VI.3.1 What Remains Auditable
At all times, any observer can verify that the Abyss protocol satisfies the following global invariants:- On-chain verification of zero-knowledge proofs
- Public nullifier registries
- Public Merkle roots representing the commitment set
- Deterministic contract logic
VI.3.2 Separation of Concerns
Abyss enforces a strict separation between:- Correctness data, which is public and verifiable
- Identity data, which is never revealed
VI.3.3 Regulatory and Institutional Audits
For institutions, this model enables a new class of audits. Auditors can:- Verify aggregate inflows and outflows
- Confirm absence of inflation or double-spends
- Validate contract upgrades and parameter changes
- Inspect ZK verifier correctness
VI.3.4 Selective Disclosure (Out of Scope, By Design)
Abyss does not implement selective disclosure at the protocol level. Users may voluntarily disclose secrets or proofs to third parties if required, but the protocol does not embed identity hooks or backdoors. This ensures neutrality. The protocol enforces privacy by default and does not privilege any observer.VI.3.5 Why This Matters
Auditability without linkability allows Abyss to function as:- Payment infrastructure
- Settlement rails
- Privacy middleware for exchanges and markets

