Technical Report · POLARIS-TR-2026-001 · v0.1 · March 2026
Independent Researcher
20 March 2026
Abstract
Distributed and autonomous systems increasingly perform actions with real-world consequences, yet few architectures structurally guarantee that those actions originate from validated canonical state. Existing systems enforce ordering or policy but do not structurally bind execution authority to canonical state identity — leaving side effects potentially derivable from unvalidated or ambiguous system state. This paper introduces commit-gated causality, an architectural principle in which execution authority is structurally bound to the identity of the canonical system state. We present an architecture that enforces this principle through a deterministic validation pipeline, a commit authority controlling canonical state progression, and an execution gate restricting externally observable effects to the canonical state. The architecture establishes three structural invariants that hold by construction rather than by policy, and we prove that together they guarantee all observable effects originate from validated canonical history. The architecture enables deterministic replay verification without runtime trust, and defines a class of systems — commit-gated causal systems — in which correctness is derived from structural constraints on canonical state progression rather than from trusted execution environments. This work introduces commit-gated causality as a structural primitive for enforcing causal integrity of execution in autonomous systems.
Keywords: commit-gated causality, canonical state, execution gating, deterministic validation, verifiable computing, distributed systems, causal integrity
Distributed systems execute actions based on system state, yet few architectures guarantee that those actions originate from validated causal history. State mutation typically occurs through multiple independent control paths, producing structural vulnerabilities: concurrent state advancement, ambiguous authoritative state, race conditions between validation and mutation, side effects without linkage to committed state, and inability to deterministically reconstruct state progression.
Conventional approaches address these problems through discretionary mechanisms: access control lists, runtime policy engines, post-hoc logging, and audit trails. These share a fundamental limitation: they evaluate or record events after state mutation has occurred or is permitted, rather than structurally preventing unauthorized advancement.
Existing systems enforce ordering or policy, but do not structurally bind execution authority to canonical state identity. This is the gap commit-gated causality closes: execution rights are not granted by policy alone, but by the identity of the canonical state itself.
We introduce commit-gated causality, a model that restricts execution to canonical system state. In such systems, externally observable effects are permitted only from states whose identity has been established through canonical commit progression. This shifts correctness from trusted execution to structural constraints on causal state progression.
This paper makes four contributions:
Together, these establish commit-gated causality as a structural method for enforcing causal integrity in distributed and autonomous systems.
The system consists of clients proposing transitions, a validation pipeline evaluating transitions against deterministic gate profiles, a commit authority controlling canonical progression, an append-only canonical state store, and an execution gate authorizing externally visible effects. The system operates under partial synchrony with authenticated communication.
Let S be the set of system states, S₀ ∈ S the genesis state, and T the set of proposed transitions. A valid transition:
T_i : S_n → S_{n+1} such that V(T_i, S_n, G) = PASS
where V is a deterministic validation function and G the resolved gate profile. Commit advances the pointer:
commit(T_i) ⇒ canonical_pointer := S_{n+1}
The canonical history H_c = (S₀, S₁, ..., S_n) is the unique state sequence from committed transitions. The canonical pointer references the most recent element of H_c.
Definition: Canonical State Identity
The canonical state identity is the cryptographic identifier referenced by the canonical state pointer and derived deterministically from the committed state transition record. Formally: id(S_n) = H(record_n) where H is a collision-resistant hash function and record_n is the canonical encoding of the committed transition producing S_n.
No widely deployed system satisfies R1–R5 simultaneously. Table 1 summarizes coverage.
| Architecture | R1 | R2 | R3 | R4 | R5 |
|---|---|---|---|---|---|
| State Machine Replication | ✓ | ✗ | ✓ | ✗ | ~ |
| Blockchain / Smart Contracts | ✓ | ~ | ✓ | ✗ | ✓ |
| ACID Databases | ✓ | ✗ | ✓ | ✗ | ✗ |
| Event Sourcing | ✗ | ✗ | ✗ | ✗ | ~ |
| Workflow Engines | ~ | ✗ | ~ | ✗ | ✗ |
| Commit-Gated Causal (Polaris) | ✓ | ✓ | ✓ | ✓ | ✓ |
Table 1. Structural enforcement of requirements across architectures.
We consider the following adversarial conditions:
We assume the cryptographic primitives remain secure and the canonical state store preserves append-only integrity. Byzantine fault tolerance of the commit authority itself is a deployment parameter addressed in Section 9. Gate evaluation must be deterministic; disagreement implies implementation fault and causes validation failure.
The architecture comprises six mechanisms enforcing R1–R5. Figure 1 shows the conceptual distinction between traditional systems and the Polaris model, and defines the structural guarantee that the architecture enforces.
All candidate state changes are represented as a PSTO: the exclusive input to validation and precursor to commit. A PSTO must be replayable without external dependencies. It comprises a reference to the canonical pointer, transition class identifier, candidate payload, cryptographically bound subsystem outputs, credentials, presence vector, and proof bundle. Prior to validation, each PSTO is normalized into a deterministic canonical encoding ensuring identical representations across implementations.
A mandatory pre-commit boundary. A PSTO is eligible for commit only upon validation-pass under its resolved gate profile. Gate profiles depend solely on canonical inputs stable under replay. Each gate returns PASS or FAIL deterministically — no wall-clock time, external network calls, or nondeterministic inputs are permitted. Every profile includes a minimal gate set: pointer consistency, hash integrity, signature, authority verb, artifact integrity. Domain-specific gates may be added but the minimal set must not be removed. The pipeline resolves validation requirements through a Gate Profile Registry, which maps transition class identifiers to deterministic validation sets, ensuring that programmability does not introduce non-deterministic state divergence.
The sole mechanism permitted to append records and advance the canonical pointer. It is a logical role, implementable through distributed consensus, threshold signatures, or replicated control. Upon validation-pass, it atomically appends the record and advances the pointer via compare-and-swap (CAS). This atomic advancement is the linearization point of the system. The canonical state pointer acts as a causal barrier separating uncommitted transitions from externally observable effects. Furthermore, the commit authority enforces pointer consistency by requiring that each PSTO references the current canonical state hash; this provides a structural safeguard against race conditions and concurrent state forks during the commit phase.
An append-only data structure with hash-linked immutable records providing structural tamper evidence. The canonical encoding of each committed record is deterministic, enabling cross-implementation replay equivalence.
Permits side effects only when an execution request references the canonical pointer at evaluation time. May be kernel-enforced. Distinguishes reversible from irreversible side effects with additional constraints for irreversible actions.
Each subsystem is bound to one verb from: PROPOSE, VALIDATE, AUTHORIZE, COMMIT, EXECUTE, OBSERVE. No subsystem can both propose and commit, or validate and execute. This closed verb model prevents privilege escalation by structural design.
Three structural invariants hold by construction. We first establish supporting lemmas, then derive the main theorem.
Invariant I1
For any predecessor state, at most one committed successor may become authoritative.
∀ S_n : |successor(S_n)| ≤ 1
Follows from CAS atomicity: at most one concurrent commit succeeds per pointer value.
Invariant I2
No advancement without validation-pass under the applicable gate profile.
∀ T_i : commit(T_i) ⇒ V(T_i, S_n, G) = PASS
The commit authority independently recomputes critical gates before accepting a request.
Invariant I3
Side effects require a state identifier equal to the canonical pointer.
execute(E, S_r) ⇒ S_r = canonical_pointer
Because the pointer is updated only by commit (I2), and commit requires validation-pass, the execution gate transitively enforces that side effects occur only for validated committed state.
To formalize the binding between state and action, we define the Causal Invariant. Let E be the set of observable side effects and T the set of validated transitions. For any observable side effect e ∈ E, the system guarantees:
∀e ∈ E : e ∈ E_permitted ⟹ ∃τ ∈ T : commit(τ) ∧ e ∈ effects(τ)
This ensures that the existence of an effect is strictly contingent upon a prior, atomic commit of a validated transition, rendering un-gated execution structurally impossible. The implication is one-directional by design: it constitutes the safety property, guaranteeing no unlawful effects exist, without requiring the system to produce all possible effects of a transition.
Lemma 1 (Pointer Uniqueness)
At any point in time, there exists exactly one value for canonical_pointer. Proof: canonical_pointer is advanced exclusively by atomic CAS in the commit authority; concurrent attempts are serialized and at most one succeeds. □
Lemma 2 (Validation-Gated Progression)
Every value taken by canonical_pointer is the identifier of a state produced by a validation-pass transition. Proof: By I2, commit requires V = PASS; commit is the only operation that advances canonical_pointer; therefore every pointer value is validation-gated. □
Lemma 3 (Pointer-Bound Execution)
No externally observable effect occurs unless the executing request's state reference equals canonical_pointer at evaluation time. Proof: By I3, the execution gate checks S_r = canonical_pointer before permitting any effect; the gate is non-bypassable. □
Theorem (Canonical Causality)
If I1–I3 hold, then all externally observable effects are causally derived from validated transitions in H_c.
Proof sketch. (1) By Lemma 3 / I3, any effect requires S_r = canonical_pointer. (2) By Lemma 2 / I2, canonical_pointer references only validated committed state. (3) By Lemma 1 / I1, the committed state has a unique predecessor chain. (4) Therefore S_r ∈ H_c, and the effect is causally derived from a validated transition sequence. □
The two fundamental constraints:
(1) ∀ S_n : |successor(S_n)| ≤ 1
(2) execute(E, S_r) ⇒ S_r = canonical_pointer
ensure all effects originate from a single validated causal history. Correctness is enforced not by trusted execution, but by constraining where in the causal state history execution may occur.
An independent verifier can reconstruct canonical state progression without privileged access or runtime trust.
Procedure: (1) Load S₀, set P₀. (2) For each R_k, verify prev_hash = P_{k-1}. (3) Recompute PSTO hash, gate profile, minimal gates, validation-pass artifact. (4) Recompute committed_hash_k, set P_k. (5) Verify hash linkage, confirm final P_n. Any mismatch fails.
Prefix Integrity. For any S_n, the transition sequence to S_n uniquely determines all preceding states, by hash-linking.
Deterministic Validation Constraint. All validation logic must be referentially transparent. No wall-clock, external network, or nondeterministic inputs. Deterministic canonical encoding ensures cross-implementation replay equivalence.
Complexity. Validation is O(n) parallelizable across gate evaluators. Commit is O(1) via atomic pointer advancement. Replay verification is O(n) linear in the number of committed records.
The architecture intentionally excludes override, bypass, and retroactive modification. No privileged role may advance state without the complete pathway.
Irreversibility Principle. Canonical progression is irreversible by design. Hash-linking ensures retroactive modification invalidates all subsequent identifiers. Irreversibility ensures stable causal history, enabling deterministic replay as a verification method.
In all cases, canonical state is unmodified and invariants hold unconditionally. Safety is unconditional; liveness depends on commit authority availability.
The architecture does not attempt to solve consensus, scheduling, or policy definition. It assumes a mechanism for selecting a commit authority but does not prescribe how that authority is implemented or governed.
The objective of the architecture is narrower: to enforce causal integrity of execution once canonical state progression is established. This separation allows the architecture to be composed with existing consensus mechanisms, governance frameworks, and policy engines.
The architecture does not address: policy semantics or rule authoring; scheduling of proposed transitions; fairness among proposers; Byzantine fault tolerance of the commit authority itself (a deployment choice); or the correctness of gate logic (replay verifies conformance to deployed logic, not logic correctness).
We organize related work by function. Existing systems provide ordering, persistence, or policy, but none structurally bind execution to canonical state identity.
State machine replication (SMR) [1, 2, 3] ensures replicas agree on state but does not enforce pre-commit validation against configurable gate profiles or structural execution gating. Blockchain [5, 12] enforces ordering through consensus but does not separate validation, commit, and execution authorities. Smart contracts execute during block processing, not as post-commit gated operations.
ACID databases [9] enforce atomicity and isolation but not mandatory pre-commit validation pipelines, role separation, or execution gating. Event Sourcing [6] provides append-only storage as an application pattern, not structural enforcement — events are written without mandatory pre-validation.
Capability systems [7, 13] provide invocation-level authorization. Commit-gated causality enforces authorization as a property of state progression, not invocation. Policy engines (OPA, workflow orchestrators) enforce rules but do not bind execution to canonical state; policy is advisory and side effects may occur through alternative paths.
Workflow engines such as Temporal [14, 15], Airflow, and Cadence provide durable execution with retry semantics and task ordering. These are the closest architectural relatives to commit-gated causality in practice. However, they do not enforce a mandatory pre-commit validation gate with structural invariants, do not bind execution authority to canonical state identity, and do not provide deterministic replay verification without runtime trust. Commit-gated causality is composable with workflow orchestrators as an execution integrity layer.
State progression is serialized at the commit authority, limiting throughput under high contention. Validation occurs in parallel, reducing the critical section to O(1) atomic pointer advancement.
Non-deterministic validation breaks replay and is excluded by design. The model assumes correct validation logic; replay verifies conformance to deployed logic but not logic correctness.
The architecture assumes a trusted genesis state as a deployment parameter. The threat model does not address Byzantine failure of the commit authority itself; distributed commit embodiments address this at the deployment level.
These reflect a deliberate choice: structural safety over maximal flexibility.
The architecture separates validation, commit, and execution into distinct layers, enabling independent verification and configurable enforcement. Unlike serialized state machines, this separation allows parallel validation with a minimal commit critical section.
A key trade-off in the architecture is the prioritization of strict causality over eventual consistency. While this design choice introduces a latency floor dictated by the commit authority's turn-around time, it eliminates the class of phantom executions prevalent in distributed systems, where side effects are triggered by state that is later reverted or superseded. This is a deliberate architectural commitment: systems requiring causal integrity must accept serialization at the commit boundary as the cost of structural correctness guarantees.
Applications include autonomous agents, financial settlement, robotic control, and multi-party governance — systems where side effects are consequential and causal integrity must be structurally guaranteed rather than assumed.
The defining insight generalizes: correctness in autonomous systems should derive from structural constraints on state progression, not from the trustworthiness of execution environments. Just as ACID properties shaped database systems and consensus protocols shaped distributed systems, causal integrity may become a foundational property of future autonomous infrastructures.
We have introduced commit-gated causality, an architectural principle binding execution authority to canonical state identity. The commit-gated causal architecture enforces this through mandatory validation, exclusive commit, and execution gating, preserving three structural invariants by construction. Supporting lemmas establish pointer uniqueness, validation-gated progression, and pointer-bound execution. The Canonical Causality Theorem proves that together they guarantee all observable effects originate from validated canonical history.
The architecture defines a class of systems — commit-gated causal systems — in which correctness derives from structural constraints on state progression rather than trusted execution. The defining insight: execution rights are not granted by policy alone, but by the identity of the canonical state itself.
Just as ACID properties shaped database systems and consensus protocols shaped distributed systems, causal integrity may become a foundational property of future autonomous infrastructures.
Future work includes formal verification under failure models, throughput evaluation under distributed commit, and application to autonomous agent governance frameworks.
A reference implementation of the commit-gated causal architecture was validated against a conformance suite of 76 tests covering the protocol's structural invariants and failure modes. Tamper detection was confirmed against a known-bad chain. The normative protocol specification and supporting materials — including the canonical encoding definition (canonical_encoding.md), execution graph model (execution_graph.md), protocol invariants (invariants.md), verification model (verification_model.md), and JSON schemas (schemas/) — are available at:
Lindberg, Daniel. "Commit-Gated Causality: A Deterministic Architecture for Canonical State Progression and Causal Execution Control." Polaris Protocol Technical Report POLARIS-TR-2026-001, v0.1, March 2026. https://polaris-protocol.org/paper/