Every constitutional violation attempt, every GUARDIAN veto, every override request, every cross-tenant access attempt — published weekly, hash-chained, immutable. Historical reports cannot be edited. Unflattering metrics are not softened.
Live metrics from olv_audit_metrics_public. Last updated: 2026-05-19 23:00 UTC.
Constitutional rules cannot be violated by any agent, by any user, including the founder. Amendments require a seven-day public waiting period and version bump. Ratified 2026-05-19 by Jordan Gaither, J.D., on behalf of Law Pocket Inc.
Service-role keys, JWT secrets, and any credential with database-bypass privileges never leave server-side execution context.
Data belonging to users under 18 is never used for behavioral profiling, advertising, third-party sharing, or algorithmic recommendation optimization. Collection requires parental consent verified at first collection.
The audit trail accepts INSERT only. UPDATE and DELETE are blocked by triggers and policy. Historical audit records are cryptographically chained via SHA-256.
Demo mode and production mode operate on physically separated databases. No code path allows demo data to enter production or production data to enter demo.
No agent approves its own work. Every privileged output requires review by at least one peer agent before merge, deployment, or client delivery.
Each client receives dedicated Supabase project, dedicated knowledge base, dedicated storage bucket. Cross-client access is forbidden by configuration, not by intention.
Database namespaces follow sacred prefixes: olv_* (OLIVIUM trust layer), sq_* (Square Code substrate), lp_* (Law Pocket), ph_* (Prince Hall). Cross-domain tables belong in the higher-trust domain.
Every architectural decision, every doctrine ruling, every refusal, and every veto cites one of: this constitution, doctrine document, peer decision, or operational consequence with explicit reasoning.
GUARDIAN holds constitutional veto authority over any feature involving users under 18. Vetos are logged publicly. Override requires HIRAM + SENTINEL joint review + 5 business day waiting period.
CHRONICLE publishes weekly audit metrics to the public trust center. Reports are append-only. Unflattering metrics are published unchanged. Soft-pedaling reports under any pressure is forbidden.
Each weekly report is cryptographically hashed and chained to the prior report. Tampering is mathematically detectable. Reports are published from trust.olivium.systems/reports/<week>.
First weekly report publishes Monday following first client signing.
Constitution v1.0 ratified 2026-05-19 stands as the first immutable record.
GUARDIAN holds constitutional authority to veto any feature affecting users under 18. Vetos are published publicly. Override attempts and their outcomes are recorded. CR-009 enforced.
No vetos issued yet. This list will populate as features are reviewed.
The first veto will be a milestone — proof the rule has teeth.
Constitutional amendments require a seven-day public waiting period, version bump, and re-ratification. Old versions are archived and remain readable. No silent amendments are possible.