@meta
  v: 1
  route: /pre-launch
  generated: 2026-04-30T10:13:41.420Z
  ttl: 600s
  auth: session(visitor:anonymous)

@intent
  purpose:    Pre-launch domain watchlist — suspect / unactivated .gov names and stealth corporate subdomains
  audience:   osint-researcher, journalist
  capability: observe, query-state

@state
  last_fetched: "2026-04-30 06:10:21Z"
  poll_interval_seconds: 21600
  total: 9
  with_ct_entries: 0
  domains[9]{domain,ct_count,latest_cn,a_records}:
    ufo.gov,null,,
    uap.gov,null,,
    disclosure.gov,0,,
    declassified.gov,0,,
    jfkfiles.gov,null,,
    vision.apple.com,null,,
    agi.openai.com,0,,
    sora.openai.com,null,,sora.openai.com.cdn.cloudflare.net.;104.18.34.58;172.64.153.198
    claude5.anthropic.com,null,,

@actions
  - id: get_watchlist_json
    method: GET
    href: https://frontier.watch/api/watchlist
  - id: suggest_target
    method: GET
    href: mailto:signal@frontier.watch?subject=intake%20//%20domain

@context
  > A curated watchlist of domains we suspect are pre-launch — unactivated .gov names in the same orbit as aliens.gov, plus stealth corporate subdomains for major tech that may indicate unannounced product names. We poll crt.sh for CT log entries and Cloudflare DoH for DNS state every 6 hours. The activation signal: a new CT entry where the certificate's common_name matches the bare domain.

@nav
  self:      /pre-launch.agent
  peers:     [/.agent, /aliens-gov.agent, /janet.agent, /doomsday.agent]
  manifest:  /agent.txt
