CoGov Readiness Rubric v0.1.0
Scoring model: each domain scores 0–4 (Absent → Institutionalized).
Input sources: holonic-governance-config (required), optional artifacts (constitution text, policies), optional telemetry (participation, throughput).
Determinism: each score is computed from rule-gates. If a higher tier’s gates fail, score cannot exceed the highest satisfied tier.
Domain → Rule Gates → Score Mapping
D1 — Purpose & Intent (purpose_intent)
Config anchors
modules.constitutional_core.purpose.statement modules.foundational_pattern.principles Optional: modules.constitutional_core.purpose.beneficiaries Score gates
0 Absent: missing purpose statement OR empty principles (<3) 1 Informal: purpose statement present but <25 chars OR principles exist but generic/duplicative 2 Defined/Incomplete: purpose ≥25 chars AND principles ≥3 AND at least 1 beneficiary OR explicit scope note in artifacts 3 Operational: purpose ≥50 chars AND principles ≥3 AND beneficiaries ≥2 AND invariants reference purpose alignment (text match or explicit linkage) 4 Institutionalized: purpose + principles + beneficiaries + documented evaluation rule (decision system requires purpose-alignment justification in links_required or proposal template artifact) Blocking risk flag (optional): none
D2 — Constitutional Foundation (constitutional_foundation)
Config anchors
modules.constitutional_core.invariants[] (min 3) modules.constitutional_core.rights_responsibilities.rights[] modules.constitutional_core.rights_responsibilities.responsibilities[] modules.constitutional_core.amendments.* Score gates
0: missing constitutional_core or invariants <3 1: invariants present but rights/responsibilities missing or amendments incomplete 2: invariants ≥3 AND rights ≥2 AND responsibilities ≥2 AND amendments have proposal + ratification thresholds + deliberation_days 3: + protected_clauses defined OR jurisdiction_binding defined (offchain/onchain/hybrid mapping) 4: + artifact reference to a ratified charter (evidenceRef artifact) AND amendment mechanics enforceable (e.g., decision type “constitutional” exists with elevated thresholds) Blocking risk flag: no_amendment_pathway (critical) if amendments missing
D3 — Governance & Roles (governance_roles)
Config anchors
modules.governance_and_roles.roles[] modules.governance_and_roles.councils[] modules.governance_and_roles.separation_of_powers.* Score gates
1: roles exist but missing term/revocation OR no authority_scope 2: ≥1 role with mandate + authority_scope + term + revocation (all required fields satisfied) 3: + councils defined OR explicit separation_of_powers lists non-empty in ≥2 categories 4: + oversight separation present (oversight non-empty) AND revocation thresholds are meaningfully distinct from decision thresholds (not identical across all) Blocking risk flag: authority_concentration (high/critical) if same role occupies strategic+operational+treasury+oversight and no councils
D4 — Decision Systems (decision_systems)
Config anchors
modules.decision_systems.decision_types[] modules.decision_systems.proposal_lifecycle[] modules.decision_systems.recording.* Optional: modules.decision_systems.appeals.* Score gates
0: no decision_types OR lifecycle <3 1: one decision type only; no quorum/approval diversity; recording incomplete 2: ≥2 decision types with quorum + approval + method populated AND lifecycle ≥3 AND recording system_of_record+finality set 3: includes “strategic” + “operational” (or equivalent) AND timers defined for each type 4: includes “constitutional” and “emergency” (or explicit equivalent) AND appeals enabled OR review_body defined AND links_required includes proposal/decision references Blocking risk flag: opaque_decision_record (high) if recording missing or links_required empty
D5 — Treasury & Capital (treasury_capital)
Config anchors
modules.treasury_and_capital.accounts[] modules.treasury_and_capital.controls.authorization_model modules.treasury_and_capital.controls.spending_thresholds[] Optional: modules.treasury_and_capital.allocation.*, reporting.* Score gates
0: no accounts OR no controls 1: single account; thresholds missing; authorization_model set but not operational 2: ≥1 account + spending_thresholds defined (≥1) + authorization_model ∈ {multisig, roles, hybrid} 3: ≥2 thresholds with escalation (higher max_amount requires higher approval) AND allocation.methods non-empty 4: reporting cadence set AND reinvestment_policy explicitly configured OR risk_limits present Blocking risk flag: no_treasury_controls (critical) if controls missing
D6 — Accountability Ledger (accountability_ledger)
Config anchors
modules.accountability_ledger.records.* Optional: audit.*, privacy_exceptions[] Score gates
0: ledger module missing or records missing 1: records partially enabled (<3 true) 2: decisions + treasury enabled at minimum 3: roles enabled + audit cadence defined 4: contributions enabled + privacy_exceptions defined + independent_required set explicitly (true/false) and documented Blocking risk flag: no_accountability_records (high) if decisions=false AND treasury=false
D7 — Network Graph & Ontology (network_graph_ontology)
Config anchors
modules.network_graph_and_metaontology.graph.nodes[] modules.network_graph_and_metaontology.graph.edges[] modules.network_graph_and_metaontology.ontology.terms[] Score gates
1: nodes/edges defined but generic and <3 combined 2: nodes+edges present AND ≥1 ontology term with definition 3: ontology terms ≥5 AND ontology versioning defined 4: federation enabled + interop_standards non-empty OR explicit schema versioning strategy for interoperability Blocking risk flag: none
D8 — Participation & Boundaries (participation_boundaries)
Config anchors
modules.participation_and_boundaries.classes[] modules.participation_and_boundaries.admission.* modules.participation_and_boundaries.exit.* Optional: conflict_of_interest.* Score gates
0: no classes OR no admission OR no exit 1: one class but rights/responsibilities incomplete 2: ≥1 class with rights+responsibilities + admission criteria+method + exit has voluntary/suspension/removal 3: conflict_of_interest disclosure_required true + recusal_rules non-empty 4: ≥2 classes with differentiated rights (non-identical sets) AND documented suspension/removal authority linkage (e.g., decision type or review_body matches) Blocking risk flag: weak_boundary_rules (medium/high) if exit missing or vague single-word placeholders
D9 — Conflict Resolution (conflict_resolution)
Config anchors
modules.conflict_resolution.pathway[] (min 3) Optional: appeals.*, protective_actions[] Score gates
1: pathway exists but no review bodies or sanctions 2: pathway ≥3 + review_bodies ≥1 + sanctions ≥1 3: appeals enabled with window_days AND protective_actions non-empty 4: explicit proportionality ladder (sanctions ≥3 ordered severity) AND emergency protective action present + post-action review mechanism referenced (e.g., review_body or decision type) Blocking risk flag: no_conflict_protocol (critical) if module missing entirely
D10 — Adaptation & Evolution (adaptation_evolution)
Config anchors
modules.adaptation_and_evolution.review_cycles.* modules.adaptation_and_evolution.change_control.* Score gates
1: cadence set but approval missing 2: cadence + scope non-empty + versioning defined + approval threshold defined 3: sandbox_enabled true OR sunset_rules non-empty 4: change_control approval aligns with constitutional ratification threshold (or stricter) AND review scope includes at least roles + decision_types + treasury_controls Blocking risk flag: drift_risk (high) if versioning missing or approval undefined
D11 — Incentive Alignment (Optional) (incentive_alignment)
Config anchors
modules.token_and_incentive_alignment.mode Optional: instruments[], capture_mitigation[], ledger_linkage_required Score gates
0: enabled=true but principles empty OR enabled=false and mode missing (treat as absent) 1: mode set but no principles 2: principles ≥2 and ledger_linkage_required true 3: instruments ≥1 with rules ≥2 each AND capture_mitigation ≥1 4: explicit non-capture constraints encoded (e.g., caps, vesting, delegation transparency) AND alignment to decision rights clarified (instrument types mapped to decision categories) Blocking risk flag: capture_risk_high (critical) if enabled=true and no capture_mitigation
Readiness Bands
Compute earned as sum of core domains D1–D10 (max 40). D11 optional adds +4.
Blocking rule: any critical risk flag forces readiness band max = Emergent until cleared.
Critical Risk Flags (Deterministic Triggers)
no_amendment_pathway (critical): constitutional_core.amendments missing no_treasury_controls (critical): treasury_and_capital.controls missing no_conflict_protocol (critical): conflict_resolution.enabled != true no_accountability_records (high): accountability_ledger.records.decisions=false AND treasury=false authority_concentration (high/critical): same role listed in all four separation_of_powers categories AND councils empty opaque_decision_record (high): decision_systems.recording.links_required empty OR missing AI Implementation Guide (for No Code Platfrom)
Objective: produce a GAR object that is (a) schema-valid, (b) rule-scored, (c) evidence-backed, (d) includes patch suggestions.
Inputs the AI must ingest
holonic-governance-config JSON (required) Optional artifacts (constitution/policies) as text snippets with ref_id Optional telemetry (counts, rates) as ref_id stats Output requirements
Output only governance-assessment-report JSON scores.domains[] with rule_basis.computed_from pointing to config paths or evidence refs risk_flags[] with blocking set per severity recommendations[] with target as config path patch_suggestions[] as RFC6902 JSON Patch ops where safe Deterministic scoring algorithm
For each domain, evaluate gates from 4 → 0; assign the highest satisfied tier. Generate status label from score: Populate gaps with failed gate reasons; populate strengths with satisfied gate highlights.