Skip to content
← Risks

Risks · Taxonomy

Failure-mode taxonomy

Every way the architecture can fail, organized by mechanism.

Failure-Mode Taxonomy

The architecture’s failure modes are categorized into five families. Each family has different mitigations, different escalation triggers, and different operational implications.

The five categories

CategoryWhat it coversMitigation type
RegulatorySecurities, commodity, and consumer-protection regimes characterizing the architecture adverselyArchitectural perimeter + outside counsel review
LegalProperty-law and contract-law issues at the NRD-lite or wrapper-entity layerPer-jurisdiction counsel work + drafting discipline
OperationalSmart contract bugs, treasury operations, KYC, audit cycles, bankingEngineering discipline + audit cadence + operational redundancy
StrategicStakeholder alignment (especially the co-architect), pilot selection, public positioning, communicationsStage-by-stage co-signing + outside review for sensitive matters
ExternalLand-trust politics, methodology evolution, jurisdictional change, Landseed’s own continuityContinuity planning + multi-jurisdictional resilience

Regulatory category

SubcategoryExamples
Securities classificationSEC characterization of benefit units; foreign equivalents (Argentina CNV, etc.)
Commodity classificationCFTC characterization of Earth Credits; foreign equivalents
Consumer protectionForeign consumer-protection laws applied to permissioned membership
Sanctions and AMLMarshall Islands AML watchlists; banking access
Tax classificationLLC vs. partnership tax treatment; foreign tax characterization

Most architecture-killer risks live in this category. The eight bright lines (04-perimeter/) are the perimeter against the worst outcomes.

SubcategoryExamples
Property-category mismatchNRD-lite is recorded but not honored as property right; treated as personal contract
Recording-office rejectionDocument is technically deficient; cannot be filed
Term-limit collisionCivil-law jurisdiction caps below 99 years; enforcement uncertain beyond cap
§170(h) qualificationWrapper LLC doesn’t qualify; landowner deduction unavailable
Cross-jurisdictional disputeProperty and wrapper jurisdictions disagree; dispute spans both
Easement coordination conflictEasement holder blocks measurement (carve-out fails)
Wrapper entity dissolutionNamed holder dissolves before term-end

Most legal failures are preventable with disciplined per-jurisdiction template work and pre-deployment counsel review.

Operational category

SubcategoryExamples
Smart contract bugVulnerability in a Tier 2 template module is exploited
Treasury operations failureMulti-sig key loss; banking partner failure; stablecoin operational issues
KYC/AML failureKYC vendor fails; identity records lost
Audit cycle fragilityAudit firm goes out of business; continuity disruption
Methodology version mismanagementMultiple deployments out of sync; backward compatibility issues
Distribution operations failureDistribution mechanics break; members don’t receive payments

Per-property isolation contains most operational failures. The audit cadence and operational redundancy are the discipline.

Strategic category

SubcategoryExamples
the co-architect pull-backAfter partial implementation, the co-architect's institutional instincts surface a deal-breaker
Architectural overshootArchitecture is more than what was actually wanted
Landowner-acceptance complexityKitchen-table conversation fails; landowners walk away
Coalition entity reputation damageExchange or Fund’s bad behavior damages the whole ecosystem
Pilot selection wrongFirst pilot is in a jurisdiction or with a stakeholder shape that doesn’t represent the architecture’s strengths
Public positioning miscalibratedMarketing or communications damage credibility

These are the most insidious failures because they don’t trigger architectural alarms. They erode through accumulated bad decisions.

External category

SubcategoryExamples
Wrapper jurisdiction statute changeVermont, Marshall Islands, Wyoming change DAO LLC statute adversely
Methodology version conflictMultiple methodologies in use; market confusion
Landseed PBC failsLandseed runs out of capital; methodology stewardship interrupted
Land-trust politicsExisting land-trust ecosystem treats DAOs as competition
Indigenous-rights concernsTemplate C deployment found paternalistic by outside review
Climate event affecting deploymentsMajor catastrophes affecting multiple properties simultaneously
Buffer pool absenceReversal of credits from catastrophic events; no buffer pool to draw from

External factors are partly outside Landseed’s control. Continuity planning (methodology IP into a foundation, multi-jurisdictional resilience, partner relationships) is the response.

Risks that span multiple categories

Some risks span categories. For example:

RiskCategories spanning
Earth-Credit-denominated distributionRegulatory (securities) + Operational (mechanics)
Cross-jurisdictional disputeLegal + Strategic + External
Smart contract bug exploitsOperational + Regulatory (if it triggers regulator attention) + Reputational
the co-architect pull-back from Template CStrategic + Reputational + Indigenous-rights External
Methodology version conflictOperational + External + Strategic

Multi-category risks require multi-track mitigation.

How to use the taxonomy

The taxonomy organizes the pressure tests in 02-pressure-tests.md and the open questions in 03-open-questions.md. When a new failure mode is identified:

  1. Categorize it into one of the five families
  2. Add it to the appropriate pressure test
  3. Identify whether it surfaces a new open question
  4. Add to proposed resolutions if applicable
  5. Update Defend/Accept/Monitor categorization

This is the maintenance discipline.

Cross-references

  • Pressure tests organized by these categories: 02-pressure-tests.md
  • Open questions organized by resolution track (counsel / operational / strategic / resourcing): 03-open-questions.md
  • Proposed resolutions: 04-proposed-resolutions.md
  • Defend/Accept/Monitor: 05-defend-accept-monitor.md