Quick route navigation
This is the part of the migration that closes the loop: product-pack selection, proposal submission, private voting, wallet state, proof visibility, and treasury execution in one operational shell.
Payments truth strip
PDAO token strategy for operator and execution paths
Custody truth quick actions
Operators need custody state in the same shell as create, vote, reveal, and execute so launch boundaries stay explicit.
Read-node operator activation
Backend host readiness
Baseline proof and dedicated V3 proof packet are both reviewer-facing
On-chain proof anchors exposed in the Devnet evidence path
Multi-wallet Devnet rehearsal already captured and packaged
Grant, fund, gaming, and enterprise service packs remain part of the UI
UI full, CLI disciplined
Command Center is where real users operate. Engineering-heavy recovery, migration, stress, and batch controls stay in the repo and CLI so the product surface remains clean.
Exact product operations
This route family keeps the full normal-user governance flow inside the UI: connect, create, vote, reveal, execute, log review, and diagnostics. Everything deeper stays in the repo.
Start with Solflare, Phantom, or Backpack and activate the live governance flow.
Use the guided start workspace to move into the DAO creation rail instead of repo setup.
Open the command center and stage governance actions from the product shell.
Commit voting stays inside the live wallet-connected governance surface.
Reveal remains a first-class product action rather than a hidden protocol-only step.
Finalize stays explicit in the UI so the product matches the real on-chain phase boundary before execution.
Execution only becomes visible when the proof and readiness boundary says it is ready.
Execution logs, vote timeline, and treasury state belong inside the operating dashboard.
Runtime evidence, proof freshness, and operational health stay in the product diagnostics route.
These stay outside the buyer-facing flow. They remain accessible through the repo for maintainers, audits, migrations, incident handling, and deep protocol operations.
Choose a product pack
Start from grant, fund, gaming, or enterprise rails so the app can bias the governance and treasury experience correctly.
Create and fund the DAO
Bootstrap the DAO, treasury, governance settings, and wallet-connected runtime surfaces from one product shell.
Submit a private proposal
Proposal cards keep privacy boundary, treasury path, service fit, and hardening expectations visible before a vote begins.
Private vote and execute treasury
Commit, reveal, evidence gates, and treasury execution remain connected to proof packets and runtime diagnostics.
Command-center operating health
Record ceremony evidence in the exact shape needed by the canonical custody proof
docs/multisig-setup-intake.json. Only public keys, public transaction signatures, and readout references belong here.Mainnet requires a hard separation between upgrade authority, treasury authority, and admin authority. PrivateDAO should not carry a single-wallet super-admin posture into production.
Authority transfer has to be observable and reviewable. The credible path is a documented multisig ceremony with signer inventory, role assignment, and transaction-backed handoff evidence.
Until the ceremony is complete, authority hardening remains part of the explicit Mainnet blocker surface. This is a strength when shown honestly rather than implied away.
Strict intake packet
docs/custody-evidence-intake.json, then run npm run apply:custody-evidence-intake. That command updates the canonical intake and rebuilds canonical custody proof, reviewer packet, and launch trust packet artifacts together.