Quick route navigation
This page keeps the operator story productized: what is packaged, what is proven, what is still pending-external, and how the verification chain stays coherent inside a professional operations shell.
Telemetry truth for diagnostics reviewers
Runtime, integration, and reviewer proof tied to one infrastructure story
This strip keeps the RPC and telemetry story concrete: hosted reads, runtime evidence, integration proof, and trust surfaces remain linked so the infrastructure case reads like product value rather than hidden backend detail.
Baseline proof and dedicated V3 proof packet are both reviewer-facing
On-chain proof anchors exposed in the Devnet evidence path
Multi-wallet Devnet rehearsal already captured and packaged
Grant, fund, gaming, and enterprise service packs remain part of the UI
Monitoring, alerts, and a compact response loop belong in the product discipline
A full web app needs operational visibility behind the UI. The fastest way to lose trust is letting RPC, wallet, or instruction failures become invisible until users complain.
Repeated retries, duplicate execute attempts, and unexpected proposal-state transitions matter as much as hard downtime in a governance product.
Incident handling should stay deterministic: detect, classify, contain, verify state, collect evidence, and publish the operator update without improvisation.
Export-ready summaries and hosted-read proof for reviewer-grade telemetry
Launch blockers and readiness
Custody workspace and transfer runbooks are live; program authority and operational privileges still need final multisig transaction evidence.
Security review packet exists, but external sign-off is still an explicit blocker.
Wallet runtime templates are documented; production captures are still separated from claims.
Operational rules exist and are linked, but live deployment evidence remains outside the repo surface.
Record ceremony evidence in the exact shape needed by the canonical custody proof
docs/multisig-setup-intake.json. Only public keys, public transaction signatures, and readout references belong here.Mainnet requires a hard separation between upgrade authority, treasury authority, and admin authority. PrivateDAO should not carry a single-wallet super-admin posture into production.
Authority transfer has to be observable and reviewable. The credible path is a documented multisig ceremony with signer inventory, role assignment, and transaction-backed handoff evidence.
Until the ceremony is complete, authority hardening remains part of the explicit Mainnet blocker surface. This is a strength when shown honestly rather than implied away.
Strict intake packet
docs/custody-evidence-intake.json, then run npm run apply:custody-evidence-intake. That command updates the canonical intake and rebuilds canonical custody proof, reviewer packet, and launch trust packet artifacts together.