In the days after, Mara filed her report. The registry accepted it with procedural calm, folding her ledger into the archive where other escapes were cataloged. Her token’s authorization expired; its etched string dissolved from active tables into a history indexed by timestamp. The Butterfly key, in that way, did what it promised: it mediated a brief, bounded renouncement of constraint in service of purpose, and it held the bearer accountable for the ripples that followed.