Trust & Continuity · Key-Person Risk · Single Founder

Founder risk, addressed honestly.

Hive Civilization is a single-founder operation today. We address key-person risk transparently through documented controls, not by obscuring the reality. This page details every continuity control in place or in progress, and is honest about the gap between current state and target state.

Honest Disclosure

What this page is and why it exists.

Hive Civilization is a single-founder operation led by Steve Rotzin (CEO). Key-person risk is real. We do not believe the right response is to hide it behind corporate language or to wait until continuity controls are perfect before disclosing the situation. This page documents what is true today, what we are actively building, and what remains on the roadmap. Prospects and enterprise customers should read this page alongside the full security posture at /security/ before making a commitment.

Every item on this page is marked with its current state: active, in progress, or planned. Nothing is represented as complete unless it is complete.

Current State

Where we are today.

An honest account of single-founder operational reality and the controls that reduce, but do not eliminate, key-person dependency.

Current State — Today

Single-Founder Operation

Steve Rotzin is the sole decision-maker, sole technical operator, and sole signatory on operating accounts. No co-founder. No technical co-lead. Production access is currently held by one person. This is the baseline risk the controls below are designed to mitigate.

Target State — 30-180 Days

Distributed Controls in Place

Multisig treasury with independent co-signers. Admin access distributed across GitHub org, Cloudflare, and Render with second administrators named. Break-glass procedures documented and held by outside counsel. Insurance in force. Board observer seat active.

Treasury Controls

Production treasury.

The current treasury address and the transition plan to multi-signature governance.

Gnosis Safe Multisig Migration

In Progress — 30 Days

Production treasury is being migrated to a 2-of-3 Gnosis Safe multisig on Base (Chain ID 8453). This migration is in progress and is targeted for completion within 30 days of this page going live. Until the migration is complete, treasury operations remain under sole founder control.

Current Treasury 0x15184Bf50B3d3F52b60434f8942b7D52F2eB436E
Chain Base Mainnet (Chain ID 8453)

The Gnosis Safe contract address will be published on this page and in the quarterly transparency report upon deployment. Verification link to BaseScan will be added at that time.

Target: 2-of-3 Multisig

Planned

The target configuration requires 2 of 3 designated co-signers to approve any treasury transaction above a de minimis threshold. Co-signers are independent of each other and of the company.

  • Steve Rotzin Founder / CEO — Signer 1
  • Outside Counsel Independent attorney — Signer 2
  • Fractional CFO Engaged financial officer — Signer 3

Signer identities will be published by name upon their written consent and the execution of the multisig deployment. No signer is a Hive Civilization employee.

Infrastructure Continuity

Code and platform access.

Reducing single-point-of-failure across source control, CDN, compute, and secrets management.

GitHub

GitHub Org — Multi-Admin

GitHub organization is being configured with a second organization administrator who is not the founder. Admin credentials are independent. Branch protection rules are set; merges to main require review. Break-glass admin access documented separately.

Planned — 30 Days
Cloudflare

Cloudflare Account — 2-Admin Policy

Cloudflare account will have a second Super Administrator designated. The second admin is a named individual external to the company, with access documented in the break-glass envelope held by outside counsel. Cloudflare zone ownership is not founder-personal-email bound.

Planned — 30 Days
Render

Render Team — 2-Admin Policy

Render team account will be converted from personal to team billing and a second team owner added. The second owner has independent login credentials. Services run under team ownership, not personal account.

Planned — 30 Days
Secrets

1Password Break-Glass Vault

Production secrets are stored in 1Password. A break-glass envelope containing vault access credentials and recovery kit is held in physical custody by outside counsel. The envelope specifies the conditions under which it may be opened.

Active
DNS

DNS Registrar Continuity

Domain registrar account credentials are included in the break-glass vault. Transfer authorization codes are documented and held by outside counsel. No domain is registered under a personal account that cannot be transferred.

Active
API Keys

API Key Inventory

All production API keys are inventoried in the 1Password vault with service name, scope, and rotation schedule. Keys are service-bound, not person-bound. The inventory is current as of the date of each quarterly transparency report.

Active
Insurance

Insurance roadmap.

We are honest that the following policies are not in force today. These are the target coverage amounts and target dates. We will update this page when each policy is bound.

Policy Type Target Limit Status Target Date
Errors & Omissions (E&O)
Professional liability for software products and services
$2,000,000 Not in force Q3 2026
Directors & Officers (D&O)
Liability coverage for leadership decisions
$3,000,000 Not in force Q4 2026
Cyber Liability
First-party and third-party cyber incident coverage
$5,000,000 Not in force Q4 2026

Customers requiring insurance certificates as a procurement condition should contact [email protected] to discuss the current state and anticipated timeline. We will not represent a bound policy until a certificate of insurance is issued.

Customer-Side Controls

Continuity from your side.

Controls available to enterprise customers that reduce your dependency on Hive's operational continuity regardless of what happens on our end.

Source Code Escrow

Iron Mountain source code escrow is available as an option on enterprise-tier contracts. Escrow is updated on every production release. Release conditions include: company insolvency, failure to maintain the service for more than 30 consecutive days, or customer-triggered audit right.

Enterprise Tier

On-Premises Verifier

The Cloudflare Workers-based receipt verifier can be deployed to a customer-controlled environment. This means receipt verification continues to function even if the Hive-hosted verifier endpoint becomes unavailable. Documentation available on request.

Enterprise Tier

Data Export Endpoint

An authenticated data export endpoint is always available regardless of contract tier. Customers may retrieve all their receipt data, evidence bundles, and associated metadata in a portable format (JSON + signed manifest). No lock-in by design.

Always Available

Audit-Ready Evidence Bundle

Every receipt issued by the Hive infrastructure is independently verifiable from the on-chain anchor and the ML-DSA-65 signature alone, without any dependency on Hive's hosted infrastructure or operational continuity. Receipts are designed to outlive the company.

By Design
Continuity Runbook

'What if the founder is unavailable?'

We address this question directly rather than euphemistically. The following documents what happens in the event of founder incapacity, death, or extended unavailability.

Immediate response (0–72 hours)

Outside counsel opens the break-glass envelope per the defined activation conditions. The named operating partner assumes day-to-day technical authority per the OPA. Enterprise customers are notified via the status page and direct email within 24 hours of outside counsel activation. The multisig Signer 2 (outside counsel) and Signer 3 (fractional CFO) can execute treasury operations without Signer 1.

The break-glass envelope is held by: [Outside counsel firm name — to be published on OPA execution]. Activation contact and verification procedure will be added to this section on OPA execution.

Operational continuity (72 hours–30 days)

The operating partner, armed with the break-glass vault and documented runbooks, maintains production infrastructure. Cloudflare, Render, and GitHub are accessible via the documented second-admin credentials. No single service requires a personal login tied exclusively to the founder to keep running. Source code escrow customers are notified; the escrow release process may be initiated by the customer if release conditions are met.

Long-term disposition (30+ days)

The estate plan and OPA collectively govern long-term disposition. Options include: operating partner assumption of leadership, strategic sale, or orderly wind-down with customer data export and on-chain receipt verification preserved. Customers with source-code escrow receive their escrow release automatically upon qualifying event. The on-chain receipt verification path is permanent and does not depend on Hive's corporate survival.

A formal 'bus factor runbook' PDF document is available to enterprise customers under NDA. Request at [email protected]. This document includes specific contact names, phone numbers, and step-by-step procedures for each activation scenario.
Transparency Reports

Quarterly public cadence.

Hive commits to a quarterly transparency report covering the items below. The first report will be published Q3 2026. Reports are public and linked from this page.

What each report covers

  • Treasury multisig status and current signers (by title; names published with consent)
  • Infrastructure admin policy status: GitHub, Cloudflare, Render second-admin confirmation
  • API key inventory count and last-rotation date per service
  • Break-glass vault custodian confirmation (no detail, just confirmation of custody)
  • Insurance policy status: whether each scheduled policy has been bound, with certificate reference
  • SOC 2 audit status: current phase, any change to target date
  • Incident log: any Sev1 or Sev2 incidents in the quarter, with post-mortem link
  • OPA and board observer seat status
Report schedule
Q3 2026 (First Report)
July 2026 — covers Q2 2026 state. Baseline report establishing all metrics.
Q4 2026
October 2026 — first anniversary of SOC 2 engagement. Insurance status update expected.
Q1 2027
January 2027 — SOC 2 Type 1 report status. Board observer seat activation if Q4 2026 commitment is met.
Ongoing quarterly
Thereafter, every January, April, July, and October.
Subscribe to reports

Enterprise customers are automatically subscribed. Others may request subscription by emailing [email protected] with subject line 'Transparency Report Subscription'.

Subscribe →
Related

Full security posture.

For the complete controls inventory, SOC 2 engagement status, sub-processors, incident response runbook, and compliance roadmap, see the main security page.

Security overview → Contact security team