An honest assessment of what has been formally verified, what "verified" means at each level, where known gaps remain, and what Phase 2 will address.
Each artifact has a unique evidence ID, a locked version with SHA256 checksum, and a quantifiable metric. These are the building blocks a formal methods engagement would assess and extend.
RDE requires an unbroken chain from domain model through to evidence. Each link in REF's chain is documented, versioned, and traceable.
Domain concept (Purchase) → Requirement (P-AUTH: every review bound to purchase) → Threat (ATK-1: bulk fake reviews) → Mitigation (ZK proof + economic deterrence) → Artifact (TokenLifecycle.tla, DOMINANCE_PROOF.md) → Evidence (EV-009: 269 states, 0 violations; MC-500: 100% dominance).
REF uses three distinct verification methods. Each has specific strengths and limitations that we document explicitly.
CONSTRAINT_REJECTED. Demonstrates under-constraint defenses work.
This is not a formal soundness proof — it is directed testing against specific attack patterns.
Transparency requires enumerating deficiencies. These are documented, prioritized, and positioned within the refinement chain. Each represents a specific location where the handoff from intent to implementation can be strengthened.
The refinement from TLA+ specification to production code is human-maintained, not machine-checked. We have TLA+ on one side and Python/Circom on the other, with documented traceability between them. A tool like Cryptol/SAW or an assume-guarantee framework would close this gap — and is the single highest-value area for formal methods expertise. This refinement defect is catalogued as DEF-02 in the verification bundle.
Phase 2 targets the four highest-value verification activities that require external expertise and tooling beyond what a solo founder can deliver.
Verification asks "did we build it right?" Validation asks "did we build the right thing?" Both matter. Here is REF's validation status.
REF is pilot-stage — not yet deployed with production merchants. Market validation is supported by economic research and regulatory trends, but real-world merchant adoption is unproven. The technical architecture is ahead of commercial traction. This is typical for deep-tech infrastructure at this stage.