12.1. Principles for a Credible Turnaround (Evidence-Bound)

12.1.0. Why this chapter exists (and what it is not)

This report’s job is diagnosis + investor-grade measurement, not to hand validators a ready-made “how-to” playbook.

Chapters 11.x established a structural pattern: Terra Classic can remain operational while still failing to build the institutional capacity required for durable recovery. The governance corpus shows massive proposal throughput but weak signal-to-noise and thin participation; in the Truth Dashboard snapshot, 1,711 voting-stage proposals exist with a ~9.1% pass rate, ~82.2% rejected, and median delegators = 0 (with 866 proposals at 0 delegators). The chain is not dead—but its current governance + execution system is not credibly structured for turnaround without proof-bound accountability.

So this chapter defines principles that (a) must be satisfied for any “recovery plan” to be credible and (b) allow investors to evaluate reality without trusting narratives.

What follows is a set of non-negotiable credibility constraints. They are written as tests: if the system cannot pass them, “turnaround” is not an evidence-supported claim.


12.1.1. Principle 1 — Claims must be bound to proof, not intention

Statement. A turnaround is only real when it is measurable, auditable, and repeatable—not when it is announced.

Evidence spine. The governance surface is currently dominated by text proposals and high rejection/veto rates, which is consistent with a system that produces discourse faster than delivery. In that environment, “plans” are cheap; proof-of-delivery is scarce unless forced by process.

Proof standard (minimum).

  • For any initiative that touches treasury, protocol, endpoints, wallets, docs, or exchange surface: publish a public, dated accountability packet (owner(s), milestones, acceptance criteria, links to artifacts, and post-mortem rules).

  • Every funded workstream must have a single public scoreboard whose KPIs cannot be “reframed” week-to-week.

Credibility failure mode.

  • “We will…” statements without a verifiable artifact trail (repo PRs, releases, signed acknowledgements, post-deploy verification).


12.1.2. Principle 2 — Governance must behave like an execution machine (Decision → Delivery → Verification → Learning)

Statement. Governance is not mature unless it produces a closed loop: decision → delivery → verification → learning.

Evidence spine.

  • High governance throughput with low pass rates indicates review overhead and weak filtering; even when execution-critical items pass at high rates (e.g., upgrades), that is proof of minimal functionality, not institutional maturity.

  • The report already defines a “minimum accountability packet” as the baseline for spend maturity.

Proof standard (minimum).

  • A published governance-to-execution registry: every passed spend and upgrade linked to (a) implementation evidence, (b) delivery acceptance, and (c) measurable outcome delta.

  • A public decision-to-implementation rate and time-to-execution KPI series (not one-off anecdotes).

Credibility failure mode.

  • Passing proposals that are not paired with delivery verification (the chain can “approve” while reality remains unchanged).


12.1.3. Principle 3 — Accountability must be explicit because Terra Classic has no legal operator

Statement. In the absence of a recognized legal entity, credibility must come from named responsibility and documented mandate, not from “the community.”

Evidence spine.

  • The report already frames the “control plane” problem: critical functions (merge rights, exchange liaison, canonical comms routing, treasury execution mechanics) concentrate into thin operator surfaces even when voting is broad.

  • Without formal mandate, external stakeholders infer authority from conduct (“apparent authority”), which becomes a risk surface.

Proof standard (minimum).

  • Publish an Accountability Surface Map (dated) that lists:

    • who holds/controls canonical domains, docs, endpoints, key wallets, key repos/merge rights,

    • what their scope is,

    • what succession / continuity plan exists.

Credibility failure mode.

  • “Nobody is in charge” while, in practice, a small subset controls operational choke points.


12.1.4. Principle 4 — Reduce governance noise or it will keep taxing execution capacity

Statement. Any system where low-quality throughput dominates will exhaust the few actors capable of delivery.

Evidence spine.

  • Snapshot shows 1,711 voting-stage proposals since May 2022, with rejection ~82.2% and veto ~8.7%.

  • Text proposals dominate the type mix (the report’s governance chapter explicitly calls this a “governance load problem”).

Proof standard (minimum).

  • Publish a proposal quality gate: categorization rules, duplication suppression, minimum evidence requirements for spend proposals, and a standardized “impact hypothesis” template.

  • Track and publish: % proposals that meet quality gate, rejection reasons taxonomy, and reviewer load metrics.

Credibility failure mode.

  • Treating governance volume as “community activity” rather than a measurable execution tax.


12.1.5. Principle 5 — Treasury must behave like a budget, not a vault

Statement. A turnaround requires compounding iteration loops; treasury behavior must therefore look like programmatic investment, not sporadic lump spending.

Evidence spine.

  • Truth Dashboard analysis shows a “dormant treasury” posture: in a 2-year window, ~87.6% of weeks show zero outflow; median gap between spends ~5.5 weeks; longest inactivity streak 19 weeks; spend concentration is high (top 5 weeks ≈ 84% of spend).

  • This is structurally incompatible with rapid iteration when usage and fee base are thin (the report links thin fees + bursty spends into a dependency loop).

Proof standard (minimum).

  • Publish a treasury allocator dashboard as a standing governance artifact: inactivity %, spend concentration, categorized allocation, and outcome-linked ROI proxies.

  • Introduce KPI-gated disbursements as a default norm (not an exception).

Credibility failure mode.

  • Funding “maintenance” repeatedly while claiming “growth” without a measurable demand engine.


12.1.6. Principle 6 — Validator lifecycle hygiene is part of credibility, not cosmetics

Statement. A professional operator set has visible lifecycle standards (uptime norms, recovery expectations, and delegator protection UX).

Evidence spine.

  • The report documents an extreme long-tail: a snapshot showing active set 103 vs jailed 505 (≈83% jailed/non-productive in that view), which is a strong signal of churn and weak lifecycle hygiene.

Proof standard (minimum).

  • Publish a validator lifecycle KPI panel: churn, jail rate, median time-to-recover, delegation strandedness risk, and a delegator warning standard across major surfaces.

Credibility failure mode.

  • Treating validator graveyard as “normal for permissionless systems” while it quietly erodes delegator outcomes and governance quality.


12.1.7. Principle 7 — Security assurance must be explicit; “we haven’t been hacked” is not assurance

Statement. Security credibility is binary at the institutional level: either there is an assurance program (audits + bounties + patch discipline) or there isn’t.

Evidence spine.

  • Post-2022, the report’s position is that there is no demonstrated audit/bounty program in scope for Terra Classic; the last visible audit record commonly referenced is the pre-collapse era. The public CertiK project page for Terra shows historical security information, but does not substitute for a current, scoped assurance program.

Proof standard (minimum).

  • Publish a Security Assurance Delta artifact:

    • current audit coverage inventory (what code, what date, what scope),

    • a bounty program (or a formal “no bounty” statement with rationale),

    • patch latency reporting for critical issues.

Credibility failure mode.

  • Treating security as “implied by decentralization” rather than demonstrated by process.


12.1.8. Principle 8 — Market access must be treated as a fragile surface, not a given

Statement. For investors, market access is a risk layer: deposits/withdrawals maintenance events, delistings, and network upgrade coordination are not side details—they are continuity constraints.

Evidence spine.

  • The broader report already frames “market demand vs on-chain conversion” tension: off-chain trading can spike sn’t structurally return.

  • The governance record shows upgrades can be executed; however, exchange coordination quality pendency during upgrades.

Proof standard (minimum).

  • Maintain a dated, public Exchange Surface Ledger:

    • top venues by volume,

    • deposit/withdraw status,

    • incident log (maintenance, suspensions, delistings) with primary-source links.

Credibility failure mode.

  • Calling the chain “recovering” while ignoring access fragility (because it doesn’t show up on-chain until it’s already damaged confidence).


12.1.9. Principle 9 — Control-plane assets must be separated from single operators (or openly accepted as key-person risk)

Statement. If canonical routing assets (domains, docs, endpoints, wallet surfaces) are operator-held, the chain inherits key-person risk and routing integrity risk.

Evidence spine.

  • The report explicitly warns that control planes create identifiable opera erparties must underwrite.

  • If the chain lacks an official social layer, canonical web + docs become even more central as a trust gateway (making ownership concentration more dangerous).

Proof standard (minimum).

  • Publish a control-plane bill of materials (BOM): domain ownership, DNS custody model, repo admin list, endpoint operators, and incident response authority.

  • Publish a continuity plan: what happens if a key operator disappears, is compromised, or is pressured externally?

Credibility failure mode.

  • “Decentralized chain” branding while the practical navigation layer is centralized and non-transparent.


12.1.10. Principle 10 — A credible plan must pass an “investor falsifiability test”

Statement. If a “recovery plan” cannot be falsified by data, it is marketing.

How to operationalize falsifiability.

A plan must define:

  • what metrics will move,

  • by how much,

  • by when,

  • and what it means if they do not move.

Evidence spine.

  • The report already defines a robust KPI inventory template and metric dictionary direction—explicitly including governance execution KPIs (participation rate, throughput, dec rate, time-to-execution).

Proof standard (minimum).

  • A public KPI contract: each workstream’s “leading indicators” and “lagging indicators,” plus failure thresholds (what triggers rollback, leadership change, or program shutdown).

Credibility failure mode.

  • Endless narrative reframing (“macro conditions,” “market cycle,” “FUD”) without a pre-committed measurement contract.


12.1.11. Principle 11 — Institutional honesty is itself a recovery lever

Statement. If validators cannot produce a professional plan, the credible move is to say so—and either (a) recruit credible operators or (b) accept stagnation as the base case.

Evidence spine.

  • The governance dataset’s structure (low participation, high noise, thin execution-critical pipeline) is consistent with a system where a small subset carries the load and where capability is not systematically screened.

Proof standard (minimum).

  • A public statement that selects one of two paths:

    1. “We will deliver a professional recovery plan with proof-bound milestones,” or

    2. “We do not have the capability; we will seek/hire/procure it with explicit accountability.”

Credibility failure mode.

  • Pretending option (1) exists while repeatedly producing option (0): drift.


12.1.12. Key takeaways (principles as investor filters)

  1. Terra Classic does not need more opinions; it needs proof-bound execution loops. Governance volume is high, but institutional signal and participation are structurally weak.

  2. Any credible turnaround must publish accountability surfaces. Without legal personality, mandate and responsibility must be explicit—or the system remains an institutional vacuum.

  3. Treasury behavior must shift from “vault + lumps” to measurable iteration. Current inactivity and spend concentration pat with compounding recovery.

  4. Security assurance must be demonstrated, not implied. The absence of a current, scoped assurance program is a credibility blocker for serious counterparties.

  5. If validators cannot produce a professional recovery plan, honesty is the only credible move—followed by capability acquisition. Anything else is drift disguised as governance.