Small Trades Cooperative – Trust Framework

Governance specification for the small-trades-cooperative ecosystem. Defines who participates, what credentials exist, how authority is delegated, and what obligations each role carries. Generated by /keri:design0-ecosystem.


1. Executive Summary

The Small Trades Cooperative trust framework establishes a KERI-native governance model for independent skilled tradespeople — plumbers, electricians, HVAC technicians, welders, carpenters, concrete workers, and related trades. It replaces centralized trust intermediaries (general contractors, review platforms, trade companies) with cryptographically verifiable relationships using Autonomic Identifiers (AIDs), Authentic Chained Data Containers (ACDCs), and delegated authority hierarchies.

Scope: A cooperative of independent skilled tradespeople where each worker holds verifiable credentials — trade licenses, insurance, bonding, safety certifications — and contracts directly with homeowners and cities. No general contractor middleman. Job sequencing, credential verification, and compliance are handled by the protocol. Reputation is built through cryptographically attested job completions and travels with the worker. The cooperative provides community and collective bargaining, not administrative overhead. Workers capture the full value of their labor.

Regulatory basis: State trade licensing codes, local building codes (IBC/IRC), OSHA workplace safety standards, state contractor registration requirements, surety and bonding requirements.

Core principles:


2. Governance Authority

2.1 Governing Body

This ecosystem operates without a single governing body. Governance is distributed across existing institutional trust anchors and emergent community standards:

As the ecosystem matures, governance authority migrates from institutional monopoly to reputation-backed trust. Master tradespeople with strong track records become trust anchors for mentorship and skill attestation. Private inspectors with proven accuracy compete with government inspectors. The institutions don’t disappear — they stop being the only game in town.

2.2 Regulatory Frameworks

2.3 Framework Versioning

This trust framework is versioned. Changes to credential schemas, role definitions, or delegation rules require a new version published to the ecosystem’s schema registry. Participants MUST verify framework version before issuing or accepting credentials.


3. Participant Roles

3.1 Role Summary

Role Display Name Witness Pool Watcher Network Agent Service ACDC Registry
tradesperson Independent Tradesperson - - Yes -
master_tradesperson Master Tradesperson - - Yes Yes
apprentice Apprentice - - Yes -
coop Trades Cooperative Yes Yes Yes Yes
homeowner Property Owner / Client - - Yes -
inspector Credentialed Inspector - - Yes Yes
mediator Dispute Mediator - - Yes -
licensing_board State Licensing Board Yes Yes Yes Yes
city_building_dept City Building Department Yes Yes Yes Yes
connector_service Connector / Recommendation Platform - - Yes -
escrow_service Escrow Protocol Service Yes Yes Yes Yes
device_attestor Hardware Device Attestor - - - Yes

3.2 Role Details

Independent Tradesperson (tradesperson)

Description: Licensed skilled worker (plumber, electrician, HVAC, welder, carpenter, concrete worker, etc.) who holds their own credentials, contracts directly with clients, and builds portable reputation through attested job completions. The atomic unit of this ecosystem.

Governance obligations:

Credentials issued: (receives job_completion_attestation from homeowner) Credentials required to participate: trade_license, insurance_credential, safety_certification


Master Tradesperson (master_tradesperson)

Description: Highly experienced tradesperson who mentors apprentices, issues apprenticeship attestations, and serves as a trust anchor. Their reputation compounds through their apprentices’ success. Mentorship is a revenue stream.

Governance obligations:

Credentials issued: apprenticeship_attestation, skill_level Credentials required to participate: trade_license, master_designation, insurance_credential, safety_certification


Apprentice (apprentice)

Description: Tradesperson-in-training working under a master or journeyman. The apprenticeship path is an alternative to trade school — find a good mentor, learn the trade, build verifiable lineage.

Governance obligations:

Credentials issued: none Credentials required to participate: apprenticeship_attestation, safety_certification


Trades Cooperative (coop)

Description: Voluntary association of tradespeople with published membership requirements. Provides collective brand, shared marketing, group insurance rates. Does NOT own members’ credentials or capture their revenue. Competes with traditional trade companies by requiring the same quality without taking 40-60% of job revenue.

Governance obligations:

Credentials issued: coop_membership, coop_governance_framework Credentials required to participate: coop_registration


Property Owner / Client (homeowner)

Description: Individual or entity contracting for trade services. Funds escrow, receives work, issues job completion attestations. The job completion attestation — not a review — is the atomic unit of tradesperson reputation.

Governance obligations:

Credentials issued: job_completion_attestation Credentials required to participate: financial_responsibility, property_credential


Credentialed Inspector (inspector)

Description: Licensed individual who verifies physical work against building code schemas. Can be government or private. Private inspectors break the city inspector bottleneck by competing on speed, availability, and reputation.

Governance obligations:

Credentials issued: code_compliance_attestation Credentials required to participate: inspector_license


Dispute Mediator (mediator)

Description: Credentialed individual agreed upon in contracts before work begins. Reviews audit trails and evidence to resolve disputes. Fee comes from escrowed funds.

Governance obligations:

Credentials issued: mediation_ruling Credentials required to participate: mediator_credential


State Licensing Board (licensing_board)

Description: Government entity that issues trade licenses and defines requirements. Trust anchor in the immature ecosystem. Role shifts from paper processing to standard-setting and audit as ecosystem matures.

Governance obligations:

Credentials issued: trade_license, master_designation, inspector_license, skill_level Credentials required to participate: (root authority)


City Building Department (city_building_dept)

Description: Local government entity that publishes building code as verifiable schemas and accepts inspector attestations. Role shifts from inspection workforce to governance framework and quality audit.

Governance obligations:

Credentials issued: inspector_license, property_credential Credentials required to participate: (root authority)


Connector / Recommendation Platform (connector_service)

Description: Optional service facilitating discovery between homeowners and tradespeople. Does NOT own reputation data. Deliberately lightweight — no infrastructure power accumulation. The organic, local alternative to Yelp/Angi.

Governance obligations:

Credentials issued: none Credentials required to participate: connector_registration


Escrow Protocol Service (escrow_service)

Description: Infrastructure holding funds between contract signing and job completion. Cross-ecosystem primitive — not owned by any single entity. Releases on mutual attestation or mediator ruling.

Governance obligations:

Credentials issued: escrow_contract, escrow_release Credentials required to participate: (protocol infrastructure)


Hardware Device Attestor (device_attestor)

Description: Manufacturer or certifier of devices that produce hardware-attested images and recordings. Enables the physical-to-digital bridge.

Governance obligations:

Credentials issued: hardware_attestation Credentials required to participate: (manufacturer authority)


4. Credential Governance

4.1 Issuance Rules

Each credential type has a designated issuer role. Only AIDs holding the required role credential may issue that credential type. Issuance MUST:

4.2 Revocation Policies

4.3 Dispute Resolution

Graduated 5-filter model designed to resolve disputes at the lowest possible cost:

Filter 1 — Clear contracts. Contracts define scope, milestones, escrow amounts, estimate ranges for unknowns, and pre-designated mediator. Scope changes require signed amendments. Most misunderstandings are prevented here.

Filter 2 — Verifiable attestations. Inspection sign-offs, milestone completions, and timestamps make fault obvious. The audit trail shows who did what, when, to what standard, inspected by whom.

Filter 3 — AI audit. Automated analysis of the KERI audit trail catches non-obvious liability patterns. Adjudicating bodies publish resolution algorithms that run against the evidence chain.

Filter 4 — Credentialed mediator. Pre-designated in the contract. Reviews audit trails, witnessed recordings, and evidence. Issues binding ruling. Fee comes from escrowed funds, defined up front.

Filter 5 — Traditional legal system. Last resort. Court receives cryptographic evidence chain — signed contracts, attested milestones, witnessed recordings, mediator ruling. Case is simpler because evidence is verifiable.

Duplicity (equivocation) detected by watchers constitutes automatic grounds for credential suspension. The governance authority (licensing board or coop) convenes review to evaluate duplicity evidence and render judgment.


5. Infrastructure Obligations

5.1 Witness Pool Requirements

Roles operating witness pools (coop, licensing_board, city_building_dept, escrow_service) MUST:

5.2 Watcher Network Requirements

Roles subscribing to watcher networks (coop, licensing_board, city_building_dept, escrow_service) MUST:

5.3 Agent Service Requirements

All roles running KERIA agents MUST:

5.4 ACDC Registry Requirements

Roles operating ACDC registries (master_tradesperson, coop, inspector, licensing_board, city_building_dept, escrow_service, device_attestor) MUST:


6. Privacy Framework

6.1 Disclosure Modes

6.2 Data Minimization

Verifiers MUST request only the minimum credential fields required for their purpose. Selective disclosure credentials MUST be presented in compact form unless the verifier demonstrates a legitimate need for full disclosure.

Credential holders control presentation. No credential may be verified without the holder initiating the IPEX presentation exchange. The holder’s agent MUST prompt for consent before disclosing attributes.

6.4 Privacy Requirements


7. Liability Framework

7.1 Issuer Liability

Credential issuers are liable for the accuracy of claims at the time of issuance. Issuers MUST revoke credentials when underlying facts change. Licensing boards are liable for timely revocation of lapsed licenses. Master tradespeople stake their reputation on apprenticeship attestations — the quality of their apprentices reflects directly on them.

7.2 Verifier Liability

Verifiers are liable for checking revocation status and duplicity evidence before relying on a credential. A homeowner who hires a tradesperson without verifying credentials assumes the risk. A city that accepts an inspector attestation without checking the inspector’s credential status is liable for that omission.

7.3 Holder Liability

Holders are liable for maintaining key security. Compromise of a holder’s keys does not invalidate properly-issued credentials but requires immediate key rotation and re-issuance. Tradespeople are liable for the work they attest to in contracts.

7.4 Infrastructure Liability

Witness pool operators are liable for availability and first-seen integrity. Watcher operators are liable for timely duplicity reporting. Escrow services are liable for secure fund custody and correct release execution.

7.5 Escrow-Specific Liability

The escrow pattern creates clear liability boundaries:

7.6 Multi-Trade Liability

On jobs involving multiple trades, the audit trail establishes causation:


8. Delegation Trees

8.1 Trade Licensing

licensing_board (root)
  -> tradesperson (scope: "Practice within licensed category", depth: 1)
  -> master_tradesperson (scope: "Practice + issue apprenticeship attestations", depth: 2)
    -> apprentice (scope: "Practice under supervision", depth: 1)
  -> inspector (scope: "Inspect within licensed trade categories", depth: 1)

8.2 Inspection Authority

city_building_dept (root)
  -> inspector (scope: "Attest code compliance for permitted work", depth: 1)

Mature ecosystem addition:

licensing_board (root)
  -> master_tradesperson (scope: "Attest code compliance within their trade", depth: 1)

8.3 Coop Membership

coop (root)
  -> tradesperson (scope: "Represent brand, meet governance requirements", depth: 1)

No sub-delegation — members cannot grant membership.

8.4 Dispute Resolution

arbitration_body / licensing_board (root)
  -> mediator (scope: "Issue binding rulings on contract disputes", depth: 1)

No sub-delegation — mediator authority is flat.

8.5 Escrow Release

escrow_service (root — protocol)
  -> homeowner + tradesperson (scope: "Jointly trigger release on mutual attestation", depth: 1)
  -> mediator (scope: "Trigger release on binding ruling", depth: 1)

No single party can release unilaterally.

8.6 Mentorship Lineage

licensing_board (root)
  -> master_tradesperson (scope: "Attest skill progression, issue credentials", depth: 3)
    -> journeyman (scope: "Supervise apprentice on site", depth: 1)
      -> apprentice (scope: "Practice under supervision", depth: 0)

Depth 3 allows operational supervision chains. Credentialing authority (apprenticeship_attestation) always comes from the master, not the journeyman.


9. Interoperability

Insurance Ecosystem Bridge

Bridge credentials: insurance_credential, bond_credential

Data flows:

Financial Ecosystem Bridge

Bridge credentials: financial_responsibility

Data flows:

Escrow Protocol Bridge

Bridge credentials: escrow_contract, escrow_release, mediation_ruling

Data flows:

Education / Training Ecosystem Bridge

Bridge credentials: apprenticeship_attestation, safety_certification, skill_level

Data flows:

Cross-ecosystem credential verification requires both ecosystems to publish compatible OOBIs and recognize each other’s governance frameworks. Bridge credentials MUST chain from a credential recognized in both ecosystems.


10. Ecosystem Maturity Model

This ecosystem is designed to bootstrap from existing trust structures and evolve toward reputation-based governance.

Phase 1: Bootstrap (Immature)

Phase 2: Growth

Phase 3: Mature


Next Steps