Permission sources
Execution permission is sourced from four artifacts, each of which must be present and coherent for a governed action to proceed.
runtime/airlock/envelopes/.Verification mechanisms
Three phases verify, freeze, and consume that authority — in that order, with no skipping or reordering.
Phase 6 · ACA-v1
Evaluates the authority chain. Confirms envelope/session pointer coherence, manifest integrity, scope conformance, and quarantine constraints. Outcome is APPROVED or DENIED/HALT; nothing in between.
Phase 6.5 · Airlock / Heartbeat
Proves enforcement and frozen state. Locks non-target governance surfaces to read-only, emits heartbeat evidence, and atomically loads the admitted inputs for handoff. No partial continuation is permitted on failure.
Phase 7 · Execution
Consumes the frozen context and does not originate authority. The runtime is a blind worker surface; it cannot re-verify governance law or infer permission from prose or diagnostics.
HALT semantics reference
For canonical HALT semantics — the codes, namespace, and routing — refer to:
docs/runtime/07_execution/halt_codes.mddocs/01_governance/artifact_roles.md
HALT is terminal and non-optional. A surface that suppresses or downgrades HALT is no longer a governed surface.
Execution taxonomy
Canonical references
The authoritative artifacts that this overview interprets but does not replace.
docs/01_governance/artifact_roles.mddocs/01_governance/authority_lattice.mddocs/01_governance/version_manifest.mddocs/00_ARCHITECTURE_PHASE_BOUNDARIES.mddocs/runtime/04_negotiation/00_NTA_USAGE.mddocs/runtime/06_admission/