Question 01
Was the action authorized?
Execution Authority Token binds authority at issuance time. Cannot be inflated after the fact. Monotonic authority reduction enforced.
VGS-006 EAT
POST /v1/eat/issue · POST /v1/eat/validate
Question 02
Was the policy current?
Runtime Guard evaluates at execution time — no cached decisions, no stale policies. <250ms latency bound. Fail-closed on timeout.
VGS-001 VER-INV-009
POST /v1/guard/verify
Question 03
Was the evidence sufficient?
Classification hash binds evidence class + payload + timestamp at write time. Reclassification produces different hash — structurally detectable. Harold Nunes validated.
VGS-007 VER-INV-001
POST /v1/evidence/verify
Question 04
Did the state change?
Governance state machine formally verified in TLA+. 3,497 states explored. 0 errors. All transitions proven. Unlisted transitions are impossible by construction.
VGS-002 TLA+ Verified
GET /v1/chain/verify
Question 05
Was escalation required?
REFUSED vs DENY distinction. REFUSED = governance boundary correctly enforced (positive signal). DENY = trust failure. Named approver. Defined SLA. Immutable record.
VGS-003 ISDAIRE
POST /v1/isdaire/certificate
Question 06
Was the outcome verifiable?
Temporal Admissibility Proof answers: "Was this STILL admissible at exact execution moment?" Cryptographically proven. Offline verifiable. No platform required.
VGS-011 TAP
POST /v1/temporal/prove · /v1/temporal/verify
Question 07
Did proof survive?
Offline forensic verifier produces independent verification from exported package alone. No servers. No operator. No platform. Governance receipts survive the platform that issued them.
VGS-008 Zenodo DOI
POST /v1/governance/replay