Code of Conduct

Spruce code of conduct

The following outlines a code of conduct for the public when it comes to interacting with Spruce properties or contributing to our open-source software.


Our goal is to create the best environment for user control and decentralized identity to flourish. To achieve this, we must have the best technologists, strategists, and community leaders actively involved, building and maintaining an environment of trust which can only exist where each individual is able to enjoy respect and courtesy.

To ensure a common understanding of “showing respect and courtesy to each other,” we have adopted the following code of conduct.

Unacceptable Behavior

The following types of abusive behavior are unacceptable and constitute code of conduct violations:

  • Harassment - including offensive verbal comments related to gender, sexual orientation, disability, physical appearance, body size, race, or religion, and unwelcome sexual or romantic attention.

  • Threats - threatening someone verbally or in writing.

  • Maliciousness - any direct abuse towards other members of the community —deliberately attempting to make others feel bad, name-calling, singling out others for derision or exclusion. For example, telling someone they don’t belong at community calls or in the public discussion.


If abusive behavior is witnessed or reported, it will first be evaluated by a member of the Spruce team. If it is deemed inappropriate and in violation of the code of conduct, it will result in a permanent suspension from participating in the contribution in both code or public community activities related to Spruce.


All individuals reporting violations of the code of conduct made by other community members will remain anonymous.

License and Notes

This code of conduct is available under the terms of the CC0 license.

This code of conduct draws from and was heavily inspired by the Recurse Center Code of Conduct. We hope to create a welcoming space for anyone wishing to participate in helping shape the future of user-controlled identity and data.

Last updated