Module 4: Treasury & Capital Structure
Asset Classification, Capital Allocation Logic, & Treasury Custody
Institutional continuity requires formalized capital coordination. This module defines how value enters, is classified, allocated, safeguarded, and recirculated within the governance system. Capital governance establishes the authority boundaries under which resources are stewarded. It formalizes asset classification, authorization tiers, reserve policies, allocation pathways, and review mechanisms. Resource flows are aligned with constitutional constraints and decision thresholds.
This module governs:
Capital classification across financial and non-financial forms Authorization structures and mandate-bound expenditure Allocation procedures linked to decision systems Reserve and solvency safeguards Recirculation and reinvestment logic Reporting and audit requirements Treasury structure determines how authority over resources is exercised, constrained, and reviewed over time. Capital flows must remain traceable, proportionate to mandate scope, and protected against concentration or misallocation. Treasury custody integrates with the accountability ledger, decision systems, and incentive structures to preserve institutional coherence.
1. Resource Classification
Capital categories are differentiated to prevent ambiguity, commingling, and mandate drift:
Operational Capital: Resources required for ongoing coordination, infrastructure, and administrative continuity.
Programmatic Capital: Resources allocated to defined initiatives or strategic priorities.
Reserve Capital: Funds retained for continuity, risk mitigation, and systemic resilience
Market Capital: deployed in or derived from external markets, including equity, tokenized instruments, or tradable financial assets. Managed under defined exposure, liquidity, and volatility constraints
Philanthropic Capital — Purpose-restricted capital contributed for mission-aligned activities under defined usage constraints. Subject to donor terms, reporting requirements, and segregation from discretionary treasury funds.
Reinvestment Pool: Allocations designated for strengthening shared infrastructure and long-term capacity.
Classification establishes mandate clarity and preserves allocation integrity.
2. Capital Inflow Pathways
The treasury defines legitimate sources of value, including:
Membership or participation contributions Grants and external funding Revenue-generating activities Impact-aligned investments Tokenized or decentralized capital mechanisms (if applicable) All inflows must comply with constitutional constraints, decision authority, and declared treasury policies.
3. Allocation Mechanisms
Capital deployment follows formally defined and auditable pathways:
Proposal-based funding through governance processes Delegated budget authority within mandate scope Formula-based distribution models Milestone-based disbursement schedules Allocation logic must be transparent, attributable to decision authority, and recorded in the accountability ledger.
4. Circulation & Reinvestment Logic
Treasury custody may encode structured capital circulation, including:
Defined reinvestment ratios Capacity-strengthening allocations Risk-adjusted deployment policies Capital circulation is calibrated to preserve continuity and institutional resilience rather than accumulate static reserves without mandate alignment.
5. Treasury Custody & Risk Safeguards
The system defines formal custodial and risk constraints:
Multi-signature or distributed authorization protocols Spending thresholds requiring elevated approval Segregation of financial duties Independent oversight or audit roles Exposure and liquidity parameters Stratified authorization and custody controls reduce concentration risk and protect fiduciary integrity.
6. Transparency & Reporting
Treasury activity is systematically recorded and disclosed through:
Periodic financial reporting Budget tracking dashboards Performance and impact summaries Financial transparency preserves institutional legitimacy and auditability.
7. Financial Review & Adaptation
Treasury governance includes periodic review cycles for:
Reserve adequacy assessment Allocation performance evaluation Financial structures may evolve through defined review pathways without destabilizing governance continuity.
Structural Function
This module formalizes resource coordination as a governance function. It ensures:
Purpose-aligned capital deployment Distributed authorization Transparent and traceable allocation Risk-calibrated stewardship Long-term institutional viability Treasury functions as an active custodial and allocation system, not a passive holding mechanism.
Module 4: Treasury & Capital Structure Ai Implementation Guide
Purpose
Compile treasury governance into deterministic financial logic. Enforce capital classification, custodial authority tiers, allocation constraints, reserve safeguards, and auditable transaction lineage at the system level. The treasury layer must operate as a rule-bound execution environment governed by constitutional constraints and decision authority.
Capital Classification Schema
The system must support a configurable and extensible capital ontology.
CapitalCategory {
id: UUID
name: string
classification: operational | programmatic | reserve | reinvestment | market_exposed | restricted
mandate_scope: text
allocation_constraints: object
reporting_obligations: object
liquidity_parameters: object
risk_profile: low | moderate | high
governance_linkage: decision_class_reference
}
Requirements:
Every inflow and disbursement must reference a CapitalCategory.
Restricted categories must enforce mandate-bound allocation constraints.
Market-exposed categories must enforce exposure and liquidity parameters.
Reserve categories must enforce minimum ratio safeguards.
Classification is mandatory and immutable per transaction record.
Treasury Custody Model
Minimum system entities:
treasury_accounts
capital_categories
capital_sources
inflow_records
allocation_records
disbursement_records
reserve_monitoring
custody_policies
authorization_matrix
audit_logs
Each treasury account must define:
TreasuryAccount {
id
capital_category_reference
custody_model: single_sig | multi_sig | contract_controlled
authorization_tier
spending_threshold
escalation_threshold
reserve_exempt: boolean
}
Custody policies must be parameterized per instance.
Capital Inflow Logic
System must:
Record inflow source type (donation, grant, revenue, investment, token issuance, etc.)
Validate compliance with constitutional and treasury policy
Assign classification at entry
Timestamp and immutably log transaction
Attach documentation reference
Optionally verify on-chain settlement if applicable
Restricted inflows must require designation mapping before acceptance.
Allocation & Authorization Engine
All allocations must pass deterministic gating:
Proposal reference (if governance-driven)
Delegated authority verification
Threshold validation
Category constraint validation
Reserve impact simulation
Authorization tier validation
Workflows states:
allocation_requested
authorization_pending
approved
executed
rejected
flagged
Each allocation must generate:
Governance approval reference
Execution confirmation record
Linked documentation
Ledger trace linkage
Milestone-based disbursement must support conditional release triggers.
Custody & Authorization Controls
The system must enforce:
Segregation of proposal, approval, and execution roles
Multi-signature enforcement where required
Tiered spending caps
Escalation triggers above defined thresholds
Emergency freeze capability (if constitutionally defined)
All custody actions must generate immutable audit records.
No allocation may bypass authorization logic.
Reserve & Risk Enforcement
System must support:
ReservePolicy {
minimum_reserve_ratio
liquidity_floor
exposure_limit_percentage
concentration_cap
volatility_buffer (for market_exposed capital)
}
Automated monitoring must:
Calculate operational reserve ratio
Flag liquidity breaches
Trigger exposure alerts
Prevent allocations violating reserve thresholds (if configured)
Optional advanced layer:
Scenario simulation engine
Stress-testing models
Transparency & Oversight Interface
Dashboard must display:
Capital balances by classification
Reserve ratios
Allocation pipeline status
Historical inflow/outflow trends
Exposure concentration metrics
Restricted fund utilization compliance
Oversight roles receive read-only access to custody and allocation records.
Reporting & Audit Interface
Treasury module must support:
Category-level reporting
Mandate compliance reporting (restricted funds)
Solvency summaries
Exposure breakdown reports
CSV / API export
Audit-ready ledger output
Version-linked configuration traceability
All reports must reconcile with accountability ledger records.
Structural Constraints
Treasury execution logic must remain:
Constitution-aware
Role-aware
Threshold-bound
Category-constrained
Custody-enforced
Fully auditable
Governance determines authorization.
Treasury enforces execution within defined parameters.
Oversight analytics operate as a separate intelligence layer.
This version:
Integrates market-exposed and restricted capital
Clarifies custody vs allocation
Strengthens determinism
Separates governance from execution
Maintains modular extensibility
Aligns with federation-ready architecture
Treasury State Machine
A deterministic lifecycle for capital intake, custody, allocation, disbursement, reconciliation, and exception handling.
Core Objects
TreasuryTransaction (applies to inflows, allocations, disbursements, internal transfers)
tx_id
tx_type: inflow | allocation | disbursement | transfer | adjustment | freeze_action
capital_category_id
account_id
amount, asset_type
initiator_actor_id
authority_basis: proposal_ref | delegated_authority_ref | emergency_ref
authorization_tier
supporting_docs[]
risk_snapshot_ref
ledger_refs[]
state
timestamps{}
Treasury Transaction States
Baseline lifecycle states
intake_pending
classified
policy_check_pending
policy_check_failed (terminal unless remediated)
authorization_pending
authorization_failed (terminal unless remediated)
ready_to_execute
execution_in_progress
executed
reconciled (terminal)
flagged (non-terminal exception state)
cancelled (terminal)
Protective overlay states (can supersede the baseline flow)
frozen (blocks execution; allows review/audit steps only)
holdback_required (execution allowed only after additional condition is satisfied)
State Transitions
A. Inflow path
intake_pending → classified
Trigger: source recorded + category assigned
classified → policy_check_pending
Trigger: documentation + compliance flags attached
policy_check_pending → authorization_pending
Condition: policy pass (restricted fund rules, jurisdiction rules, sanctions/flags)
authorization_pending → ready_to_execute
Condition: custody rules satisfied (multisig/role approvals)
ready_to_execute → execution_in_progress → executed
Trigger: settlement initiated; then confirmed (bank/on-chain/off-chain)
executed → reconciled
Condition: ledger write + balance reconciliation + reporting hooks emitted
Failure edges:
policy_check_pending → policy_check_failed
authorization_pending → authorization_failed
B. Allocation/disbursement path
intake_pending → classified (allocation request created with category + account)
classified → policy_check_pending
Includes: reserve impact check, mandate scope check
policy_check_pending → authorization_pending
Condition: decision authority verified (proposal outcome or delegated mandate)
authorization_pending → ready_to_execute
Condition: approvals meet threshold tier
ready_to_execute → execution_in_progress → executed → reconciled
C. Transfers/adjustments
intake_pending → classified → policy_check_pending → authorization_pending → ready_to_execute → executed → reconciled
(same gating; transfers must validate both source and destination categories/accounts)
Exception Handling Logic
Flagging (non-terminal):
Any state may transition to flagged when:
category mismatch detected
documentation missing / inconsistent
reserve ratio breach predicted
concentration/exposure limit breached
authority basis invalid or stale
duplicate tx pattern / anomaly detection triggers
From flagged, only these transitions are allowed:
flagged → policy_check_pending (after remediation)
flagged → authorization_pending (if policy already passed; re-auth required)
flagged → cancelled (if voided)
Freeze overlay:
Any non-terminal state may transition to frozen when:
emergency protective action invoked
audit event requires custody halt
systemic risk threshold exceeded
From frozen, only:
frozen → flagged (triage pathway)
frozen → authorization_pending (explicit unfreeze authorization)
frozen → cancelled
Deterministic Guards
Guards are evaluated at every transition into authorization_pending, ready_to_execute, and executed.
G1 — Category integrity
capital_category_id must be set and immutable after classified.
G2 — Authority validity
One of:
ratified proposal reference (binding)
valid delegated mandate reference (within scope, within expiry)
emergency reference (time-bounded; requires post-action review scheduling)
G3 — Custody satisfaction
Custody model requirements satisfied (multisig quorum, role approvals, tier gating).
G4 — Reserve protection
If category impacts reserve constraints, execution must be blocked when minimum ratios would be violated.
G5 — Exposure limits (market-exposed categories only)
Concentration and exposure caps must pass pre-execution.
G6 — Ledger finality
No transition to reconciled without immutable ledger reference + balance reconciliation event.
Post-Action Review Hooks
Automatic review events must be scheduled on:
any emergency_ref execution
any freeze/unfreeze action
any reserve breach attempt
repeated anomaly flags within a defined time window
These hooks emit ledger events and open a review record linked to the transaction lineage.
Minimal State Machine Spec Block
{
“treasury_state_machine”: {
“states”: [
“intake_pending”,“classified”,“policy_check_pending”,“policy_check_failed”,
“authorization_pending”,“authorization_failed”,“ready_to_execute”,
“execution_in_progress”,“executed”,“reconciled”,“flagged”,“cancelled”,
“frozen”,“holdback_required”
],
“terminal_states”: [“policy_check_failed”,“authorization_failed”,“reconciled”,“cancelled”],
“guards”: [“G1_category_integrity”,“G2_authority_validity”,“G3_custody_satisfaction”,“G4_reserve_protection”,“G5_exposure_limits”,“G6_ledger_finality”],
“overlays”: [“frozen”,“holdback_required”]
}
}
Treasury Health State Model
A system-level state machine (separate from transaction state) that tightens custody/authorization rules based on solvency, exposure, and operational stress.
1. Purpose
The Treasury Health State is a deterministic supervisory layer that:
gates or tightens authorization tiers and spending thresholds triggers protective actions (e.g., freezes, holdbacks) emits health telemetry for oversight and audit continuity remains independent of any specific ledger or custody stack This state machine evaluates aggregate treasury conditions and applies policy overrides to transaction execution.
2. Health States
Normal operation. Default thresholds and custody requirements apply. Early risk signals. Increased scrutiny for mid/high-tier transactions; additional reporting cadence. Material stress. Non-essential disbursements throttled; higher approval thresholds; reserve protection hard-gated. Emergency posture. Execution halted except predefined essential flows; treasury freeze controls available; post-action ratification required for any exception. (Optional) recovery
A time-bounded state after critical where limits are relaxed only after passing remediation checks.
3. Health Inputs
Health evaluation is computed from a fixed set of metrics (instance-configurable thresholds):
Reserve ratio: operational_reserves / projected_obligations Liquidity coverage: liquid assets / short-term outflows Exposure concentration: top-N holders, top-N counterparties, asset concentration Volatility exposure: percent of treasury in market-sensitive assets Runway: months of operations at current burn Disbursement pressure: pending obligations vs available liquid capital Anomaly index: flagged/failed tx rate, repeated exceptions, abnormal flow patterns Custody risk: signer availability, multisig quorum reliability, key rotation status 4. State Transition Rules (Deterministic)
Transitions are triggered by thresholds and sustained-duration conditions (to avoid oscillation).
Stable → Watch if any are true:
reserve ratio falls below watch_reserve_min anomaly index exceeds watch_anomaly_max exposure concentration exceeds watch_concentration_max Watch → Constrained if any are true:
reserve ratio falls below constrained_reserve_min liquidity coverage below constrained_liquidity_min repeated critical anomaly triggers within a defined window Constrained → Critical if any are true:
reserve ratio below critical_reserve_min liquidity coverage below critical_liquidity_min custody risk breach (e.g., signer quorum unreliable) confirmed material loss / compromise event Recovery / De-escalation
De-escalation requires both metric recovery and stabilization time:
critical → recovery only after protective action review record exists + minimum metrics restored recovery → constrained → watch → stable requires: all metrics above state minima sustained for n consecutive evaluation intervals no new critical anomaly flags 5. Policy Overrides Per State
Stable
Watch
require additional approval for transactions above watch_amount_threshold increased reporting cadence (e.g., weekly) stricter anomaly handling (auto-flag) Constrained
elevate approval thresholds one tier (e.g., 1-of-3 → 2-of-3) enforce holdbacks for non-essential categories block disbursements that reduce reserve ratio below constrained minima mandatory risk note + documentation for any allocation Critical
freeze all non-essential transactions allow only essential_allowlist categories/accounts emergency execution requires explicit emergency authority basis + automatic post-action review initiate custody verification / signer check protocol {
"treasury_health_state": {
"states": ["stable", "watch", "constrained", "critical", "recovery"],
"evaluation_cadence": "daily",
"metrics": [
"reserve_ratio",
"liquidity_coverage",
"exposure_concentration",
"volatility_exposure",
"runway_months",
"disbursement_pressure",
"anomaly_index",
"custody_risk"
],
"overrides": {
"watch": { "approval_tier_bump": 0, "auto_flag_over_amount": true },
"constrained": { "approval_tier_bump": 1, "holdback_non_essential": true },
"critical": { "freeze_non_essential": true, "essential_allowlist_required": true }
}
}
}
7. Where This Lives in the Architecture
Module 4 (Treasury & Capital Structure) defines the state machine, thresholds, and override policies. Accountability Ledger records every state transition, trigger metrics snapshot, and override applied. Decision Systems / Emergency protocol supplies the authority basis for exceptions during critical. If you want the next step, the clean add-on is a Treasury Essential Allowlist Spec (what counts as essential; who can modify it; and the emergency ratification requirements).