Security
Expose output, not system.
The public shell explains boundary and access posture. It does not advertise private topology or internal controls.
Access class, route conditions, and submission posture are visible.
Private processing, logs, queues, thresholds, and system mechanics remain undisclosed.
No dashboard mimicry, no capability inflation, no technical vanity display.