Skip to content

CoGov Readiness Rubric v0.1.0

CoGov Readiness Rubric v0.1.0

Scoring model: each domain scores 0–4 (Absent → Institutionalized).
Input sources: holonic-governance-config (required), optional artifacts (constitution text, policies), optional telemetry (participation, throughput).
Determinism: each score is computed from rule-gates. If a higher tier’s gates fail, score cannot exceed the highest satisfied tier.

Domain → Rule Gates → Score Mapping

D1 — Purpose & Intent (purpose_intent)

Config anchors
modules.constitutional_core.purpose.statement
modules.foundational_pattern.principles
Optional: modules.constitutional_core.purpose.beneficiaries
Score gates
0 Absent: missing purpose statement OR empty principles (<3)
1 Informal: purpose statement present but <25 chars OR principles exist but generic/duplicative
2 Defined/Incomplete: purpose ≥25 chars AND principles ≥3 AND at least 1 beneficiary OR explicit scope note in artifacts
3 Operational: purpose ≥50 chars AND principles ≥3 AND beneficiaries ≥2 AND invariants reference purpose alignment (text match or explicit linkage)
4 Institutionalized: purpose + principles + beneficiaries + documented evaluation rule (decision system requires purpose-alignment justification in links_required or proposal template artifact)
Blocking risk flag (optional): none

D2 — Constitutional Foundation (constitutional_foundation)

Config anchors
modules.constitutional_core.invariants[] (min 3)
modules.constitutional_core.rights_responsibilities.rights[]
modules.constitutional_core.rights_responsibilities.responsibilities[]
modules.constitutional_core.amendments.*
Score gates
0: missing constitutional_core or invariants <3
1: invariants present but rights/responsibilities missing or amendments incomplete
2: invariants ≥3 AND rights ≥2 AND responsibilities ≥2 AND amendments have proposal + ratification thresholds + deliberation_days
3: + protected_clauses defined OR jurisdiction_binding defined (offchain/onchain/hybrid mapping)
4: + artifact reference to a ratified charter (evidenceRef artifact) AND amendment mechanics enforceable (e.g., decision type “constitutional” exists with elevated thresholds)
Blocking risk flag: no_amendment_pathway (critical) if amendments missing

D3 — Governance & Roles (governance_roles)

Config anchors
modules.governance_and_roles.roles[]
modules.governance_and_roles.councils[]
modules.governance_and_roles.separation_of_powers.*
Score gates
0: no roles
1: roles exist but missing term/revocation OR no authority_scope
2: ≥1 role with mandate + authority_scope + term + revocation (all required fields satisfied)
3: + councils defined OR explicit separation_of_powers lists non-empty in ≥2 categories
4: + oversight separation present (oversight non-empty) AND revocation thresholds are meaningfully distinct from decision thresholds (not identical across all)
Blocking risk flag: authority_concentration (high/critical) if same role occupies strategic+operational+treasury+oversight and no councils

D4 — Decision Systems (decision_systems)

Config anchors
modules.decision_systems.decision_types[]
modules.decision_systems.proposal_lifecycle[]
modules.decision_systems.recording.*
Optional: modules.decision_systems.appeals.*
Score gates
0: no decision_types OR lifecycle <3
1: one decision type only; no quorum/approval diversity; recording incomplete
2: ≥2 decision types with quorum + approval + method populated AND lifecycle ≥3 AND recording system_of_record+finality set
3: includes “strategic” + “operational” (or equivalent) AND timers defined for each type
4: includes “constitutional” and “emergency” (or explicit equivalent) AND appeals enabled OR review_body defined AND links_required includes proposal/decision references
Blocking risk flag: opaque_decision_record (high) if recording missing or links_required empty

D5 — Treasury & Capital (treasury_capital)

Config anchors
modules.treasury_and_capital.accounts[]
modules.treasury_and_capital.controls.authorization_model
modules.treasury_and_capital.controls.spending_thresholds[]
Optional: modules.treasury_and_capital.allocation.*, reporting.*
Score gates
0: no accounts OR no controls
1: single account; thresholds missing; authorization_model set but not operational
2: ≥1 account + spending_thresholds defined (≥1) + authorization_model ∈ {multisig, roles, hybrid}
3: ≥2 thresholds with escalation (higher max_amount requires higher approval) AND allocation.methods non-empty
4: reporting cadence set AND reinvestment_policy explicitly configured OR risk_limits present
Blocking risk flag: no_treasury_controls (critical) if controls missing

D6 — Accountability Ledger (accountability_ledger)

Config anchors
modules.accountability_ledger.records.*
Optional: audit.*, privacy_exceptions[]
Score gates
0: ledger module missing or records missing
1: records partially enabled (<3 true)
2: decisions + treasury enabled at minimum
3: roles enabled + audit cadence defined
4: contributions enabled + privacy_exceptions defined + independent_required set explicitly (true/false) and documented
Blocking risk flag: no_accountability_records (high) if decisions=false AND treasury=false

D7 — Network Graph & Ontology (network_graph_ontology)

Config anchors
modules.network_graph_and_metaontology.graph.nodes[]
modules.network_graph_and_metaontology.graph.edges[]
modules.network_graph_and_metaontology.ontology.terms[]
Optional: federation.*
Score gates
0: graph missing
1: nodes/edges defined but generic and <3 combined
2: nodes+edges present AND ≥1 ontology term with definition
3: ontology terms ≥5 AND ontology versioning defined
4: federation enabled + interop_standards non-empty OR explicit schema versioning strategy for interoperability
Blocking risk flag: none

D8 — Participation & Boundaries (participation_boundaries)

Config anchors
modules.participation_and_boundaries.classes[]
modules.participation_and_boundaries.admission.*
modules.participation_and_boundaries.exit.*
Optional: conflict_of_interest.*
Score gates
0: no classes OR no admission OR no exit
1: one class but rights/responsibilities incomplete
2: ≥1 class with rights+responsibilities + admission criteria+method + exit has voluntary/suspension/removal
3: conflict_of_interest disclosure_required true + recusal_rules non-empty
4: ≥2 classes with differentiated rights (non-identical sets) AND documented suspension/removal authority linkage (e.g., decision type or review_body matches)
Blocking risk flag: weak_boundary_rules (medium/high) if exit missing or vague single-word placeholders

D9 — Conflict Resolution (conflict_resolution)

Config anchors
modules.conflict_resolution.pathway[] (min 3)
review_bodies[]
sanctions[]
Optional: appeals.*, protective_actions[]
Score gates
0: module missing
1: pathway exists but no review bodies or sanctions
2: pathway ≥3 + review_bodies ≥1 + sanctions ≥1
3: appeals enabled with window_days AND protective_actions non-empty
4: explicit proportionality ladder (sanctions ≥3 ordered severity) AND emergency protective action present + post-action review mechanism referenced (e.g., review_body or decision type)
Blocking risk flag: no_conflict_protocol (critical) if module missing entirely

D10 — Adaptation & Evolution (adaptation_evolution)

Config anchors
modules.adaptation_and_evolution.review_cycles.*
modules.adaptation_and_evolution.change_control.*
Optional: sunset_rules[]
Score gates
0: missing
1: cadence set but approval missing
2: cadence + scope non-empty + versioning defined + approval threshold defined
3: sandbox_enabled true OR sunset_rules non-empty
4: change_control approval aligns with constitutional ratification threshold (or stricter) AND review scope includes at least roles + decision_types + treasury_controls
Blocking risk flag: drift_risk (high) if versioning missing or approval undefined

D11 — Incentive Alignment (Optional) (incentive_alignment)

Config anchors
modules.token_and_incentive_alignment.mode
principles[]
Optional: instruments[], capture_mitigation[], ledger_linkage_required
Score gates
0: enabled=true but principles empty OR enabled=false and mode missing (treat as absent)
1: mode set but no principles
2: principles ≥2 and ledger_linkage_required true
3: instruments ≥1 with rules ≥2 each AND capture_mitigation ≥1
4: explicit non-capture constraints encoded (e.g., caps, vesting, delegation transparency) AND alignment to decision rights clarified (instrument types mapped to decision categories)
Blocking risk flag: capture_risk_high (critical) if enabled=true and no capture_mitigation

Readiness Bands

Compute earned as sum of core domains D1–D10 (max 40). D11 optional adds +4.
Pre-formation: 0–12
Emergent: 13–24
Operational: 25–34
Institutionalized: 35–40
Blocking rule: any critical risk flag forces readiness band max = Emergent until cleared.

Critical Risk Flags (Deterministic Triggers)

no_amendment_pathway (critical): constitutional_core.amendments missing
no_treasury_controls (critical): treasury_and_capital.controls missing
no_conflict_protocol (critical): conflict_resolution.enabled != true
no_accountability_records (high): accountability_ledger.records.decisions=false AND treasury=false
authority_concentration (high/critical): same role listed in all four separation_of_powers categories AND councils empty
opaque_decision_record (high): decision_systems.recording.links_required empty OR missing

AI Implementation Guide (for No Code Platfrom)

Objective: produce a GAR object that is (a) schema-valid, (b) rule-scored, (c) evidence-backed, (d) includes patch suggestions.

Inputs the AI must ingest

holonic-governance-config JSON (required)
Optional artifacts (constitution/policies) as text snippets with ref_id
Optional telemetry (counts, rates) as ref_id stats

Output requirements

Output only governance-assessment-report JSON
Must include:
scores.domains[] with rule_basis.computed_from pointing to config paths or evidence refs
risk_flags[] with blocking set per severity
recommendations[] with target as config path
patch_suggestions[] as RFC6902 JSON Patch ops where safe

Deterministic scoring algorithm

For each domain, evaluate gates from 4 → 0; assign the highest satisfied tier.
Generate status label from score:
0 absent
1 informal
2 defined_incomplete
3 operational
4 institutionalized
Populate gaps with failed gate reasons; populate strengths with satisfied gate highlights.
Want to print your doc?
This is not the way.
Try clicking the ··· in the right corner or using a keyboard shortcut (
CtrlP
) instead.