MAP Docs
OAS

Governance

Refusal posture, dissent preservation, audit footprint for OAS.

OAS operates under the standard MAP governance posture — every dispatch checked, every refusal structured, every decision recorded.

Refusal carries reasons

When OAS declines, the response is a structured refusal — capability missing, payload tenant mismatch, budget exhausted, policy block. Refusals receive the same audit weight as success.

RefusalWhenHTTP
CapabilityDeniedCaller lacks map.oas.<op>403
InvalidPayloadSchema validation fails422
PolicyDeniedMAXIM-bound policy refuses422
RateLimitedTenant token bucket exhausted429
AdapterErrorDownstream dependency unreachable502
TimeoutDeadline exceeded504

Audit footprint

Every operation produces audit records in MAX:

  • ProtocolInvocation per call (success or refusal)
  • AuthorizationCheck on capability evaluation (sampled in prod)
  • SecurityViolation on missing capability
  • Protocol-specific events via ctx.audit().record(...)

Reconstruct the full trace for any call with MAX::traceability_graph.

Treaty awareness

Cross-organization calls flow under an active MOAT treaty. OAS operations are only callable cross-org if the treaty includes the matching capability. See Concepts → Treaties.

Dissent preservation

When OAS produces output that contradicts prior precedent or peer service output, the disagreement is recorded alongside — not erased. MIMESIS watches this for emergent custom; MOOT may rule.

See also

On this page