Protocol Evaluation Sheet
Use this sheet before opening a full spec.
Candidate
- Protocol name:
- Domain:
- Short description:
- One-sentence value proposition:
- Standards-backed candidate or internal sketch:
Peers
- Peer 1:
- Peer 2:
- Peer 3:
Peer-Owned Facts
- What is each peer authoritative for?
Shared Claim
- What cross-peer outcome are we trying to evaluate?
Proof Needs
- Inclusion needed?
- Exclusion needed?
- Completeness needed?
- Freshness or timestamp needed?
- Revocation or supersession needed?
Composition
- Are verified bundles composed into higher-order claims?
- Do those higher-order claims become certification facts?
- Which downstream mode applies:
trust certifier,audit through, ormixed?
Software Role
- Safest role for us:
- Risky role to avoid:
- IP, license, governance, or accreditation concern:
Infrastructure Path
- Signed roots only?
- Witness feed?
- On-chain metadata roots?
- Scripted claim-history anchor?
- Who stores proofs?
- Who receives proof requests?
- What must travel in the proof bundle?
Fit Rubric Score
- Multi-peer truth:
- Statefulness:
- Negative claims:
- Selective disclosure:
- Composed outcome:
- Dispute or audit pressure:
- Why signatures alone fail:
-
Certification ladder:
-
Total:
Decision
- Why this is a good fit:
- Why this may not be worth it:
- What has to be researched next:
- Next step: