Security Model

Every operation is either verified,

or it does not happen.

The Guarantee

Five invariants. None configurable.

None optional.

Every operation that passes through Axiom is subject to all five — always.

01

Schema binding

Every operation must match an approved schema. If it does not conform, it does not proceed. No exceptions.

02

Commitment

A unique hash is generated for every operation and bound to every receipt in the chain. Nothing can be substituted or replayed.

03

Cryptographic receipt verification

Every validator receipt is verified against the commitment hash. A receipt that does not bind to the original operation is rejected.

04

Quorum enforcement

Execution requires a threshold of independent validators to approve. Ties default to DENY. A missing quorum defaults to DENY.

05

Two-channel visibility

The system that submitted the operation sees only ALLOW or DENY. The reason for any denial is visible to designated stakeholders only — never to the originator.

What it prevents

Rogue execution

An autonomous system cannot take a consequential action without a verified quorum approving it first. No receipt, no execution — regardless of what the system was told to do.

Insider threats

No single person — including administrators — can approve their own operation. Committee selection is seeded by external randomness no internal actor controls.

Replay attacks

Every operation is bound to a unique commitment hash. A captured or replayed operation produces a different hash and is rejected automatically.

Silent compromise

A compromised validator cannot fake a receipt that passes kernel verification. A compromised minority cannot reach quorum. The math does not bend.

What you can prove

That every consequential action was independently verified before it ran.

That denial reasons were visible only to designated stakeholders — never to the originating system.

That the verification committee was selected by external, verifiable randomness — not internal configuration.

That the ledger record of every operation is immutable and hash-chained from genesis.

Validator security profiles

Validators are the nodes that independently verify each operation. As Axiom evolves, the security posture of those nodes grows stronger — without changing the kernel, the policy model, or any integration.

STANDARDLive — v1

Containerised, encrypted, ephemeral. Strong key hygiene. Production-ready for most enterprise environments.

HARDENEDPhase 2

Strict network controls, hardware-backed signing, per-epoch key rotation. For regulated industries.

TEEPhase 2

Enclave execution. The validator itself cannot be observed or tampered with. Remote attestation attached to every receipt.

ZKPhase 3

The validator verifies an operation without ever seeing the underlying data. Maximum privacy, maximum proof.

See the system run.

The playground runs a live verification flow — real cryptographic quorum, real ledger entries, real receipts. No configuration required.