Security

Expose output, not system.

The public shell explains boundary and access posture. It does not advertise private topology or internal controls.
Visible

Boundary language.

Access class, route conditions, and submission posture are visible.

Hidden

Internal rails.

Private processing, logs, queues, thresholds, and system mechanics remain undisclosed.

Rule

No SaaS theater.

No dashboard mimicry, no capability inflation, no technical vanity display.