Technical Report · POLARIS-TR-2026-001 · v0.5 · April 2026
Independent Researcher
daniel@polaris-protocol.org
April 2026
Abstract
Systems execute from state. That state may be stale, invalid, or later rejected. In no widely deployed architecture is execution authority structurally derived from committed canonical state. Logs record what happened. Audit reconstructs it. Replay reproduces it. None of these establish that execution was structurally authorized to occur from the state it acted upon.
Polaris introduces commit-gated execution: side effects are permitted only as consequences of transitions that have been validated and committed — and that fact is independently verifiable.
Execution authority is derived from committed canonical state — not inferred from logs, not reconstructed after the fact. The architecture enforces this structurally — not through policy, not through trust, not through audit. The result: execution authority is verifiable by anyone, trusted by none.
Polaris is a constraint layer on execution authority. It constrains when execution is valid — not how systems are built, governed, or operated.
It does not provide consensus, storage, scheduling, or fairness. It does not replace existing distributed system primitives. It composes with them.
One constraint. One guarantee:
Execution authority must be derived from committed canonical state — not inferred, not reconstructed, not assumed.
Systems execute from state.
That state may be stale, invalidated by a concurrent transition, or superseded before execution began. The system does not know. Execution occurs regardless.
This is not an edge case. It is the default condition of every widely deployed distributed system.
Logs record what happened. Audit reconstructs the sequence. Replay reproduces the effects. These describe execution — they do not establish authority to execute.
This is not a failure of implementation. It is an absence of definition. No existing architecture specifies execution authority as a structural property of committed canonical state. The property has never been defined, enforced, or independently verifiable.
Polaris closes this gap.
It introduces commit-gated execution: side effects are permitted only as consequences of transitions that have been validated and committed. Execution authority is derived from the identity of committed canonical state — independently verifiable without runtime trust.
This is distinct from blockchain. Blockchain achieves consensus among mutually distrusting parties — that is its contribution. Polaris assumes a trusted commit authority and contributes something blockchain does not have: a structural execution gate that prevents side effects from occurring without a committed transition as precondition. A blockchain records what happened. Polaris prevents unauthorized execution from happening in the first place.
Together, these establish commit-gated execution as a structural method for enforcing causal integrity in distributed and autonomous systems.
This work does not address consensus, scheduling, governance, or policy semantics. It addresses one question: was execution structurally authorized to occur from the state it acted upon.
The system enforces one constraint: execution authority must be derived from committed canonical state.
To enforce this, components operate in strict sequence. Clients propose transitions. A validation pipeline evaluates each transition deterministically before it can proceed. A commit authority — and only the commit authority — advances canonical state atomically, appending to an immutable record. An execution gate permits side effects only when an execution request references the current canonical state.
Definition 1 (Canonical State)
A state Sn ∈ H is canonical at pointer value n. Every element of H is canonical. No state outside H is canonical. A proposed state is a candidate state carried by a transition awaiting evaluation; it becomes canonical only upon successful commit, at which point it is appended to H.
The system maintains a history: a totally ordered sequence of states
H = (S₀, S₁, S₂, …)where S₀ is the genesis state and each Si is identified by its index i ∈ ℕ, called the pointer.
We write Si for the state at index i ∈ ℕ. The pointer n ∈ ℕ denotes the index of the most recently committed state; the current canonical state is Sn. The pointer n is monotonically non-decreasing. Only the commit authority may advance n.
Four properties hold by construction:
These properties are not enforced by policy. They are enforced by the structure of the commit authority and the append-only history.
Transitions are not submitted as raw state changes. They are structured descriptors — called Proposed State Transition Objects (PSTOs) — that carry both the candidate change and a reference to the state they act upon.
The commit authority evaluates each PSTO through a deterministic function V:
V(Sn, PSTO) → {PASS, FAIL}A PSTO is valid only if it references the current pointer value n. A PSTO referencing any other value is structurally rejected — not by policy, but because the pointer has moved.
If V = PASS, the commit authority advances the pointer atomically: n becomes n + 1, and Sn+1 is appended to the history. If multiple PSTOs are valid concurrently, at most one advances the pointer. The others are rejected — consistent with I1. Selection is determined by the commit authority’s ordering mechanism. Polaris guarantees that whatever wins is valid. It does not prescribe which valid transition is chosen.
Execution is permitted only from the current canonical state Sn. A request referencing any Si where i ≠ n is rejected at the execution gate.
The properties above define what the system must enforce. Section 3 describes one architecture that enforces them. Other architectures are possible provided I1–I3 continue to hold.
Identity is not asserted — it is derived.
Definition 2 (Canonical State Identity)
The canonical state identity is the cryptographic identifier referenced by the canonical state pointer and derived deterministically from the committed state transition record. Formally:
id(Sn) = H(recordn)where H is a collision-resistant hash function and recordn is the canonical encoding of the committed transition producing Sn.
Definition 3 (Replay Determinism)
Given the committed sequence H = (S₀, S₁, …, Sn), any conformant verifier applying the same validation function V from the same genesis state S₀ reconstructs identical canonical state. Replay determinism holds by A2: V is a pure function of its inputs.
We define three operations used in Section 4:
Each requirement is necessary. None is sufficient alone. A system satisfying R1–R4 without R5 cannot be independently verified. A system satisfying R1–R3 without R4 permits execution from uncommitted state. The architecture is designed to satisfy all five simultaneously — within its defined model.
We model adversaries that can propose inputs, corrupt components, and attempt to induce invalid state transitions or unauthorized execution.
We assume cryptographic primitives remain secure and the append-only history preserves integrity. Byzantine failure of the commit authority itself is out of scope and treated as a deployment concern (Section 9).
The architecture enforces the invariants I1–I3 through five components with strictly separated roles and a constrained execution flow. Each component is bound to exactly one role. No component may hold more than one role — this structurally excludes privilege escalation.
A transition progresses through the system as follows:
Implementation details — encoding, transport, consensus, and storage — are deployment concerns and not prescribed by the protocol. The normative specification is available at: https://github.com/polaris-specs/polaris-protocol
For implementers: QUICKSTART.md defines five conformance requirements. A system satisfying them is a conformant Polaris implementation.
The following invariants hold by construction under the model and assumptions of Section 2.
Invariant 1
For any committed state Sn, successor(Sn) is a partial function: it is defined for at most one Sn+1.
Without I1, concurrent transitions could produce divergent histories. Atomic pointer advancement via compare-and-swap enforces this — not by coordination, but by construction.
Invariant 2
No transition becomes committed without satisfying the validation conditions for the current state.
Without I2, an invalid transition could advance the pointer. The commit authority enforces this independently — not by trusting the validation pipeline, but by verifying the conditions before advancing the pointer.
Invariant 3
Execution is permitted only when the request references the current pointer value.
Without I3, execution could occur from stale or superseded state. The execution gate enforces this at the system boundary — not by policy, but by structural rejection.
Commit and execution are distinct events with asymmetric properties.
Commit is atomic and verifiable: given a validated transition and the current canonical state, the commit authority advances the pointer atomically via compare-and-swap, appends the record, and produces a result that any verifier can reconstruct from the history alone.
Execution is not constrained by the protocol in the same way. Polaris does not bound what execution does, when it occurs relative to commit, or whether it is deterministic. A committed transition may be executed immediately, deferred indefinitely, or never executed at all. Timing and triggering of execution are the implementing system’s responsibility.
What Polaris constrains is the precondition: execution may not begin without a corresponding committed transition. The gate enforces this structurally. What happens after the gate permits execution is outside the protocol.
The protocol guarantees structural authorization, not execution correctness. Every executed side effect is traceable to a committed transition. What that transition produces is outside the protocol boundary.
Corollary 1
From I1–I3 it follows that two independent implementations conforming to the Polaris specification, processing the same sequence of proposed transitions from the same genesis state, will permit exactly the same set of execution effects — independently, without communication, and without trust in either implementation’s internal behavior.
The conjunction of I1, I2, and I3 means that canonical state identity is not an internal implementation detail. It is an externally verifiable fact, reconstructible by any conformant verifier from the append-only record alone — without access to implementation-specific state or execution traces.
This is not a description of what happened, but a structural guarantee that any permitted execution must follow from a committed and validated state transition.
Verifiable by anyone. Trusted by none.
Independent verification is possible because I1–I3 constrain all permitted state transitions and A2 guarantees that validation is deterministic.
A verifier needs only the append-only history and the validation function V as defined by the specification. Given these, the verifier can reconstruct the canonical state sequence from genesis without access to the original system, without communication with any participant, and without trust in any component’s internal behavior.
The verification procedure follows directly from the architecture:
Any deviation fails verification.
This is possible because of A2: validation is deterministic. Given identical inputs, V always returns the same result. A verifier evaluating a committed record will reach the same conclusion as the original commit authority — not because they share state, but because the function is identical.
This establishes that any conformant verifier will reconstruct the same canonical state sequence from the same history.
Complexity. Verification is O(n) in the number of committed transitions. Each step depends on the prior state, forming a linear verification path.
What verification establishes. A passing verification does not confirm that the system behaved correctly in all respects. It confirms one thing: every committed transition was valid at the time of commit, and execution authority was structurally derived from committed canonical state.
This is the scope of the guarantee.
The architecture excludes three classes of operations by design.
No override. No operation may advance the canonical pointer except through the validation and commit sequence. There is no privileged path — not for administrators, not for the system itself. An override would break I2: a transition could become committed without satisfying validation conditions.
No bypass. No operation may produce externally observable effects except through the execution gate. A bypass would break I3: execution could occur from state that has not been committed.
No retroactive modification. Once a transition is committed, it cannot be altered. The history is append-only in the strongest sense: there is no delete, no update, no correction. A retroactive modification would introduce ambiguity into the canonical history, violating I1’s requirement of a single authoritative progression.
These are not policy decisions. They are structural requirements. A system that permits any of these operations cannot enforce I1–I3, and therefore cannot guarantee that execution is derived solely from committed canonical state.
These exclusions are what make independent verification possible.
Execution non-determinism. Polaris does not constrain what execution produces, when it occurs, or whether its effects are deterministic. A committed transition authorizes execution — it does not prescribe it. The protocol boundary ends at the execution gate. What occurs beyond the gate is the responsibility of the implementing system.
Selection non-determinism. When multiple valid transitions are proposed concurrently, Polaris does not determine which one commits. Selection is determined by the commit authority’s ordering mechanism. The protocol guarantees that whatever commits is valid — not that a specific valid transition is chosen. Replay verifies the committed sequence; it does not reconstruct the selection process that produced it.
Together, execution non-determinism and selection non-determinism define the limit of the protocol’s determinism claim. Polaris guarantees replay determinism (Definition 3, Section 2): given the committed sequence, any verifier reconstructs identical state. It does not guarantee that a specific execution will occur, nor that a specific valid transition will win contention. This distinction is the scope of the protocol.
The following properties are direct consequences of I1–I3.
The architecture is designed so that failures preserve canonical state and produce no externally observable effects.
In all cases, I1–I3 continue to hold. Canonical state is never modified by a failure.
Safety is unconditional within the model: failures cannot violate I1–I3.
Liveness depends on commit authority availability and is not analyzed in this report.
Polaris enforces causal integrity: execution authority is derived from committed canonical state.
The following are outside the scope of this protocol:
The following are explicitly not enforced by the protocol:
These boundaries are what make the protocol composable with existing infrastructure.
The protocol admits multiple implementation embodiments, provided they preserve its invariants.
An embodiment is conformant if and only if I1–I3 continue to hold.
The following comparisons situate the protocol relative to existing system models by identifying which invariants they do and do not enforce.
State machine replication (SMR) [1, 2, 3] establishes agreement among replicas on an ordered sequence of operations and typically validates requests before committing them. The distinction from commit-gated execution is structural: SMR binds replicas to an agreed ordering, but does not bind execution authority to canonical state identity at evaluation time (R4), nor enforce configurable domain-specific validation (R2). Execution in SMR proceeds as a consequence of replica agreement, not as a consequence of a committed canonical state pointer. Linearizability [11] formalizes the ordering properties that underpin the commit authority’s CAS operation.
ACID databases [9] enforce atomicity, consistency, isolation, and durability. I2 and I3 are not intrinsic properties of the ACID model — mandatory pre-commit validation, role separation, and execution gating are not guaranteed by the model. Event sourcing [6] provides an append-only record as an application pattern. Events are appended without mandatory pre-validation; the record describes what happened but does not constrain execution authority.
Conflict-free replicated data types (CRDTs) [16] permit concurrent, divergent state evolution that later converges, rather than enforcing a single canonical progression at all times. Commit-gated execution occupies the opposite end of this design space — it requires commitment before execution, trading availability for strict causal verifiability. The Just-Right Consistency framework [17] maps the spectrum between these poles. Commit-gated execution defines the maximum-verifiability point on that spectrum within its defined model.
PeerReview [18] establishes accountability by detecting deviating behavior through append-only logs after execution has occurred. Commit-gated execution operates before execution, excluding unauthorized effects rather than detecting them afterward. The two approaches are complementary — PeerReview addresses what to do when behavior deviates; Polaris addresses what prevents deviation structurally. Both rely on append-only records as the foundation of verifiability, but serve different points in the causal chain.
Capability systems [7, 13] provide invocation-level authorization: a component may act if it holds the appropriate capability at the time of invocation. Commit-gated execution enforces authorization as a property of state progression, not invocation — execution authority is derived from committed canonical state, not from a held token. Policy engines and workflow orchestrators enforce rules at runtime but do not bind execution to canonical state; policy is evaluated at invocation time and is not structurally bound to canonical state progression. I3 is not a property of capability or policy systems.
Workflow engines such as Temporal [14, 15] provide durable execution with retry semantics, task ordering, and fault tolerance. They are the closest deployed analogues to commit-gated execution in practice. However, they do not enforce a mandatory pre-commit validation gate with structural invariants — I2 is not a property of workflow orchestration. They do not bind execution authority to canonical state identity — I3 is not enforced. They do not provide deterministic replay verification without runtime trust. Commit-gated execution is composable with workflow orchestrators as an execution integrity layer beneath their scheduling and retry mechanisms. The Dedalus model [19] formalizes distributed computation in terms of time and causality; the canonical pointer in Polaris serves an analogous role as the single linearization point that determines valid execution, grounded in I1.
Distributed ledger technologies maintain append-only records with cryptographic hash chains and achieve consensus among mutually distrusting parties. The surface resemblance to Polaris is strong: both use hash-linked records, both use cryptographic signing, both provide tamper evidence.
The distinction is structural. Blockchain achieves verifiability through distributed replication and consensus — the record is trusted because many independent parties agree on it. Polaris achieves verifiability through cryptographic signing by a known commit authority — the record is trusted because any verifier can independently check the signature and the hash chain without trusting the producing system.
More fundamentally: a blockchain can tell you that a transaction was recorded. It cannot structurally prevent a side effect from occurring from unvalidated or superseded state. I3 is not a blockchain property.
Whether a particular blockchain system satisfies I1, I2, and I3 as defined here is an empirical question. Polaris’ invariants can be applied as a verification lens. But the contribution of Polaris is not the hash chain — it is the execution gate and the structural binding of execution authority to committed canonical state.
The commit authority is a serialization point. Under high contention, multiple valid transitions compete for a single pointer advancement, introducing a latency floor proportional to the commit authority’s round-trip time. Validation occurs in parallel and does not contribute to this bottleneck — the critical section is constant-time pointer advancement.
The protocol enforces a single canonical progression. It does not support concurrent commits to multiple authoritative states.
The model assumes correct validation logic. Replay verification confirms that transitions conformed to deployed gate profiles — it does not verify that those profiles were correct. The correctness of validation logic is outside the protocol boundary.
The genesis state is a deployment parameter. The protocol assumes a trusted starting point. How that starting point is established and agreed upon is outside the protocol’s scope.
Formal machine-checked verification of I1–I3 is not addressed in this report. The invariants are argued by construction; mechanical proof constitutes future work.
These limitations reflect a deliberate design position: structural causal integrity over maximal availability and flexibility.
The central insight of commit-gated execution is a separation that existing systems do not enforce: validation, commit, and execution are distinct operations with distinct authorities. In most deployed systems, these collapse — a component that can propose can often commit, and a component that commits often triggers execution. This collapse is where unauthorized execution originates.
By enforcing strict role separation and binding execution to committed canonical state, the architecture excludes a class of failures that logs, audit, and monitoring do not prevent — phantom executions, where side effects are triggered from state that is later invalidated or superseded. These are not detectable in advance by any observational mechanism. They are only preventable structurally.
The trade-off is deliberate. Serialization at the commit boundary introduces latency. Systems that require causal integrity must accept this cost. Systems that do not require it should not use this protocol.
The defining property — verifiable by anyone, trusted by none — is not a feature of the implementation. It is a consequence of the invariants.
Systems execute from state. In no widely deployed architecture is that execution structurally constrained to originate from committed canonical state. This is not typically enforced as a structural property in existing systems.
Polaris defines it.
Commit-gated execution binds execution authority to committed canonical state identity — enforced through mandatory validation, exclusive commit, and execution gating. Three structural invariants enforced by construction establish that all observable effects originate from validated canonical history.
From these invariants a non-trivial consequence follows: two independent conformant implementations, given the same history, will permit exactly the same set of execution effects — without communication, without shared state, without trust.
Execution authority is verifiable by anyone. Trusted by none.
Future work includes formal machine-checked verification of I1–I3, throughput evaluation under distributed commit embodiments, and application of the protocol in autonomous system oversight.
A reference implementation was validated against the conformance checklist in a single-node configuration. Replay verification was performed on valid and tampered execution histories. In both cases, the implementation satisfied I1–I3. Valid histories were accepted and tampered histories were rejected.
These results do not constitute performance benchmarks. They demonstrate that the invariants are implementable and that the verification procedure produces deterministic outcomes for a conformant implementation. Replay verification produced identical results when re-evaluated from the recorded history.
The normative specification is available at: https://github.com/polaris-specs/polaris-protocol
For implementers: QUICKSTART.md defines the minimal conformance path.
Lindberg, Daniel. “Polaris Protocol: Commit-Gated Execution and Causal Integrity.” Polaris Protocol Technical Report POLARIS-TR-2026-001, v0.5, April 2026. https://polaris-protocol.org/paper/