Skip to content

blog: Scanning Isn't Control — assessment vs governance positioning#223

Merged
rodchalski merged 1 commit intomainfrom
blog/scanning-isnt-control
Mar 17, 2026
Merged

blog: Scanning Isn't Control — assessment vs governance positioning#223
rodchalski merged 1 commit intomainfrom
blog/scanning-isnt-control

Conversation

@rodchalski
Copy link
Contributor

Adds the Three Questions positioning piece as a blog post.

  • URL: permissionprotocol.com/blog/scanning-isnt-control
  • Three Questions framing throughout
  • Assessment vs runtime governance distinction
  • PP CTA with CLI scan command
  • Added to blog index as top post
  • Full SEO metadata (OG, Twitter, JSON-LD)

@vercel
Copy link

vercel bot commented Mar 17, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
permissionprotocol-site Ready Ready Preview, Comment Mar 17, 2026 0:22am

@github-actions
Copy link

github-actions bot commented Mar 17, 2026

Permission Protocol: Approved
View receipt →

…ernance

- Three Questions framing (Who approved it? What stops it? Can you prove it?)
- Assessment vs runtime governance distinction
- PP as the enforcement layer
- Added to blog index as top post
@permission-protocol
Copy link

✅ Authorized by Permission Protocol

Summary: This change adds a new blog post and updates the index page to position the "Three Questions" framework, which serves as a marketing and educational asset for the Permission Protocol CLI. The rollo...

Environment production
Risk 🟢 Low
Receipt View authority proof →

🔒 Cryptographically signed · Verified by Permission Protocol

@rodchalski rodchalski merged commit 19f2c5f into main Mar 17, 2026
4 of 5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants