Settld minimizes trust assumptions in settlement outcomes by making critical claims signed, bound, and independently verifiable.
Threats this design addresses
artifact tampering after execution
ambiguous money movement without decision lineage
unauthorized economic actions outside authority scope
silent drift between stored decisions and replayed outcomes
Signed artifacts + canonical hashing
Critical objects are signed and hash-bound.
Authority-scoped execution
Authority grants constrain spend, scope, and time.
Agreement/evidence binding
Evidence must align with agreement commitments (callId, inputHash, terms).
Deterministic idempotent effects
Deterministic IDs and uniqueness constraints prevent duplicate financial side effects.
Dispute legitimacy
Non-admin dispute open requires signer-bound envelope proof.
Replay and closepack verification
Stored outcomes can be recomputed and verified offline.
Boundaries (what Settld does not solve alone)
correctness beyond configured policy/verifier semantics
unsafe tenant policy configuration
jurisdiction-specific legal/compliance obligations by default
Operational minimums
signer key rotation + inventory controls
monitor replay mismatches and dispute lag
keep strict separation between demo/test/prod tokens
include closepack verify in release and incident workflows
docs/spec/THREAT_MODEL.md