PricingDemo
Log InGet API Key
Draft v1.0

HATS Governance Specification

H33 AI Trust Standard — Governance Protocol Specification

Version 1.0.0
Date 2026-05-17
Editor Eric Beans
Status Draft

Abstract

This specification defines the HATS (H33 AI Trust Standard) Governance Protocol — a vendor-neutral, implementation-agnostic standard for cryptographic operational governance. HATS defines how operational decisions are recorded, linked, replayed, verified, and enforced across distributed systems.

A HATS-compliant system produces a formally verifiable governance graph where every operational decision is a node, every dependency is an edge, and the entire structure can be independently verified by any party without trusting the platform that produced it.

Status of This Document

This is a Draft specification. Normative requirements use RFC 2119 keywords: MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, OPTIONAL.

1. Conformance Terminology

1.1 RFC 2119 Keywords

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.

1.2 Conformance Levels

HATS-Compliant: An implementation that satisfies all MUST requirements for at least one Governance Capability Profile (Section 17).

HATS-Compatible: An implementation that can consume and produce HATS governance artifacts but may not satisfy all MUST requirements.

HATS-Conformant: An implementation that passes the full HATS Conformance Suite for its declared Capability Profile.

Verifier-Grade: An implementation capable of independently verifying HATS governance bundles with zero infrastructure dependencies.

Replay-Grade: An implementation capable of deterministic governance replay producing identical frame hashes as any other Replay-Grade implementation given identical inputs.

2. Node Types

2.1 Governance Node Envelope

Every governance node MUST expose the following fields:

FieldTypeRequiredDescription
node_typeEnumREQUIREDOne of the 8 defined node types
canonical_hashByte[32]REQUIREDCommitment hash over all node content
transcript_versionUint8REQUIREDProtocol version at creation time
signer_key_idByte[32]REQUIREDHash of the signer's public key
parent_refsArray<Byte[32]>REQUIREDHashes of parent governance nodes
timestamp_msUint64REQUIREDCreation time (ms since Unix epoch)
tenant_id_hashByte[32]OPTIONALHash of the tenant/account identity

HATS-N-001
Every governance node MUST contain all REQUIRED fields.

HATS-N-002
The canonical_hash MUST be computed using the Canonical Serialization rules (Section 5) and the active Cryptographic Profile (Section 6).

HATS-N-003
The signer_key_id MUST be the hash of the signer's public key using the active hash function.

2.2 Node Type Definitions

Type IDNameDescriptionMin Parents
1RouteEngine selection decision0
2PolicyPolicy gate evaluation1 (Route)
3EventAuthenticated operation0–2 (Route, Policy)
4ResultComputation output1–3 (Route, Policy, Event)
5StateTransitionGoverned state mutation4 (Route, Policy, Result, Event)
6CheckpointIntegrity snapshot0
7FederationMulti-node aggregation1+ (Checkpoints)
8AnchorExternal binding1 (Federation)

HATS-N-004
Implementations MAY define additional node types using the extension namespace (Section 21). Extended node types MUST use type IDs >= 100.

HATS-N-005
StateTransition nodes MUST have at least 4 parent references (Route, Policy, Result, Event).

3. Receipt Schemas

3.1 Common Receipt Fields

Every receipt MUST include:

FieldTypeDescription
receipt_hashByte[32]Commitment over all receipt fields
pq_signatureBytesPost-quantum signature over receipt_hash
signer_key_idByte[32]Hash of signer's public key
signature_algorithmStringAlgorithm identifier from active profile
timestamp_msUint64Receipt creation time
transcript_versionUint8Protocol version

HATS-R-001
The receipt_hash MUST be computed using Canonical Serialization (Section 5).

HATS-R-002
The pq_signature MUST be computed over the raw receipt_hash bytes, not over a serialized representation.

3.2 Route Decision Receipt

FieldTypeRequired
request_hashByte[32]REQUIRED
selected_engineStringREQUIRED
rejected_enginesArray<{engine, reason}>REQUIRED
policy_versionStringREQUIRED
security_targetStringREQUIRED
hardware_snapshot_idStringREQUIRED
latency_target_usUint64REQUIRED
credit_costUint32REQUIRED
stage1_hashByte[32]REQUIRED

HATS-R-003
Every Route Decision Receipt MUST include at least one rejected engine OR document that only one engine was eligible.

3.3 Policy Decision Receipt

FieldTypeRequired
policy_idStringREQUIRED
policy_versionStringREQUIRED
request_hashByte[32]REQUIRED
route_receipt_hashByte[32]REQUIRED
decisionEnum(Allowed, Denied)REQUIRED
enforcement_modeEnum(Enforce, AuditOnly)REQUIRED
required_security_targetStringREQUIRED
data_classificationStringREQUIRED
tenant_id_hashByte[32]REQUIRED

HATS-R-004
A Denied policy decision MUST NOT produce a successful execution event in the same governance lineage.

3.4 Result Attestation Receipt

FieldTypeRequired
request_hashByte[32]REQUIRED
route_receipt_hashByte[32]REQUIRED
policy_decision_hashByte[32]REQUIRED
event_hashByte[32]REQUIRED
engine_idStringREQUIRED
parameter_set_idStringREQUIRED
input_commitmentByte[32]REQUIRED
output_commitmentByte[32]REQUIRED
statusEnum(Success, Failed)REQUIRED
error_codeStringOPTIONAL

HATS-R-005
A Failed result MUST NOT be bound to a successful governed execution event.

3.5 State Transition Receipt

FieldTypeRequired
state_namespaceStringREQUIRED
namespace_sequenceUint64REQUIRED
prior_state_commitmentByte[32]REQUIRED
new_state_commitmentByte[32]REQUIRED
mutation_idStringREQUIRED
tenant_id_hashByte[32]REQUIRED
actor_identity_hashByte[32]REQUIRED

HATS-R-006
Within a namespace, transition N+1's prior_state_commitment MUST equal transition N's new_state_commitment.

HATS-R-007
Duplicate mutation_id values within the same namespace MUST be rejected.

3.6 Enforcement Decision Receipt

FieldTypeRequired
triggerStringREQUIRED
actionStringREQUIRED
levelEnum (Section 15)REQUIRED
affected_tenantByte[32]OPTIONAL
affected_namespaceStringOPTIONAL
policy_profile_templateStringREQUIRED

HATS-R-008
Every enforcement decision MUST itself be signed and auditable. Enforcement operates within the governance chain, not outside it.

4. Graph Semantics

4.1 Directed Acyclic Graph

The governance graph is a directed acyclic graph (DAG) where nodes are governance objects and edges are parent references.

HATS-G-001
The governance graph MUST be acyclic. Implementations MUST reject graphs containing cycles.

HATS-G-002
Every parent_ref in a node MUST reference a node that exists in the graph (no orphan references).

HATS-G-003
The graph MUST NOT contain nodes where a tenanted child references a parent with a different tenant_id_hash (cross-tenant contamination).

HATS-G-004
All nodes within a governance graph MUST share the same transcript_version, unless the graph spans a documented version migration.

HATS-G-005
StateTransition nodes MUST have at least 4 parent references (Route, Policy, Result, Event). Fewer indicates incomplete governance lineage.

4.2 Graph Root Hash

HATS-G-006
The graph root hash MUST be computed by sorting all nodes by (node_type, canonical_hash) and hashing the sorted sequence with a domain separator.

HATS-G-007
The graph root hash MUST be deterministic: identical logical graphs MUST produce identical root hashes regardless of node insertion order.

4.3 Merkle Root

HATS-G-008
The graph Merkle root MUST be computed over the sorted canonical_hash values using a binary Merkle tree with a domain separator. Non-power-of-two counts MUST be padded with zero hashes.

5. Canonical Serialization Semantics

5.1 Purpose

Canonical serialization ensures that identical logical content produces identical byte sequences across implementations, languages, architectures, and compiler versions.

HATS-S-001
Implementations MUST use the canonical serialization rules defined in this section for all hash computations.

5.2 Integer Encoding

HATS-S-002
All integers MUST be encoded in little-endian byte order.

TypeEncoding
Uint81 byte
Uint162 bytes, little-endian
Uint324 bytes, little-endian
Uint648 bytes, little-endian

5.3 String Encoding

HATS-S-003
Strings MUST be encoded as a Uint32 length prefix followed by UTF-8 bytes.

HATS-S-004
Strings MUST be NFC-normalized (Unicode Normalization Form C) before encoding.

HATS-S-005
Empty strings MUST be encoded as a Uint32 zero length prefix (4 zero bytes). Empty is NOT the same as absent.

5.4 Byte Arrays

HATS-S-006
Fixed-size byte arrays (e.g., Byte[32]) MUST be encoded as raw bytes without a length prefix.

HATS-S-007
Variable-size byte arrays MUST be encoded as a Uint32 length prefix followed by the raw bytes.

5.5 Booleans

HATS-S-008
Booleans MUST be encoded as a single byte: 0x00 for false, 0x01 for true.

5.6 Null / Optional Values

HATS-S-009
Optional fields that are present MUST be preceded by a presence byte 0x01 followed by the encoded value.

HATS-S-010
Optional fields that are absent MUST be encoded as a single byte 0x00.

5.7 Arrays

HATS-S-011
Arrays MUST be encoded as a Uint32 element count followed by each element in order.

5.8 Maps

HATS-S-012
Maps MUST be encoded as a Uint32 entry count followed by key-value pairs sorted by the canonical byte encoding of the key (lexicographic byte order).

5.9 Struct / Record Fields

HATS-S-013
Struct fields MUST be encoded in declaration order as specified in this document. Field order is part of the canonical format.

5.10 Domain Separators

HATS-S-014
Every hash computation MUST begin with a domain separator string that identifies the object type. Domain separators are NOT length-prefixed — they are raw ASCII bytes.

ObjectDomain Separator
Route ReceiptH33_ROUTE_DECISION_RECEIPT_V1:
Policy ReceiptH33_POLICY_DECISION_RECEIPT_V1:
Result ReceiptH33_RESULT_ATTESTATION_V1:
State TransitionH33_STATE_TRANSITION_V1:
Enforcement ReceiptH33_ENFORCEMENT_DECISION_V1:
Integrity ReceiptH33_INTEGRITY_RECEIPT_V1:
CheckpointH33_INTEGRITY_CHECKPOINT_V1:
FederationH33_FEDERATION_CHECKPOINT_V1:
AnchorH33_ANCHOR_RECORD_V1:
Graph RootH33_GOVERNANCE_GRAPH_V1:
Graph MerkleH33_GRAPH_MERKLE:
Replay FrameH33_REPLAY_FRAME_V1:
Replay DiffH33_REPLAY_DIFF_V1:

5.11 Timestamp Precision

HATS-S-015
All timestamps MUST be encoded as Uint64 milliseconds since Unix epoch (1970-01-01T00:00:00Z). Microsecond or nanosecond precision MUST NOT be used in canonical serialization.

6. Cryptographic Agility Profiles

6.1 Profile Structure

A Cryptographic Profile defines the hash function, signature algorithm, and any additional cryptographic parameters.

HATS-C-001
Every HATS governance artifact MUST declare its Cryptographic Profile.

6.2 REQUIRED Baseline Profile

Profile ID: HATS-PROFILE-PQ-SHA3-256-v1

ParameterValue
Hash FunctionSHA3-256 (FIPS 202)
Signature AlgorithmML-DSA-65 (FIPS 204) or ML-DSA-87
Hash Output32 bytes
Signature OutputVariable (ML-DSA)
Key ID DerivationSHA3-256 of public key bytes

HATS-C-002
All HATS-Compliant implementations MUST support HATS-PROFILE-PQ-SHA3-256-v1.

6.3 OPTIONAL Profiles

Profile IDHashSignatureStatus
HATS-PROFILE-BLAKE3-v1BLAKE3ML-DSA-65OPTIONAL
HATS-PROFILE-STARK-POSEIDON-v1PoseidonSTARK proofOPTIONAL
HATS-PROFILE-HYBRID-v1SHA3-256ML-DSA-65 + Ed25519OPTIONAL

HATS-C-003
Implementations MAY define additional profiles using the extension namespace (Section 21). Custom profiles MUST use the prefix x-hats-profile-.

6.4 Profile Negotiation

HATS-C-004
When a verifier encounters a bundle using an unsupported profile, it MUST reject the bundle with error UNSUPPORTED_PROFILE rather than silently degrading.

HATS-C-005
Profile migration within a governance graph MUST be documented via a transcript version increment.

7. Determinism Requirements

This section defines the most critical property of the HATS standard: given identical inputs, compliant implementations MUST produce identical outputs.

HATS-D-001
Given identical governance graph content and identical replay target (timestamp or checkpoint hash), compliant Replay-Grade implementations MUST produce identical frame hashes.

HATS-D-002
Given identical governance graph content, compliant implementations MUST produce identical graph root hashes regardless of node insertion order.

HATS-D-003
Given identical receipt fields, compliant implementations MUST produce identical receipt_hash values.

HATS-D-004
Given identical input to a deterministic router, compliant implementations MUST produce identical routing decisions and identical stage1 determinism hashes.

HATS-D-005
Determinism MUST be tested using the HATS Conformance Suite test vectors. An implementation that produces different hashes from the test vectors is NOT HATS-Conformant.

HATS-D-006
Floating-point arithmetic MUST NOT be used in any hash computation or canonical serialization path. All values MUST be integer or fixed-point.

8. Replay Semantics

8.1 Replay Frame

A Replay Frame is a deterministic snapshot of governance state at a point in time.

HATS-RP-001
A Replay Frame MUST include: timestamp, integrity root, active transcript versions, active signers, active policies, namespace states, node counts, total nodes, integrity checks, and frame hash.

HATS-RP-002
The frame hash MUST be computed using Canonical Serialization over all frame fields in the order specified in HATS-RP-001.

8.2 Replay Modes

ModeDescription
Point-in-timeSnapshot at a specific timestamp
ForwardFrames at each distinct timestamp, ascending
ReverseSame frames, descending
TimelineEvenly-spaced frames between two timestamps
ScopedFiltered by tenant, namespace, policy, or transcript version

HATS-RP-003
Forward and reverse replay of the same time range MUST produce the same set of frames (in reversed order).

8.3 Replay Diff

HATS-RP-004
A Replay Diff MUST include: from/to timestamps, policies added/removed, state changes, new routes, signers added/removed, transcript version changes, integrity divergence flag, and diff hash.

HATS-RP-005
Diffing the same timestamp against itself MUST produce an empty diff with integrity_diverged = false.

9. Partial Replay Semantics

9.1 Partial Graph Export

HATS-PR-001
Implementations MUST support exporting a subgraph: given a set of root node hashes, return all nodes reachable via parent references.

HATS-PR-002
A partial graph export MUST be a valid HATS governance graph in its own right, with its own root hash.

9.2 Scoped Replay

HATS-PR-003
Scoped replay MUST support filtering by: tenant, namespace, policy hash, route hash, and transcript version.

HATS-PR-004
Infrastructure nodes (those with tenant_id_hash = null) MUST be included in tenant-scoped replay unless explicitly excluded.

9.3 Checkpoint Resume

HATS-PR-005
Replay MUST support resuming from a checkpoint. Given a checkpoint hash, the replay engine MUST produce the same frame as replaying from the beginning to the checkpoint's timestamp.

9.4 Replay Completeness

HATS-PR-006
Implementations MUST report when a scoped replay encounters parent references that point outside the scope. These MUST be reported as "missing lineage" warnings, not silent omissions.

10. Verification Semantics

10.1 Verification Input

HATS-V-001
The verification input MUST be a self-contained bundle: an array of governance nodes plus public keys. No external data sources or network access REQUIRED.

10.2 Required Checks

HATS-V-002
A HATS-Compliant verifier MUST perform these checks:

IDCheckSeverity
HATS-V-CHECK-001All nodes have valid canonical_hash (recomputed and matched)FATAL
HATS-V-CHECK-002All parent references point to existing nodesFATAL
HATS-V-CHECK-003No cycles in the graphFATAL
HATS-V-CHECK-004No cross-tenant contaminationFATAL
HATS-V-CHECK-005Consistent transcript versionFATAL
HATS-V-CHECK-006StateTransition nodes have >= 4 parentsERROR
HATS-V-CHECK-007Signatures verify against declared public keysFATAL
HATS-V-CHECK-008Timestamps are monotonic within signerWARNING
HATS-V-CHECK-009Child timestamps >= parent timestampsWARNING
HATS-V-CHECK-010No duplicate canonical_hash valuesFATAL

10.3 Verification Output

HATS-V-003
The verification output MUST include: valid (boolean), nodes_verified (count), errors (array of strings), warnings (array of strings), graph root hash, and Merkle root.

10.4 Exit Codes

CodeMeaning
0Valid
1Invalid (verification failed)
2Error (malformed input)

HATS-V-004
Verifiers MUST NOT silently succeed on partial verification. If any FATAL check fails, the overall result MUST be valid = false.

11. Transcript Semantics

Defines transcript versioning (HATS-T-001 through HATS-T-004), version compatibility rules, and the requirement that mixed transcript versions include migration records. Current transcript version: 2. See full specification for complete content.

12. Trust Domain Semantics

Defines tenant isolation (HATS-TD-001 through HATS-TD-006), signer trust domains, federation trust boundaries, and staging vs production separation. Infrastructure nodes with null tenant_id_hash may appear in any lineage. See full specification for complete content.

13. Time Semantics

Defines timestamp source documentation, UTC requirement, monotonicity within signers, child-parent ordering, and clock skew tolerance of up to 5 seconds between federated nodes (HATS-TM-001 through HATS-TM-007). See full specification for complete content.

14. Enforcement Semantics

Enforcement decisions are governed governance nodes (HATS-E-001, HATS-E-002). Defines 10 trigger types (PROFILE_DRIFT through CROSS_TENANT_CONTAMINATION) and 9 enforcement actions (BLOCK_EXECUTION through RAISE_CRITICAL_EVENT). See full specification for complete content.

15. Enforcement Severity Levels

Six severity levels from INFO (0) through TERMINATED (5). Implementations must support at least levels 0, 1, and 4. Severity is monotonically increasing per incident (HATS-EL-001 through HATS-EL-003). See full specification for complete content.

16. Evidence Chain Semantics

Evidence references cite governance nodes by canonical_hash. Defines verification status (VERIFIED, UNVERIFIED, PENDING), replay citations, and full governance ancestry traversal (HATS-EC-001 through HATS-EC-005). See full specification for complete content.

17. Governance Capability Profiles

Five capability profiles: HATS-Core, HATS-Replay, HATS-Enforcement, HATS-Federation, and HATS-AI-Governance. Each includes its parent. Implementations must declare supported profiles (HATS-CP-001, HATS-CP-002). See full specification for complete content.

18. Compliance Profile Semantics

Namespaced policy profiles for SEC, HIPAA, GLBA, Basel III, Solvency II, NYDFS, and DORA. Defines profile inheritance, strictest-requirement-prevails override semantics, and minimum replay retention (HATS-CMP-001 through HATS-CMP-005). See full specification for complete content.

19. AI Governance Semantics

Extension for HATS v1; normative in v2. Reserves 5 AI node types (PromptRecord, ToolCallRecord, MemoryAccessRecord, InferenceRecord, AutonomousActionRecord) and reserved fields including model_id, prompt_hash, and confidence (HATS-AI-001, HATS-AI-002). See full specification for complete content.

20. Replay Integrity Levels

Five integrity levels: STRUCTURALLY_VALID, CRYPTOGRAPHICALLY_VALID, FEDERATION_VALID, FULLY_REPLAYABLE, ENFORCEMENT_COMPLETE. Each implies all lower levels (HATS-RI-001, HATS-RI-002). See full specification for complete content.

21. Reserved Extension Namespaces

Four reserved namespace prefixes: HATS: (normative), x-hats- (experimental), vendor.{name}. (vendor), experimental. (community). Extension node types must use IDs >= 100 (HATS-NS-001 through HATS-NS-003). See full specification for complete content.

22. Compatibility Guarantees

Schema registry with versioned receipt schemas and minimum compatible versions. Defines 5 breaking changes (adding required fields, changing serialization order, changing domain separators, changing hash algorithms, removing required fields) requiring transcript version increment (HATS-COMPAT-001 through HATS-COMPAT-004). See full specification for complete content.

23. Future-Proofing

Deprecated fields accepted for 2+ major versions. 12-month minimum migration window for transcript version changes. Algorithm replacement process with 6-month transition. Receipt schemas never deleted (HATS-FP-001 through HATS-FP-005). See full specification for complete content.

24. Canonical Binary Encoding

Exact binary layouts for governance nodes and receipts ensuring cross-language hash parity. Any two conformant implementations given the same logical node must produce byte-identical encodings (HATS-BE-001 through HATS-BE-004). See full specification for complete content.

25. Replay Witness Format

Compact signed proofs of governance state at a point in time. Four witness completeness levels: HASH_ONLY, ROOT_ATTESTED, MERKLE_PROVEN, FULL_REPLAY. Partial replay attestation requirements (HATS-RW-001 through HATS-RW-005). See full specification for complete content.

26. Canonical Error Codes

26 verifier error codes under the HATS_ERR_ prefix covering cycle detection, orphan refs, hash mismatches, signature failures, cross-tenant contamination, clock anomalies, and more. Vendor extensions use HATS_ERR_VENDOR_{NAME}_ prefix (HATS-ERR-001 through HATS-ERR-003). See full specification for complete content.

27. Governance Object Identity

The canonical_hash is permanent identity. Content changes create new nodes. Transcript migration preserves original hashes. No hash aliasing permitted (HATS-ID-001 through HATS-ID-007). See full specification for complete content.

28. Federation Quorum Semantics

Quorum threshold and staleness window. Status reporting (HEALTHY, DEGRADED, FAILED). Equivocation detection and exclusion. Partition-safe replay and reconciliation on rejoin (HATS-FQ-001 through HATS-FQ-009). See full specification for complete content.

29. AI Agent Lineage Reservations

10 reserved AI node types (IDs 101-110): PromptNode, ToolCallNode, RetrievalNode, MemoryMutationNode, InferenceNode, AutonomousActionNode, HumanApprovalNode, EscalationNode, MemoryAccessNode, ConfidenceGateNode. Cross-tenant memory access must be detectable (HATS-AIR-001 through HATS-AIR-004). See full specification for complete content.

30. Graph Compression Semantics

Five compression modes (NONE required, 4 reserved: CHECKPOINT_FOLDED, MERKLE_PRUNED, RECURSIVE_ACCUMULATED, PROOF_AGGREGATED). Compressed graphs must include decompression witnesses and preserve logical root hash (HATS-GC-001 through HATS-GC-004). See full specification for complete content.

31. Signed Spec Releases

Release artifacts include spec document, SHA3-256 hash, ML-DSA-65 signature, changelog, compatibility statement, migration requirements, and test vector updates. Semantic versioning. Signed releases available for 10+ years (HATS-SR-001 through HATS-SR-004). See full specification for complete content.

A. Requirement Index

Complete index of all 147 normative requirements across 31 sections, plus 26 error codes and 10 reserved AI node types. See full specification for complete content.

B. Cryptographic Profile Registry

Registry of 4 cryptographic profiles: PQ-SHA3-256-v1 (required), BLAKE3-v1, STARK-POSEIDON-v1, and HYBRID-v1 (optional). See full specification for complete content.

C. Canonical Error Code Registry

All 26 HATS_ERR_ codes with section references and severity classifications (FATAL, ERROR, WARNING). See full specification for complete content.

D. Replay Determinism Test Corpus

26 planned test vectors across 7 categories: valid graph replay, corrupted graph detection, transcript migration, federation split, cross-language parity, AI governance lineage, and compression roundtrip. Published at https://hats.h33.ai/test-vectors/v1/. See full specification for complete content.

E. Binary Encoding Examples

Worked examples of GovernanceNode encoding, string encoding, and the critical distinction between empty string encoding (4 zero bytes) and absent optional encoding (1 zero byte). See full specification for complete content.

F. Glossary

TermDefinition
Governance GraphDirected acyclic graph of governance nodes and their parent references
Governance NodeA single attestation in the governance graph, identified by its canonical hash
ReceiptA signed record of a governance decision, containing a commitment hash and PQ signature
Replay FrameDeterministic snapshot of governance state at a point in time
Replay DiffComputed delta between two replay frames
Replay WitnessCompact signed proof that a specific governance state existed at a specific time
Canonical SerializationDeterministic byte encoding rules ensuring identical hashes across implementations
Transcript VersionProtocol version governing serialization format and verification rules
Trust DomainOperational boundary defining which signers have authority
Capability ProfileSubset of HATS requirements an implementation claims to support
Cryptographic ProfileConfiguration specifying hash function and signature algorithm
Evidence ChainOrdered sequence of governance node references substantiating an explanation
EquivocationA federation node submitting conflicting checkpoints for the same time window
QuorumMinimum number of federation nodes required for valid aggregation
Compression WitnessProof that a compressed graph represents the same logical content as the uncompressed original
LineageThe chain of parent references from a node back to the governance root

HATS Governance Specification v1.0 — H33.ai, Inc.
Reference Implementation: github.com/H33ai-postquantum
Test Vectors: hats.h33.ai/test-vectors/v1/