Privileged key custody for blockchain control planes.
KCS binds blockchain key usage to explicit policy, lineage, backend binding, and attested authority so possession of a key is never enough to force execution.
Why the blockchain suite exists
What LockJaw changes
Use cases
Stablecoin operators need mint and burn integrity, key custody, governance legitimacy, and post-incident refusal proof to remain separate and externally checkable.
Open use caseBridge operators need route integrity, source-state witnesses, protected execution, and non-execution proof when the path is unsafe.
Open use caseExchange control planes need protected execution and signer use to remain bounded even under urgent operational pressure.
Open use caseDAO and protocol governance need proposal legitimacy, scope binding, timelock truth, and downstream execution gates that do not trust raw governance claims.
Open use caseTreasury teams need chain key custody, protected transaction gating, and strong refusal posture before assets move.
Open use caseUpgrade paths require governance attestation, signer custody, and execution gating because upgrade keys remain one of the shortest paths to catastrophic loss.
Open use case