Principles
- Protected chain actions must be proven legitimate before execution, not explained after loss.
- Mint and burn integrity must be verified before supply moves.
- Governance, refusal, and privileged key use each remain separate bounded questions.