Risk and Security
This page describes Operus risk and security posture at a public-safe level.
Trust assumptions
Operus is designed around explicit trust boundaries, not implicit autonomy. Sensitive workflows are expected to pass through controlled pathways and documented interpretation rules.
What is and is not automated
- Some flows are chain-integrated and observable.
- Some flows are operator-mediated and policy-enforced.
- Some outputs remain staged or simulation-backed depending on context.
Do not assume that every visible output implies fully autonomous live execution.
Safety posture
Operus emphasizes:
- permissioned pathways for sensitive actions
- policy-enforced controls
- replay-safe and auditable workflows
- explicit labels for trust stage and data interpretation
Operator responsibility
Operators are expected to:
- review labels and trust stage before decisions
- use evidence and lifecycle context when evaluating actions
- prefer hold/review behavior when confidence or freshness is unclear
What users should never assume
- Not all performance is live-verified.
- Not all approvals are autonomous execution proof.
- Not all workflows are public or permissionless.
- Not all chain-integrated surfaces are end-state autonomy.
Scope note
This page intentionally focuses on public principles. Internal operational mechanics, implementation details, and private runbooks are not published here.