Community Layer Money/Finance — vSOV-COMM-M3.2

Layer: Community Segment: Money / Finance Constraints: membership fluidity · heterogeneous trust · churn assumed Failure premise: capture + artifacts + coercion

0. Frame

This section defines the starting assumptions for any community that shares a treasury. It explains what is always true at this layer, regardless of how aligned or “values-driven” the group feels right now.

Layer constraints
  • Membership changes are normal.
  • Trust is uneven; assume mixed incentives.
  • Governance churn is inevitable (signers vanish, roles rotate).

Translation: design for people moving, burning out, or disappearing. The money system must survive that, not freeze because someone is “busy.”

Hard premise
  • Communities fail via capture, artifacts, and coercion.
  • “Better ideology” does not fix bad finance primitives.

Translation: politics, vibes, and good intentions cannot save a treasury that is structurally easy to hijack or accidentally leak.

Mental model Think of this layer as the shared cash register plus long-term vault for a group that will always have disagreements and turnover. The design assumes that reality, instead of hoping everyone stays aligned forever.

1. Core invariants

These are hard rules. If a community violates them, the system may still function, but it is no longer vSOV-COMM-M3.2. Everything else builds on top of these invariants.

  1. BTC-only reserves. Reserve means on-chain BTC under community policy. No stablecoins, no treasury token, no yield wrappers as “reserve.”

    Anything that can be frozen, printed, or rug-pulled is a rail, not a reserve.

  2. Purpose partition is enforced at wallet/UTXO level. Labels preserve meaning; they do not prevent chain linkage. BIP329 is an export format for labels/metadata.

    Every UTXO “belongs” to a specific purpose bucket. The label is the memory of why the sats exist, so you don’t accidentally repurpose them later.

  3. Descriptor wallets + PSBT-first signing. Wallet policies are defined by descriptors; multiparty workflows are PSBT-native. Descriptors: Core default descriptor wallets; PSBT: BIP174.

    Descriptors describe how funds can be spent. PSBT keeps construction and signing separated, so one compromised machine cannot steal everything.

  4. Churn is assumed. Any design that freezes when 1–2 signers disappear is invalid for community funds.

    If a single person going offline can lock the treasury, the design is wrong, no matter how trusted they feel.

  5. Emergency is cryptographically bounded. “Emergency” is a capped pathway with automatic hardening (not a narrative exception).

    Emergency powers are pre-defined scripts and thresholds, not ad-hoc “trust me, it’s urgent” stories.

  6. Two-ledger accountability. Public accountability is aggregate reporting by default; address/UTXO publication is opt-out (recipient safety beats performative transparency).

    There is a transparency ledger (high level) and a settlement ledger (UTXOs). You don’t expose people’s exact addresses just to look virtuous.

  7. Artifacts are crown jewels. Private descriptors and PSBT sprawl are primary compromise vectors. Example hazard: private descriptor exposure via tooling that can output private descriptors.

    Leaked policy files, PSBTs, and descriptor exports are how attackers reconstruct who controls what. They are treated like keys.

  8. Dust/taint is assumed on public intake. Quarantine exists; “cleanup consolidation” is a prohibited action-class.

    Any address open to the public will eventually receive weird or malicious coins. Those go to quarantine, not into the main treasury.

  9. Fee/pinning reality is assumed. Replacement/fee mechanics can be exploited to pin multiparty spends. BIP125 dynamics referenced via Optech pinning discussions.

    The mempool can be used as an attack surface. Pinning is treated as a risk to be designed around, not “wallet UX weirdness.”

  10. LN and federations are rails, not reserves. Improvements like Offers/BOLT12 are payment UX; they do not change reserve reality.

    Lightning and federated systems move value; they don’t hold deep community savings. They are hot paths, not vaults.

Hostile environment assumption This layer treats “finance ops” as a hostile environment: external attackers, internal social capture, donor pressure, and accidental artifact leakage are all expected, not exceptional.

2. Treasury objects (buckets) — hard partitioned

The community treasury is expressed as named buckets. Each bucket is a distinct pot of BTC with its own purpose, risk profile, and unwind rules. Buckets keep intent and constraints visible when making decisions.

Rule
  • No cross-bucket inputs in a single transaction unless an explicitly authorized merge event is approved at structural threshold and archived.
  • Default names are neutral for leaks/donors; internal mnemonic names are optional compression.

Buckets are like separate mini-treasuries. Mixing them in a single spend is an exception with a paper trail, never a casual convenience.

C0 Operating
Hearth
  • Routine spend
  • Low balance
  • Frequent movement

This is the working cash drawer: small, hot, and expendable.

C1 Sensitive Disbursement
Mercy Pool
  • Aid payouts
  • Privacy-critical
  • Recipient safety dominates reporting choices

This is where mutual aid and vulnerable recipients are served. Privacy beats “maximum visible transparency.”

C2 Project Escrow
Quest Chest
  • Mission-bound funds
  • Dissolvable by completion or timeout

Funds locked to a specific project with clear completion or refund rules.

C3 Reserve / Endowment
Seed Vault
  • Continuity buffer
  • Rare movement
  • High ceremony

The long-term survival pool. Movement is slow, multi-reviewed, and logged.

C4 Event Pot
Festival Pot
  • Short-lived pool
  • Auto-dissolve after event

Temporary funds for a specific event. Reconciled and closed immediately afterwards.

C5 Capability / Node-Seeding
Node Foundry
  • Bounties for sovereignty skills
  • Turns aid into capability when possible

Used to pay for skills, hardware, and setups that increase future autonomy (e.g. nodes, multisig, ops training).

C6 Cell-Split Treasury
Fork Fund
  • Funds decentralization under stress
  • Governed like reserve-tier assets

Reserved for clean splits when the community needs to fork peacefully.

Practice check If you can’t answer “which bucket is this UTXO in?” the treasury is already drifting. Labels and bucket rules pull it back into clarity.

3. Roles (separation of duties is mandatory)

Money handling is split into three roles. No single person or device should construct, approve, and audit the same spend.

R1Constructor
  • Builds unsigned tx / PSBT from approved proposal.
  • No signing authority required.

They turn the agreed manifest into a PSBT. They are not trusted to move funds.

R2Signers
  • Threshold set that approves by signing.
  • Must verify outputs against the manifest (not trust the constructor).

They hold key material. Their job is to check that the PSBT matches the manifest, then sign.

R3Auditors
  • Watch-only verification + internal ledger.
  • Public aggregate reporting.
  • Cannot be the same humans signing the spend they audited.

They reconcile UTXOs, ledgers, and public reports. They never sign spends they themselves audit.

Continuity rule
  • Any single role can disappear without freezing funds.
Constructor-risk doctrine
  • PSBT blocks unilateral signing, not malicious output crafting.
  • The theft boundary is human verification of outputs/amounts/fees against a canonical manifest.

Tools lower risk, but the last line of defense is humans checking what they are about to sign. That step is non-optional.

4. Spend pipeline (canonical workflow)

Every community spend follows the same five-step pipeline. This stops “special case” chaos and keeps both signers and members clear on what happened and why.

Step A — Proposal (finance-only fields)

The proposal is what, from where, and at what level of risk — kept as numbers and classes, not narratives.

  • Bucket (C0–C6)
  • Amount tier (T0/T1/T2/T3)
  • Recipient class (vendor / member / escrow / internal transfer)
  • Dependency checklist (binary triggers)
  • Output manifest plan (explicit addresses/amounts OR defined derivation method)
  • Emergency flag (rare; capped pathway)
Step B — Dependency checklist (kills semantic-veto capture)

Any checked item auto-escalates signing threshold by +1 tier (+2 for severe).

  • Introduces third-party custodian
  • Requires identity/KYC gate
  • Creates recurring obligation
  • Creates single-vendor dependency
  • Increases public targeting surface
  • Merges previously partitioned UTXO sets

Checklist is filled by auditors (R3). Auditors cannot also be the signing humans for that spend.

Step C — Output manifest (anti-constructor theft)

The manifest is the source of truth for signers. The PSBT must match it exactly.

  • Every output address + amount
  • Fee ceiling
  • Bucket provenance (what UTXOs are eligible)
  • Recipient derivation method if addresses are not static
Step D — PSBT construction and signing
  • Constructor produces PSBT (BIP174).
  • Signers compare PSBT outputs to the manifest before signing (Signer Review Doctrine).
  • Any mismatch = reject, rebuild, re-audit.

No signer signs “because the system made it.” They sign because they personally checked the PSBT against the manifest.

Step E — Broadcast + archive
  • Archive: txid + manifest + approvals record + internal labels/metadata export (kept private).
  • Public reporting: aggregate summaries by bucket and period, not doxxed UTXO graphs by default.

Members see that a spend happened, from which bucket, and at what scale, without exposing exact addresses by default.

Pipeline invariant No spend skips steps. “We were in a hurry” is not a valid reason to bypass the manifest or dependency checklist.

5. Custody topologies (churn-safe by default)

This section defines multisig policies for each bucket. The goal is to survive people leaving, while still making theft and capture hard.

Avoid 2-of-2 for communities: it fails under routine churn.

C0 Operating
  • Capped hot spend + frequent sweep, or small 2-of-3 if needed.
  • Design for fast replacement; tolerate loss.

If this gets drained, it should hurt but not kill the community.

C1 Sensitive Disbursement
  • 3-of-5 or 4-of-7.
  • Signer diversity: no single household controls quorum.

Focus on preventing collusion and coercion for vulnerable recipients.

C2 Project Escrow
  • 2-of-3 (project lead + finance signer + neutral signer).
  • Plus timeout dissolution path.

Enough friction to avoid misuse, but not so much that the project stalls when one person moves.

C3 Reserve / Endowment
  • 4-of-7 or 5-of-9.
  • Rare movement; conservative scripts; heavy ceremony.

Treated like the community’s spine: slow to move, hard to capture.

C5 Node Foundry
  • Small budget; churn acceptable but still thresholded.
  • Budget structure designed for frequent payout cadence.

Designed for lots of small, frequent outputs to build capacity.

C6 Fork Fund
  • Govern like C3 (it funds decentralization under stress).

Must remain neutral and robust enough to support clean exit paths.

6. Rotation, churn, disappearance (deterministic)

Rotation and disappearance are treated as normal events. This section makes the response automatic, not emotional.

Scheduled rotation
  • Fixed cadence (e.g., annual) + event triggers: move, conflict, compromise, inactivity.
  • Rotation is normal operations, not “scandal response.”

People stepping off signer duty is expected and pre-planned, not a sign of failure.

Disappearance trigger
  • If signer unreachable past defined window: enter Re-Key Mode.
  • Migration PSBT from old descriptor-policy to new policy.
  • Remaining quorum signs migration; old policy is retired.

Disappearance is handled like a routine maintenance script, not a crisis.

Descriptor-defined wallets make policy explicit and portable across operator turnover. Recovery does not depend on someone remembering “how it used to work.”

7. Intake segregation + taint quarantine

Not all incoming sats are equal. This section defines three paths that every inflow must be sorted into.

Path 1 — Clean intake
  • Eligible for normal bucket routing.
  • Still labeled by bucket intent.

Typical member donations and direct receipts that match policy.

Path 2 — Earmarked intake
  • May only enter the declared bucket.
  • Cannot be repurposed via “operational convenience.”

Funds given “for X only” are technically and procedurally bound to X.

Path 3 — Encumbered/unknown
  • Quarantine only.
  • No merges into C3/C6. Ever by default.

Anything suspicious or unrequested lives in a separate quarantine zone, never mixed into core reserves.

Dust/taint rule
  • Unsolicited micro-UTXOs and suspicious inflows stay isolated.
  • “Cleanup consolidation” is prohibited (it creates linkage and contaminates reserves).

Consolidating random dust into your main UTXOs is treated as a security bug, not a tidy-up.

8. Artifact hygiene (the real perimeter)

The real perimeter is not just keys; it is also files and metadata. This section defines how to keep those from becoming a map for attackers.

Crown jewels
  • Private descriptors (never leave signer-secure handling).
  • PSBT drafts (never sprayed across chat/email).
  • Label/metadata exports (sensitive; never public reporting material).

Treat these as you would seeds or hardware wallets. They are not “just configuration.”

Handling rules
  • One canonical store per artifact class.
  • Strict versioning (no ambiguous “latest.psbt”).
  • Retention limits: keep final tx + manifest + approvals; purge drafts.
  • Watch-only/audit uses public descriptors only.

The community should always be able to answer “where is the real manifest/descriptor kept, and how is it rotated?”

Community compromise often happens through files, not keys: descriptor leakage, PSBT sprawl, and metadata exports are treated as primary attack surfaces.

9. Fee doctrine (pinning-aware, role-assigned)

Fee policy connects mempool behavior with community risk tolerance. It avoids “winging it” when a transaction is stuck.

Pinning reality
  • Replacement requires higher absolute fee; adversaries can exploit this to pin multiparty transactions.
  • Communities treat fee games as an adversarial environment, not a “wallet UI problem.”
C0
  • Tolerate stuck tx.
  • Keep balances small.
  • Reissue fast.

If something jams here, just cancel and re-route; the risk is bounded by design.

C1
  • Bias reliability.
  • Avoid interactive fee games when possible.
  • Keep fee authority ready.

Aid payouts should not be at the mercy of fee pinning games.

C3 / C6
  • Rare moves.
  • Deliberate overpay beats coordination under duress.

For core reserves and fork funds, overpaying once is cheaper than trying to coordinate fee bumps under attack.

Fee authority (explicit role)
  • Designate who is authorized to build replacement PSBTs and coordinate CPFP/RBF actions within policy.
  • Authority is procedural and bounded; it is not “emergency narrative power.”

“Fee authority” is about executing pre-agreed rules, not inventing new ones in the moment.

10. Rails (what moves value) — strictly scoped

Rails are how value moves, not what the reserve is. Each rail has a clearly defined role and limit.

On-chain
  • Settlement + reserves + escrow.
  • Default for C3/C6.

The base reality for community money. Everything else is built on top.

Lightning (C0/C1 transport only)
  • High-frequency small payments.
  • Hard-capped.
  • Offers/BOLT12: invoicing improvement, still a rail.

LN is for fast, small flows, not for storing the community’s future.

Payjoin (optional)
  • Used only when operationally mature for the group.
  • Never a structural dependency.

Privacy upgrade when the team can actually operate it, not a default that breaks base workflows.

Fedimint / eCash rails (optional)
  • Allowed only as C0/C1 rail by default.
  • Mandatory exit drill to self-custody rails.
  • No C3/C6 storage unless explicitly accepted as policy exception.

Treated like a community checking account with clear exit drills, never as a core savings layer without explicit decision.

11. Donor concentration & capture economics (automatic triggers)

Money is power. This section measures and constrains that power so that big donors cannot silently steer the entire treasury.

Track concentration
  • Maintain rolling concentration metrics (e.g., top donor share of inflows).
  • When thresholds are exceeded: dependency-increasing spends auto-escalate tiers.
  • C6 Fork Fund can activate formulaic split pathways.

Economic realism This treats donor power as a capture vector (economic), not a moral debate. If a single donor becomes too dominant, the finance rules tighten automatically.

12. Cell-splitting (C6) — formulaic, not political

Cell-splitting is how a community can cleanly fork when stress or disagreement gets too high. It is triggered by numbers, not arguments.

Split triggers (measurable)
  • Churn exceeds X% per period
  • Signer availability below Y%
  • Emergency pathway used > N per window
  • Donor concentration exceeds Z%
  • Unresolved controversy exceeds defined time windows

When these metrics trip, a split is considered structurally justified, no matter who is “right” in a debate.

Split allocation rules (pre-committed)
  • How C3 reserves split
  • How earmarked funds route
  • Quarantine remains quarantine (no washing via split)

The routing is defined in advance, so no one can weaponize split design when tensions are highest.

Splits happen via predetermined finance metrics + predetermined routing rules, to prevent narrative capture and endless political fights over who “owns” the treasury.

13. Mutual aid (C1) structured to reduce dependency

C1 is designed for mercy without permanent dependency. Aid is classified into three modes with different expectations and controls.

Bridge aid
  • Fast
  • Small
  • Capped

Short-term help to get someone through an acute situation.

Capability aid
  • Routed through C5 bounties
  • Builds competence (verification, ops)

Whenever possible, help is expressed as training, tools, or setups that increase future independence.

Chronic aid
  • Requires escalated tiers
  • Explicit renewal
  • Cannot silently grow

Long-term support is possible but must be intentionally renewed and clearly budgeted, not quietly expanded.

The aim is mercy that respects both recipients and the long-term survival of the treasury.

14. Data minimization (anti-dossier constraint)

The community’s finance system should not become a detailed dossier on members’ lives. This section sets hard boundaries.

The less personal data is stored, the less there is to leak, subpoena, or weaponize later.

15. Dissolution (every bucket has an unwind)

Every bucket must have clear exit rules, so the community can shut down projects or even the entire treasury without improvisation.

C4 Event Pot
  • Reconcile → dissolve immediately.
C2 Project Escrow
  • Dissolve on completion or timeout (refund/migrate per charter).

Short-lived funds resolve quickly; any leftover sats are routed by pre-written rules.

C1 Sensitive Disbursement
  • Dissolve by pre-committed rules without doxxing recipients.
C3 / C6
  • Dissolve only via structural-tier threshold + final aggregate report.

Even if the community ends, the last moves from reserves and duress funds are structured and visible at an aggregate level.

vSOV-COMM-M3.2 kernel (one line)

BTC-only purpose-partitioned buckets + churn-safe multisig + PSBT manifests + signer review doctrine + crown-jewel artifact hygiene + two-ledger accountability + dust/taint quarantine + pinning-aware fee authority + rails-scoped LN/Fedimint + formulaic donor/cell-split triggers + aid structured to reduce dependency.

Exact toolchain mapped to the stack

This section ties the abstract rules above to concrete software and hardware. Tools can change over time, but any replacement must preserve these behaviors.

Non-negotiable foundations (community context)
  • One asset: BTC only.
  • Two ledgers: Settlement = Bitcoin L1; Operating = internal accounting + policy.
  • Two risk buckets: Deep reserve (cold, slow) vs Operating float (hot/warm, bounded loss).

1) Sovereign verification layer

Full node (truth source)
  • Bitcoin Core v30.2 as baseline validation engine.
  • Policy: treasury never depends on someone else’s node or browser explorers.
  • Upgrade constraint: treat wallet migrations as hazardous until 30.2+ and backups exist (per your hazard note).

The community’s node is the only source of truth for balances and history, not random websites.

Private wallet connectivity (no public Electrum leakage)
  • Pick exactly one indexer spine: Fulcrum or electrs.
  • All community wallets connect only to the community indexer (optionally over Tor).
  • Goal: eliminate third-party wallet metadata leakage.

This keeps address lookups, balances, and labels inside the community’s infrastructure, not sprayed across public infrastructure.

2) Treasury custody (multisig) — coordinator stack

Canonical multisig coordinator choices
  • Specter Desktop: Core-first multisig control plane; PSBT/HWI oriented.
  • Sparrow Wallet: operator-grade workstation; strong coin control + PSBT flows.

At least one coordinator is used as the “control room” for the treasury.

Signer interface plumbing
  • Standardize on HWI as the “external signer” driver path where applicable.
  • Reduce weirdness: fewer divergent driver stacks → fewer failure modes.

The fewer custom integrations, the fewer surprises during a crisis.

Signer set (quorum architecture)
  • Goal: minimize correlated failure (vendor, firmware lineage, transport, physical co-location).
  • Minimum: 2-of-3 (small groups).
  • Churn-tolerant: 3-of-5.
  • High-resilience commons: 4-of-7.
  • Example signer mix (PSBT-capable; vendor-diverse): Coldcard / Passport / Jade / BitBox02 BTC-only / Trezor Safe series / SeedSigner-class airgapped signers.

Diversity in signers is as important as threshold choice: different vendors, different physical locations, different people.

3) Public receiving, dues, payouts (community cash register)

Invoicing + receipts + payouts
  • BTCPay Server as the self-hosted payment surface.
  • Function: accept BTC, issue receipts, execute payouts, integrate PSBT where needed.

BTCPay is the public-facing front door: donations, event tickets, dues, and simple payouts all come through here.

Receipt privacy upgrade
  • BTCPay Payjoin as an optional improvement for donations/dues where operationally appropriate.
  • Protocol base: BIP78 reference (as per your prior mapping style).

When the community is ready, Payjoin hides simple “A pays B” patterns on-chain for better privacy.

4) Lightning (bounded float only)

Lightning posture
  • Use only for: small frequent payments, event commerce, low-friction donations, vendors.
  • Run with BTCPay via an LN backend (LND or Core Lightning) as a hot system with explicit loss bounds.
  • Backup doctrine is specialized: LN keys/databases are not “normal backups.” Static channel backups are about safe closure/recovery on-chain, not resurrecting channels.

LN is treated as expendable working capital. If something catastrophic happens, channels are safely closed and funds return on-chain.

5) Community accounting + internal transparency (without doxxing the graph)

Canonical bookkeeping
  • Plaintext double-entry accounting toolchain (Beancount-class) with auditable review.
  • Reconcile: (a) on-chain UTXO set per bucket, (b) BTCPay receipts/payouts, (c) any fiat expenses if they exist.

The accounting file is the high-level mirror of the UTXO reality, not an independent source of truth.

Proof modes
  • Members can verify without treasury doxxing.
  • Publish periodic aggregate balance/flow statements.
  • Provide view-only descriptors/xpubs only to designated auditors.
  • Prefer aggregate proofs over address-by-address theater.

Transparency is about verifiable claims, not about exposing everyone’s exact financial footprint.

6) Acquisition / exchange rails (BTC-only, privacy-respecting)

  • Primary rail: direct BTC from members into the receiving flow.
  • Secondary rail: P2P/local acquisition to replenish operating float, kept separate from deep reserve.
  • Identity honeypots are treated as attack surfaces, not convenience.

When fiat is involved, it stays on the edge of the system, not in the middle of the community reserve design.

7) Storage, backups, and “can’t lose” doctrine

Key material storage
  • Metal backups for each signing key, distributed across jurisdictions/trust zones.
  • Separate: key material vs passphrases vs signer device vs descriptor/policy record.

Losing one element (device, passphrase, backup) should not destroy the treasury; attackers should need more than one element to steal it.

The overlooked killer: descriptor/policy loss
  • Multisig recovery is not “just the seeds.”
  • Preserve: descriptors, quorum rules, derivations, script type, and policy metadata with redundancy.

Without the policy (descriptors and script details), seeds alone may be useless. Policy backups are treated as critical infrastructure.

This toolchain section is intentionally aligned to the earlier invariants: purpose partitions (C0–C6), churn-safe thresholds, PSBT manifest discipline, and crown-jewel artifact hygiene.

References

These are the reference anchors you embedded in your spec. Keep them as the “normative spine” for the stack’s claims.

  1. BIP329 (labels export format)[1]
  2. Bitcoin Core descriptor wallets default (Core 23.0+ context)[2]
  3. BIP174 (PSBT spec)[3]
  4. Bitcoin Core descriptor/private descriptor handling hazard note[4]
  5. Pinning / BIP125 replacement dynamics (Optech context)[5]
  6. Offers/BOLT12 (Optech context)[6]
  7. Fedimint documented tradeoffs (claims/exit risk/debasement risk)[7]