AZ-032 — Post-Launch Stabilization Review Protocol v1
Status
Acest document definește protocolul formal de review pentru stabilizarea post-launch în ATLAS ZERO.
După AZ-001 până la AZ-031, există deja:
- specificația protocolului și a subsistemelor lui;
- criteriile de readiness;
- pachetele release și genesis;
- ceremonia de launch și launch window;
- checklist-urile concrete ale operatorilor;
- ledger-ul formal al deciziilor de launch;
- profilele de monitorizare pentru early mainnet.
AZ-032 răspunde la întrebarea: cum evaluăm formal dacă rețeaua a trecut de la starea de launch controlat la starea de stabilizare suficientă, pe baza unor dovezi explicite și a unui review disciplinat, nu doar pentru că au trecut câteva epoci fără zgomot evident?
Scopul documentului este să fixeze:
- faza de stabilizare post-launch;
- artefactele și dovezile care trebuie colectate;
- review-urile obligatorii;
- criteriile pentru stabilizare suficientă sau insuficientă;
- legătura cu restricted posture, incidentele, ledger-ul decizional și eventualele remedieri sau restricții suplimentare.
Acest document se bazează pe:
- AZ-002 până la AZ-031, cu accent direct pe AZ-015, AZ-017, AZ-028, AZ-029, AZ-030 și AZ-031.
Termeni:
- MUST = obligatoriu
- MUST NOT = interzis
- SHOULD = recomandat puternic
- MAY = opțional
1. Obiectiv
AZ-032 răspunde la 10 întrebări critice:
- Ce este post-launch stabilization review?
- Când începe și când se poate încheia?
- Ce dovezi trebuie analizate după launch?
- Ce criterii definesc stabilizare suficientă?
- Ce criterii definesc stabilizare insuficientă?
- Cine face review-ul și în ce rol?
- Ce se întâmplă dacă apar incidente sau anomalii persistente?
- Cum decidem dacă ridicăm restricții, păstrăm restricted posture sau introducem noi controale?
- Cum păstrăm acest review auditabil și reproductibil?
- Cum legăm concluziile review-ului de roadmap-ul imediat post-launch?
2. Principii
2.1 Stabilization is evidence-based
Stabilizarea MUST fi declarată pe baza:
- finality health;
- integrității artefactelor active;
- sănătății operaționale;
- absenței anomaliilor critice nerezolvate;
- și a review-urilor explicite.
2.2 Time alone is not proof of stability
Faptul că au trecut câteva ore sau epoci nu este suficient. Trebuie analizate semnalele reale.
2.3 Restricted posture exit is a review outcome
Ieșirea din restricted posture SHOULD rezulta din acest protocol de review, nu din inerție sau oboseală operațională.
2.4 Open incidents dominate the conclusion
Incidentele critice sau sistemice deschise MUST cântări mai mult decât metricile frumoase pe perioade scurte.
2.5 Stabilization review is not a vanity report
Scopul nu este să declare succesul. Scopul este să spună adevărul operațional: suficient stabil, insuficient stabil, sau stabil doar sub restricții.
2.6 Review must produce actionable outputs
Protocolul SHOULD produce:
- verdict;
- restricții menținute sau ridicate;
- remedieri;
- backlog imediat;
- eventuale update-uri pentru corpus, runbooks și monitoring.
3. Stabilization phase definition
3.1 Definition
Post-launch stabilization phase = intervalul de după bootstrap și early epochs în care:
- rețeaua este live;
- monitorizarea rămâne mai strictă decât steady state;
- schimbările sunt controlate;
- și se colectează dovezi pentru verdictul de stabilizare.
3.2 Boundaries
Stabilization phase SHOULD începe după:
- primele finalizări sănătoase;
- intrarea în restricted posture; și SHOULD se încheie numai după:
- stabilization review explicit;
- eventualul exit din restricted posture;
- sau decizia de a păstra restricții / a deschide remediere mai puternică.
3.3 Rule
The stabilization phase MUST have identifiable start and review checkpoints.
4. Stabilization states
4.1 Recommended states
STAB_COLLECTINGSTAB_REVIEW_READYSTAB_SUFFICIENTSTAB_SUFFICIENT_WITH_RESTRICTIONSSTAB_INSUFFICIENTSTAB_INCIDENT_DOMINATEDSTAB_DEFERRED_REVIEW
4.2 Meaning
STAB_SUFFICIENT
Rețeaua este suficient de stabilă pentru a ieși din restricted posture conform politicii.
STAB_SUFFICIENT_WITH_RESTRICTIONS
Stabilitate acceptabilă, dar unele restricții rămân temporar.
STAB_INSUFFICIENT
Stabilizarea nu este suficientă; restricted posture sau alte controale trebuie păstrate ori întărite.
STAB_INCIDENT_DOMINATED
Incidentele active domină verdictul; review-ul nu poate declara stabilizare.
5. Review actors
5.1 Recommended actor roles
ROLE_LAUNCH_COORDINATORROLE_OPS_LEADROLE_CONSENSUS_LEADROLE_SECURITY_LEADROLE_INCIDENT_COMMANDERROLE_AUDIT_SCRIBEROLE_MONITORING_LEADROLE_RELEASE_MANAGERROLE_GOVERNANCE_LIAISONROLE_VALIDATOR_OPERATOR_REPRESENTATIVE
5.2 Rule
Stabilization review SHOULD be multi-perspective. Nu trebuie făcut doar de monitoring sau doar de release.
6. Stabilization review inputs
6.1 Mandatory inputs SHOULD include
- LaunchWindowRecord
- LaunchCheckpointRecords
- LaunchDecisionLedger active decisions and history for launch scope
- MonitoringSnapshotRecords
- MonitoringAnomalyRecords
- incident records and statuses
- first epoch / restricted posture observations
- operator checklist results
- restart/rejoin decision history
- relevant artifact revocation/supersession records
- known issue register for launch scope
- residual risk register
6.2 Optional but recommended inputs
- public testnet lessons map for matched anomaly classes
- post-launch bug intake summaries
- conformance gap notes discovered post-launch
- governance or emergency action records if any
6.3 Rule
A review without structured inputs becomes anecdotal and weak.
7. Stabilization evidence families
7.1 The review SHOULD evaluate evidence from at least these families:
- consensus/finality evidence
- artifact integrity evidence
- operator health evidence
- monitoring health evidence
- incident evidence
- BVM health evidence if active
- witness/proof health evidence if active
- governance/activation evidence
- decision ledger and checklist evidence
- post-launch bug intake evidence
7.2 Rule
No single family SHOULD dominate by default unless a critical incident justifies it.
8. Consensus/finality review block
8.1 Review questions
- Was finality cadence acceptable across the review window?
- Were there unexplained no-finality intervals?
- Were role participation levels within launch expectations?
- Did any contradictory notarization or major consensus anomaly occur?
- Were any replay mismatches observed?
8.2 Verdict guidance
- sustained healthy finality + no unexplained divergence => positive signal
- repeated degraded finality or unexplained no-finality => negative signal
- contradictory notarization or deterministic split sign => severe negative signal
8.3 Rule
Consensus/finality evidence SHOULD heavily influence the final stabilization verdict.
9. Artifact integrity review block
9.1 Review questions
- Did any node or operator report binary/release/genesis mismatch?
- Did any critical artifact become revoked, superseded or quarantined after launch?
- Did any scope confusion appear between release and genesis package?
- Did any launch-critical artifact require emergency replacement?
9.2 Rule
Post-launch artifact truth instability SHOULD strongly bias toward insufficient stabilization.
10. Operator health review block
10.1 Review questions
- Were restart/rejoin counts within expected launch norms?
- Did operators remain able to validate and sign safely?
- Were local safe mode events isolated or widespread?
- Were any signer failures or key-path anomalies significant?
- Did any operator cluster show repeated instability?
10.2 Rule
Repeated operator cluster instability SHOULD delay normalization or justify targeted restrictions.
11. Monitoring health review block
11.1 Review questions
- Did monitoring remain trustworthy and timely?
- Were there telemetry blind spots during critical moments?
- Did alerting routes work?
- Were thresholds too noisy or too weak?
- Did monitoring evidence support or hinder decision-making?
11.2 Rule
If monitoring was blind during key parts of early mainnet, stabilization confidence SHOULD be reduced materially.
12. Incident review block
12.1 Review questions
- Which incidents opened during launch or stabilization?
- Which are closed, mitigated, or still active?
- Did any incident require emergency action or special restriction?
- Were any incidents merely local, or did they reflect systemic risk?
12.2 Rule
Any open critical or systemic incident SHOULD strongly bias toward STAB_INSUFFICIENT or STAB_INCIDENT_DOMINATED.
13. BVM review block
13.1 If BVM active in launch scope, review SHOULD ask:
- Were machine calls deterministic across operators?
- Were trap/revert/error patterns within expectations?
- Did any effect digest anomalies appear?
- Were any modules or families quarantined?
- Did any boundedness concern appear?
13.2 Rule
Consensus-relevant BVM anomaly after launch SHOULD weigh heavily against declaring sufficient stabilization.
14. Witness / proof review block
14.1 If witness/proof active in launch scope, review SHOULD ask:
- Were critical witness families healthy?
- Were proof verification failure patterns acceptable?
- Did any unauthorized emission or contradiction anomaly appear?
- Did any witness-driven operational control path misbehave?
14.2 Rule
Witness/proof anomalies in halt, treasury, governance or safety-critical domains SHOULD be treated conservatively.
15. Governance / activation review block
15.1 Review questions
- Did any unexpected governance activation occur?
- Did any challenge/timelock mismatch signal arise?
- Were any emergency actions triggered?
- Is governance state stable and understood?
15.2 Rule
Unexpected governance behavior post-launch SHOULD block full normalization until understood.
16. Bug intake review block
16.1 Review questions
- Which post-launch bug reports are confirmed?
- Are any high/critical bugs newly discovered?
- Do any reports indicate launch-critical hidden classes of failure?
- Were new regression/conformance cases created?
16.2 Rule
Fresh confirmed high/critical bugs in launch subset SHOULD feed directly into stabilization verdict and post-launch action plan.
17. Stabilization review object model
17.1 Canonical structure
StabilizationReviewRecord {
version_major
version_minor
review_id
target_network_class
target_chain_id
target_genesis_hash
linked_launch_window_id
review_window_hash
evidence_root
review_status
overall_verdict
notes_hash?
}
17.2 review_status
OPENIN_REVIEWCOMPLETEDSUPERSEDED
17.3 overall_verdict
STAB_SUFFICIENTSTAB_SUFFICIENT_WITH_RESTRICTIONSSTAB_INSUFFICIENTSTAB_INCIDENT_DOMINATEDSTAB_DEFERRED_REVIEW
17.4 Rule
One stabilization review record SHOULD correspond to one explicit review window and launch scope.
18. Review evidence root
18.1 Evidence entry structure
StabilizationEvidenceEntry {
evidence_class
evidence_ref
}
18.2 evidence_class examples
- monitoring_snapshot
- anomaly_record
- incident_record
- checklist_record
- decision_record
- artifact_record
- bug_report
- bug_closure
- conformance_update
- review_note_bundle
18.3 evidence_root
evidence_root = MerkleRoot(H("AZ:STAB_EVIDENCE:" || canonical_entry_i)...)
18.4 Rule
Critical verdicts SHOULD be evidence-backed through explicit evidence_root.
19. Review findings model
19.1 Recommended structure
StabilizationFinding {
finding_id
review_id
finding_class
severity
summary_hash
evidence_refs?
remediation_required
restriction_implication
}
19.2 finding_class examples
- consensus_healthy
- consensus_degraded
- artifact_scope_issue
- operator_cluster_instability
- monitoring_gap
- incident_open
- bug_backlog_concern
- bvm_family_restriction_needed
- governance_uncertainty
- telemetry_blind_spot
19.3 restriction_implication
- none
- keep_restricted_posture
- narrow_scope
- quarantine_scope
- open_incident
- emergency_review
20. Review recommendation model
20.1 Recommended outputs
The review SHOULD produce explicit recommendations such as:
- exit restricted posture
- keep restricted posture unchanged
- keep restricted posture but lift specific restriction
- keep restricted posture and tighten specific restriction
- quarantine scope X
- require conformance/regression update
- require post-launch patch planning
- defer normalization review by N epochs/time
- open governance/security/ops follow-up review
20.2 Rule
Recommendations SHOULD be explicit and traceable, not implied.
21. Stabilization sufficiency criteria
21.1 A review MAY declare STAB_SUFFICIENT only if:
- finality has been healthy across review window
- no unresolved critical incident remains
- no unresolved artifact truth instability remains
- monitoring health is sufficient
- operator cluster health is acceptable
- no launch-critical bug remains unbounded in scope
- restricted posture exit conditions are met
21.2 Rule
All of these SHOULD be explicitly checked, not assumed.
22. Stabilization sufficiency with restrictions
22.1 STAB_SUFFICIENT_WITH_RESTRICTIONS is appropriate when:
- core launch subset is stable enough,
- but some bounded restrictions should remain, for example:
- keep one optional feature disabled
- keep one machine family quarantined
- maintain tighter restart approvals
- maintain elevated monitoring for one domain
22.2 Rule
Remaining restrictions MUST be explicit and justified.
23. Stabilization insufficiency criteria
23.1 STAB_INSUFFICIENT is appropriate when:
- finality remains degraded or inconsistent
- repeated role participation instability persists
- artifact scope confusion remains unresolved
- monitoring is not trustworthy enough
- important launch-critical bugs remain unbounded
- restricted posture exit criteria are not met
23.2 Rule
This verdict SHOULD not be softened for optics.
24. Incident-dominated criteria
24.1 STAB_INCIDENT_DOMINATED is appropriate when:
- active critical incident remains open
- systemic security or protocol anomaly is unresolved
- emergency action or emergency review dominates current operating truth
- continuing stabilization review would falsely imply normality
24.2 Rule
In this state, the incident flow SHOULD dominate over normalization flow.
25. Deferred review
25.1 STAB_DEFERRED_REVIEW is appropriate when:
- not enough evidence window has elapsed
- important data missing
- review quorum incomplete
- a short wait is justified without major new risk
25.2 Rule
Deferred review SHOULD specify:
- why it was deferred
- what evidence is still needed
- when reevaluation occurs
26. Review checkpoints
26.1 Recommended checkpoints
- first restricted posture midpoint review
- first restricted posture end-of-window review
- post-major anomaly review
- pre-normalization review
26.2 Rule
If early mainnet is longer or more turbulent than expected, additional checkpoints SHOULD be allowed.
27. Restricted posture decision linkage
27.1 The review SHOULD feed one of:
DEC_RESTRICTED_POSTURE_EXIT- maintain existing restricted posture decision
- new
DEC_SCOPE_QUARANTINE - new
DEC_SCOPE_REENABLE - new defer/hold style operational decision in ledger
27.2 Rule
Stabilization review without decision linkage is incomplete for operational closure.
28. Review quorum
28.1 Recommendation
A serious stabilization review SHOULD include at least:
- ops lead
- consensus lead
- monitoring lead
- audit scribe
- security or incident representative if anomalies occurred
28.2 Rule
If launch policy requires broader sign-off, that MUST be explicit.
29. Review timeline discipline
29.1 The review SHOULD record:
- review open time
- evidence cutoff window
- review participants
- findings issuance times
- final verdict time
- linked decision time if any
29.2 Rule
Without review timeline, later audits cannot reconstruct the reasoning boundary properly.
30. Review ledger linkage
30.1 The stabilization review SHOULD be linkable from:
- Launch Decision Ledger
- launch audit package
- post-launch stabilization archive
- operator advisory updates
30.2 Rule
The final review verdict SHOULD influence active operational truth, not remain a detached summary.
31. Review package / archive
31.1 Recommended archive contents
- StabilizationReviewRecord
- findings
- evidence root mapping
- linked incident summaries
- monitoring summary bundle
- operator summary bundle
- decision ledger subset
- recommendations and action plan
- restricted posture decision outputs
31.2 Rule
The archive SHOULD be immutable once finalized, with supersession only via new review.
32. Supersession of reviews
32.1 Need
A later review may supersede an earlier one.
32.2 Rule
A superseding review MUST:
- reference prior review_id
- justify why new evidence changes or finalizes the earlier verdict
- preserve prior review visibility
32.3 Rule
Past reviews MUST NOT be silently rewritten.
33. Action plan output
33.1 Each review SHOULD produce action items grouped as:
- immediate operational changes
- restricted posture changes
- monitoring threshold changes
- corpus/conformance additions
- code or release remediation
- documentation updates
- governance/security follow-up
33.2 Rule
Without action items, review risks becoming descriptive only.
34. Conformance and regression linkage
34.1 If the review discovers:
- previously unknown anomaly class
- weak monitoring threshold
- replay ambiguity
- bug confirmed post-launch
Then it SHOULD trigger:
- new conformance case
- regression case
- corpus update
- or explicit note why not.
34.2 Rule
Stabilization review SHOULD improve future readiness, not only judge past launch.
35. Communication outputs
35.1 Internal outputs SHOULD include
- verdict
- active restrictions
- notable anomalies
- required follow-ups
- exit/continue restricted posture decision
35.2 Public-facing outputs MAY include
- high-level network health summary
- restricted posture status
- known issue status
- operator advisories
- confidence statement bounded by actual evidence
35.3 Rule
Public communication MUST NOT overstate stability beyond review evidence.
36. Anti-patterns
Systems SHOULD avoid:
- declaring stabilization complete because no one complained loudly
- ending restricted posture without explicit review artifact
- ignoring unresolved high-severity bugs because consensus still finalizes
- treating incident silence as proof of absence
- not reviewing monitoring blindness as its own problem
- allowing review to be purely verbal
- rewriting review conclusions after the fact instead of superseding them
- using only average metrics and ignoring burst anomalies
- separating review from decision ledger and operator action
- failing to produce concrete remediation backlog
37. Formal goals
AZ-032 urmărește aceste obiective:
37.1 Honest stabilization assessment
The system can say whether launch stabilized sufficiently, insufficiently or only under restrictions.
37.2 Evidence-backed normalization
Exit from restricted posture rests on explicit evidence and review, not inertia.
37.3 Audit-grade post-launch memory
The first post-launch period remains reconstructible and analyzable later.
37.4 Feedback into future safety
The review improves conformance, monitoring, runbooks and future launches.
38. Formula documentului
Post-Launch Stabilization Review = bounded review window + structured evidence + explicit findings + stabilization verdict + linked operational decisions + remediation plan
39. Relația cu restul suitei
- AZ-028 definește launch window și restricted posture entry.
- AZ-030 definește ledger-ul deciziilor.
- AZ-031 definește profilele de monitorizare.
- AZ-032 definește review-ul formal care decide dacă acea fază a produs stabilizare suficientă.
Pe scurt: AZ-031 produce semnalele; AZ-032 le transformă în verdict operațional și decizii de stabilizare.
40. Ce urmează
După AZ-032, documentul corect este:
AZ-033 — Mainnet Artifact Archive and Audit Package
Acolo trebuie fixate:
- ce artefacte de launch, stabilizare și early-mainnet se arhivează;
- cum se împachetează pentru audit;
- ce manifesturi și atestări sunt necesare;
- și cum se păstrează istoria completă a lansării și a primei stabilizări fără degradare sau ambiguitate.
Închidere
Lansarea nu este completă când rețeaua pornește. Este completă abia când putem spune, pe bază de dovezi, că primele ei etape au fost suficient de sănătoase, că anomaliile au fost înțelese sau încadrate, și că ieșirea din regimul strict nu este un salt de credință.
Acolo începe stabilizarea post-launch reală.