Implement comprehensive security infrastructure from Security-Remediation-Plan.md: New Infrastructure Files: - circuit_breaker.go (ARCH-001): Circuit breaker pattern for contract failures with Closed/Open/Half-Open state machine and emergency shutdown - invariants.go (ARCH-003): Formal verification with 14 critical invariants and TLA+ specifications for runtime verification - canary_deployment.go (ARCH-004): Feature flags with percentage-based rollout and auto-rollback on error rate threshold - audit_logger.go (ARCH-005): Comprehensive audit logging with multi-index querying across 8 categories (Auth, Access, Data, Governance, etc.) - config_registry.go (LOW-003): Configuration governance infrastructure - event_archival.go (LOW-001): Event log archival with Merkle commitments - validation.go (LOW-002): Common input validation constants and utilities - role_registry_domain.go (CRIT-002): Domain-specific committee roles (Legal, Health, Education, Economy, Identity, Governance) Contract Security Fixes: - contract.go: Add HasDomainCommitteeAuthority to IRoleRegistry interface - lex.go: Remove duplicate ErrReasonTooLong declaration - salus.go, eligere.go, palam.go, pons.go, scire.go, tribute.go: Line ending normalization and security validation integration - collocatio.go: Security validation for investment operations State Type Updates: - state/pons.go, state/salus.go, state/tribute.go: Line ending fixes 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> |
||
|---|---|---|
| .docker | ||
| .github | ||
| cli | ||
| config | ||
| docs | ||
| examples | ||
| internal | ||
| pkg | ||
| scripts | ||
| .dockerignore | ||
| .gitignore | ||
| .gitmodules | ||
| CHANGELOG.md | ||
| CONTRIBUTING.md | ||
| Dockerfile | ||
| Dockerfile.wsc | ||
| LICENSE.md | ||
| Makefile | ||
| README.md | ||
| ROADMAP.md | ||
| TESTNET.md | ||
| codecov.yml | ||
| devnotes.md | ||
| docker-compose.yml | ||
| go.mod | ||
| go.sum | ||
| tutus.service.template | ||
README.md
Tutus Chain
Sovereign blockchain platform for government deployments. Forked from NeoGo.
Website: tutus.one License: Apache 2.0
Overview
Tutus is an independent blockchain designed for government-grade deployments with:
- Sovereign instances - Each government runs their own chain
- 1-second blocks - Fast finality with dBFT consensus
- 7 validators - Government-controlled consensus nodes
- Zero gas for citizens - Native contracts subsidize operations
- Inter-government bridge - Optional cross-border interoperability
Building
Requires Go 1.24+ and make:
make build
The resulting binary is bin/tutus.
Running a Node
Start a Tutus node:
./bin/tutus node --config-file ./config/protocol.tutus.yml
For testnet:
./bin/tutus node --config-file ./config/protocol.tutus.testnet.yml
Network Flags
--tutus- Tutus mainnet (government deployment)--tutus-testnet- Tutus testnet
Configuration
Network configurations are in ./config/:
| File | Purpose |
|---|---|
protocol.tutus.yml |
Production government deployment |
protocol.tutus.testnet.yml |
Development testnet |
Docker
docker build -t tutus-chain .
docker run -d --name tutus -p 10333:10333 -p 10332:10332 tutus-chain
Native Contracts (Planned)
The following will be built into the Tutus protocol:
| Contract | Purpose |
|---|---|
| PersonToken | Soul-bound identity |
| Scire | Universal education |
| Salus | Universal healthcare |
| Sese | Life planning |
| Tribute | Anti-hoarding economics |
| VTS | Government stablecoin |
| Eligere | Democratic voting |
Validator Setup
See docs/validator.md for government validator deployment.
Origin
Tutus is forked from NeoGo, the Go implementation of the Neo N3 blockchain. We maintain compatibility with the Neo VM while extending the protocol for government use cases.
License
Apache 2.0 - See LICENSE.md