Why a log is not a governed record

Observability stacks were built to debug systems, not to govern them.

Observability stacks answer "what did the system do?" - usually well enough. They were never built to answer "who was authorised to do it, what did they expect, and what alternative did they reject?" Those are the questions a regulator, an auditor, or a counterparty asks after something has gone wrong. A log cannot answer them.

Side-by-side comparison

Question Logs / Traces OMEGA Record
What happened? Event payload, timestamp, latency Same, plus action hash
Who took the action? Service / user ID Authorised principal under declared authority (P1)
Were they authorised at the moment of action? Implicit in auth middleware, not in the record Freshness attestation within declared window (P1_Freshness)
What evidence was considered? Not recorded Reasoning DAG grounded in fact / unknown / declared-assumption (P2, P2_DAG)
What alternatives were rejected? Not recorded Required (P2)
What was the expected outcome? Not recorded Required (P4); environmental invariants required for trajectory commitments (P4T_EnvInvariant)
Can the chain be silently rewritten? Often yes - log retention is mutable Hash chain detects tampering at any point (P_ChainIntegrity)
Can a sub-process bypass governance by claiming "internal function"? Frequent failure mode Atomic Decision Boundary blocks this (P6_AtomicAgency)
Is the record schema formally verified? No Yes - kernel-checked Lean 4

Logs are necessary. They are not sufficient.

OMEGA does not replace your observability stack. It sits next to it and produces the second artifact - the one a regulator can read.

Inspect the Lean 4 proof   ·   Read the specification   ·   View example records