The Era of the Sovereign Agent
A technical specification for builders and protocol architects from Jared Fritz Helm
This section establishes: the design philosophy — why SentryMandate treats every AI action as a financial transaction requiring hardware-attested proof.
We are standing at the edge of a fundamental shift in how the internet operates.
For the last three years, AI has been a copilot — a tool that generates text while a human keeps their hands on the steering wheel. That era is ending. We are entering the era of the Sovereign Agent. Autonomous AI agents increasingly handle programmatic transactions — negotiating contracts, purchasing data, provisioning infrastructure, and routing capital — creating demand for enforceable governance layers.
But there is a fatal bottleneck preventing mass enterprise adoption: Financial Accountability.
If you hand a sovereign agent an API key or a programmable wallet today, you are one hallucination, one zero-day exploit, or one prompt-injection attack away from draining your corporate treasury. Enterprises are terrified of this, and rightly so. Decentralization without strict, mathematically enforced accountability is just distributed chaos.
SentryMandate was built to solve this exact problem.
SentryMandate provides the governance execution layer between autonomous agents and external API providers, enforcing policies before transaction settlement.
This is not a simple Web2 proxy, and it is not a decentralized theater project relying on human altruism. SentryMandate is a deterministic, cryptographically enforced, and hardware-secured governance protocol.
What Makes This Architecture Resilient
Privacy via TEEs and zkTLS
We assume that independent server operators cannot be trusted. SentryMandate nodes run exclusively inside hardware-isolated Trusted Execution Environments (like AWS Nitro Enclaves). We verify the exact cost of an OpenAI or Anthropic API call using Zero-Knowledge proofs (zkTLS) without ever reading the enterprise's proprietary prompt. We prove the spend; we are blind to the data.
Horizontal Scalability via L2 State Channels
Through our SentryMandate SDK, an orchestrator like CrewAI can spawn thousands of sub-agents simultaneously. Instead of bottlenecking the network with global database locks, we use L2 state channels to issue micro-reservation "gift cards" that execute in parallel and refund instantly.
Cryptoeconomic Enforcement Layer
We do not assume good actors; we assume highly capitalized, rational adversaries. Operators must stake a minimum of $10,000 in SENTRY to route traffic. If they forge a log or attempt to bypass a mandate, they are instantly, mathematically slashed by 100% (with a 21-day unbonding period ensuring slashable collateral remains locked). We heavily subsidize an independent network of Watcher Nodes to guarantee that this immune system never sleeps.
Dollar-Denominated Insurance
Enterprises do not want to be insured in volatile crypto tokens. SentryMandate utilizes a Dual-Tranche Insurance Pool. Operator mistakes are paid for by slashing their staked SENTRY (0.1% for downtime up to 100% for forgery), but enterprise overspend guarantees are backed by overcollateralized pools of real USDC stablecoins (MIN_RESERVE_RATIO == 1.25).
The Reputation Oracle: Non-Forkable History
Competitors can fork our open-source code, but they cannot fork our history.
Every action routed through SentryMandate generates a cryptographically signed Attestation Bundle, building a verifiable execution history. Third parties can query the Reputation Oracle to validate agent behavior before granting service access, establishing minimum compliance thresholds based on historical evidence.
The Mandate Marketplace enables governance template authors to publish standardized policies as on-chain IP-NFTs. The protocol distributes a share of the 0.5% routing fee to template authors based on adoption, creating incentives for high-quality governance standards.
The Path Forward
The 180-day roadmap prioritizes a centralized SaaS implementation to establish product-market fit while engineering the core protocol for decentralized operation. Each phase progressively migrates infrastructure from centralized control to a permissionless, fee-sustained protocol with on-chain governance.
Deploy the governance platform with paying customers. Validate core protocol mechanics with production usage data and measurable compliance outcomes.
Deploy the zero-trust proxy node network. Enable staking, slashing, and node operator economics. Build network effects through infrastructure partnerships and independent operators.
Strip away all admin privileges. Launch the Mandate Marketplace, Insurance Layer, and Reputation Oracle. SentryMandate becomes a fully fee-sustained, deflationary protocol owned by its participants.
This protocol addresses a critical infrastructure gap: governance enforcement for autonomous agents with financial constraints.
To the engineers reading this: the standard is perfection. Determinism is non-negotiable.
To the protocol participants: the architecture scales from centralized SaaS to fully permissionless operation without breaking invariants.
Let's build.
Jared Fritz Helm
Founder, SentryMandate
Architecture Specification
protocol: name: "SentryMandate" tagline: "Governance Protocol for Autonomous AI" position: "Intermediary between agent intent and spend" privacy_layer: execution_env: "Trusted Execution Environments (TEEs)" provider: "AWS Nitro Enclaves" verification: "zkTLS — Zero-Knowledge Transport Layer Security" data_visibility: "Blind to prompt content, proves spend amount" trust_model: "Operators assumed untrusted by default" scalability_layer: sdk: "SentryMandate SDK" orchestrator: "CrewAI compatible" mechanism: "L2 State Channels — Micro-Reservations" parallelism: "Thousands of sub-agents simultaneously" refund_policy: "Instant refund on unused micro-reservations" security_layer: model: "Cryptoeconomic Enforcement Layer" assumption: "Highly capitalized rational adversaries" staking: "$10,000 minimum (SENTRY), 21-day unbonding" slashing: "0.1% downtime | 5% mandate violation | 100% forgery/equivocation" watchers: "Subsidized independent Watcher Node network" insurance_layer: model: "Dual-Tranche Insurance Pool" tranche_a: "Operator staked token burn" tranche_b: "USDC reserves (MIN_RESERVE_RATIO 1.25, MAX_EPOCH_DRAWDOWN 20%)" denomination: "Dollar-denominated — no crypto volatility" defensibility: asset: "Trust Oracle — Reputation data" mechanism: "Cryptographic Attestation Bundles" output: "AAA Safety Ratings for autonomous agents" defensibility: "History cannot be forked" execution: timeline: "180-day sprint" phase_1: "Centralized SaaS — immediate revenue" phase_2: "Decentralized proxy network" phase_3: "Permissionless deflationary protocol" endgame: "Strip admin privileges — fully fee-sustained"
Threat Model
| Attack Vector | Risk Level | SentryMandate Defense | Mechanism |
|---|---|---|---|
| Prompt Injection Spend Drain | Critical | Pre-call budget enforcement via Zero-Trust Proxy | mandate.spend_cap |
| API Key Exfiltration | Critical | Keys never leave TEE hardware isolation boundary | tee.key_isolation |
| Operator Log Forgery | High | Watcher Nodes detect and trigger 100% slash | slash.full_burn |
| Infinite Loop Spend | High | Per-call and daily spend caps with real-time decrement | budget.realtime |
| Unauthorized Tool Access | High | Mandate Engine tool restriction enforcement | mandate.tool_acl |
| Single Point of Failure | Medium | Decentralized node routing with automatic failover | routing.failover |
| Node Censorship | Medium | Agent re-routes to alternative node operator | routing.anti_censor |
| Volatile Insurance Payouts | Medium | USDC stablecoin reserves eliminate crypto volatility | insurance.usdc_pool |
Vision Quantified
Governance Protocol for the AI Agent Economy
The cryptoeconomic enforcement layer between AI agents and money — the full strategic thesis
This section proves: a six-phase execution plan can transition SentryMandate from centralized SaaS to fully permissionless infrastructure in 27 weeks.
Core Thesis
SentryMandate is building the governance layer between AI agents and money.
Every autonomous AI agent that spends money — on LLM calls, APIs, tools, compute, code execution — requires:
- Spend limits
- Policy enforcement
- Audit trails
- Kill switches
- Accountability
- Financial guarantees
Today: thousands of developers experimenting with AI agents. Trajectory: autonomous agents increasingly managing programmatic spend across enterprise APIs.
The protocol operates as an intermediary between autonomous agents and external API providers.
Phased Execution Plan
We execute in six progressive phases, each expanding trust boundaries:
| Phase | Timeline | Core Deliverables | Trust Model Shift |
|---|---|---|---|
| Phase 0 | Wk 1–4 | TEE Enclave image, zkTLS integration, Deterministic Mandate Engine | Centralized but hardware-attested |
| Phase 1 | Wk 5–10 | L2 Sequencer, SentryMandate SDK (Admin Client + Worker Wrapper), Enterprise Dashboard + Stripe | Single-operator SaaS with cryptographic audit |
| Phase 2 | Wk 11–14 | CommitmentLedger.sol, FeeRouter.sol, OperatorRegistry.sol, Public Explorer | Evidence anchored to L1 — "Don't trust; verify" |
| Phase 3 | Wk 15–20 | Federated Operator onboarding (10 nodes), Shadow Slashing, Watcher Network, IP-NFT Marketplace v1 | Federated multi-operator with shadow enforcement |
| Phase 4 | Wk 21–26 | Permissionless node onboarding, 4 Doomsday Drills, Reputation Engine activation, live testnet slashing | Permissionless with adversarial chaos testing |
| Phase 5 | Wk 27+ | TGE, Live Objective Slashing (100% burn), Dual-Tranche Insurance, Buy-and-Distribute FeeRouter | Fully permissionless, self-sustaining, economically secured |
Phase 1 — Enterprise SaaS
Mandate Engine
- Spend caps (daily, per-call, per-tool)
- Tool restrictions (no code execution, no file system access, etc.)
- Approval thresholds
- Human-in-the-loop gating
- Kill switches
- Audit logging
Zero-Trust Proxy
- API key isolation
- Budget enforcement before call execution
- LLM call logging
- Tool call enforcement
Dashboard
- Treasury view (where funds live)
- Mandate management
- Spend analytics
- Violation alerts
- Risk scoring
Managed Proxy Service
- Hosted infrastructure
- SLA-backed uptime
- Compliance-ready logs
Phase 1 Economic Model
- SaaS Subscription (monthly/seat/agent tier)
- Managed Proxy fees
- Enterprise contracts
- Custom deployment
- Dedicated support
Phase 1 Deliverables
- Harden Mandate Engine logic
- Enforce pre-call spend validation
- Add real-time budget decrementing
- Build violation event pipeline
- Enterprise audit export feature
- SOC2 alignment plan
- Compliance templates (Finance, Healthcare, etc.)
- Enterprise pricing structure
Phase 2 — Zero-Trust Proxy Network
Core Mechanism
Decentralized proxy node network processes governed LLM calls.
Operator Earnings
- Per-request fee
- Staking rewards (5-15% APY target)
- Governance participation
Slashing Risks
- Mandate violations
- Key leakage
- Spend forgery
- Censorship
Target Operators
- Infrastructure companies
- Cloud providers
- LLM providers
- DevOps firms
- Independent operators
Phase 2 Deliverables
- Define staking model
- Define slashing conditions
- Design node reward formula
- Implement routing fallback logic
- Define consensus mechanism (minimal viable)
- Publish Node Operator Spec
- Launch incentivized testnet
Protocol Fee Model
Revenue Layer: Spend Volume Fee
Thin fee on all governed LLM calls.
fee_example: agent_spend: "$1.00" protocol_take: "0.5% of routed spend ($0.005 per $1.00)" at_scale: "$1B annual volume: 0.5% = $5M/year" fee_distribution: # 0.5% of routed spend - "70% → Node Operators (Buy-and-Distribute)" - "20% → Insurance Reserve (USDC)" - "10% → Protocol Treasury (DAO governance)"
Protocol Fee Deliverables
- Finalize fee % model
- Treasury allocation model
- Token emission schedule
- Revenue projection model
- Legal structure for fee collection
Mandate Marketplace
Mandates become transferable governance IP.
Stakeholders
- Compliance teams
- AI safety researchers
- Consultants
- Auditors
- Industry associations
Product Requirements
- Template publishing
- Version control
- Mandate certification
- Ratings system
- Royalty engine
- License enforcement
Marketplace Deliverables
- Mandate Template Schema
- Marketplace UI
- Royalty smart contract logic
- Certification badge framework
- Auditor onboarding plan
Insurance + Guarantees Layer
Staked collateral backs financial guarantees.
"This agent is governed under a mandate backed by $10K collateral."
Insurance Deliverables
- Collateral lock contract
- Claims adjudication logic
- Dispute resolution framework
- Risk pricing model
- Insurance partner exploration
Verified Agent Reputation Layer
Governed activity produces an immutable track record.
Reputation Metrics
- Calls processed
- Violations
- Completion rate
- Spend stability
- Mandate compliance history
Use Cases
- API providers require minimum reputation
- Enterprises require minimum score
- Agents advertise reputation
Historical reputation data is non-forkable. This becomes the non-forkable execution history.
Reputation Deliverables
- Reputation scoring formula
- Public agent profile endpoint
- Reputation oracle API
- Integration SDK for partners
- Badge system (Verified, Insured, Enterprise-grade)
Stakeholder Win Matrix
See Section 03: Vision for the full Architecture Role / Value Matrix defining all seven participant categories.
Societal Narrative
SentryMandate provides:
Universal Safety Standard
HTTPS for AI agents — a baseline governance layer that becomes the default for every autonomous deployment.
Democratic Governance
Communities vote on standards. Financial protection through collateral. Accountability for autonomous systems.
Regulatory Alignment
Provides what regulators need without centralized control. Audit trails, spend limits, and kill switches baked into protocol.
This is the protocol's alignment layer — governance that serves network participants, not extractive intermediaries.
Defensibility Strategy
See Section 03: Vision → Technical Defensibility for the full defensibility progression analysis.
Aggressive Roadmap
Scale SaaS adoption. Harden mandate engine. Launch managed proxy. Publish protocol whitepaper draft.
Node testnet. Staking model. Reputation beta. Mandate template publishing.
Protocol launch. Marketplace live. Insurance mechanism live. Governance token operational.
Progressive Decentralization Path
The Case for Decentralized Implementation
Economic architecture for decentralized AI governance — fee structure, stakeholder incentives, and protocol alignment
This section proves: every fee, stake, and slash maps to a specific security mechanism — no value accrual without cryptoeconomic purpose.
Core Insight
Autonomous agents that transact require governance. SentryMandate acts as the execution intermediary, enforcing policies before transaction settlement. As autonomous AI deployment scales, governance protocols become critical infrastructure that all agent transactions route through.
Value Accrual & Cryptoeconomic Security
Protocol Fee (0.5%)
Fees fund the Watcher monitoring subsidy, ensuring the network's immune system never starves (Invariant II.2).
- A 0.5% fee on every governed LLM call is split: 70% to TEE Proxy Operators via Buy-and-Distribute, 20% to Insurance Reserve (USDC), 10% to Protocol Treasury
- At $1B annual transaction volume, this generates $5M/year — funding continuous fraud-proof verification across the network
- Security guarantee: The Watcher subsidy ensures that monitoring coverage remains economically viable even during low-activity epochs, preventing gaps in fraud detection
- Invariant linkage: Fee flow is hard-coded at the smart-contract level; parameter changes require governance vote with 7-day timelock
Staking
$10,000 minimum stake prevents Sybil attacks; 21-day unbonding ensures fraud proofs finalize before withdrawal.
- Sybil resistance: The $10K minimum stake makes it economically infeasible to spin up disposable operator identities to evade reputation consequences
- Unbonding window: 21-day withdrawal delay exceeds the maximum fraud-proof challenge period (14 days), ensuring slashable collateral remains locked until all pending disputes resolve
- Delegation model: SENTRY stakers delegate stake to operators, sharing both rewards and slashing risk — aligning delegator incentives with operator honesty
- Security guarantee: Combined stake across all active operators forms the network's economic security budget; total stake must exceed maximum extractable value for any single epoch
Slashing
100% equivocation slash (Invariant II.1) makes cryptographic fraud economically suicidal.
- Equivocation (Invariant II.1): An operator who signs two different attestations for the same request loses 100% of staked collateral —
MIN_SLASH_EQUIVOCATION == 100% - Liveness failure: Operators who fail to submit attestation bundles within the epoch window face progressive slashing (1% per missed epoch, capped at 10%)
- Corruption cost (Invariant II.3):
cost_of_corruption > extractable_valueis enforced by ensuring minimum stake always exceeds maximum single-epoch extractable value - Security guarantee: Slashed funds are split between the reporting Watcher (30-50% bounty) and the insurance Senior Tranche, simultaneously rewarding vigilance and recapitalizing the safety net
Insurance Premiums
Premiums capitalize the Senior Tranche (USDC), maintaining MIN_RESERVE_RATIO ≥ 1.25 (Invariant III.2).
- Senior Tranche (USDC): Enterprise insurance premiums flow into a USDC-denominated Senior Tranche, ensuring claims are paid in stable value — not volatile tokens
- Reserve ratio (Invariant III.2):
MIN_RESERVE_RATIO ≥ 1.25means the Senior Tranche always holds at least 125% of maximum potential epoch liability - Drawdown cap (Invariant III.3):
MAX_EPOCH_DRAWDOWN == 20%prevents catastrophic depletion — no single epoch can drain more than one-fifth of the tranche - Security guarantee: When an agent violates its mandate, enterprise losses are paid from overcollateralized USDC reserves with deterministic claim adjudication via on-chain evidence
Verified Agent Identity and Reputation
The audit trail creates a reputation system for AI agents:
- Agent X has 10,000 governed LLM calls, $0 in mandate violations, 99.8% completion rate
- That reputation score has value — like a credit score for AI agents
- Service providers, APIs, and platforms could require a minimum SentryMandate reputation score before granting access
- Who wins: Execution history is non-forkable. SentryMandate controls the reputation oracle. Partners who integrate reputation checks into their platforms benefit from safer AI interactions
- Network benefit: Bad actors and poorly governed agents get naturally filtered out. Reputation creates market pressure for good AI governance without regulation
Enterprise Hybrid (Phase 1 Revenue)
While the decentralized protocol matures, the centralized product generates revenue:
- SaaS subscription (current model) — teams pay monthly for dashboard, mandates, budgets
- Managed proxy service — hosted zero-trust proxy with SLA guarantees
- Enterprise contracts — custom deployment, compliance features, dedicated support
- Who benefits: The team validates product-market fit with real revenue. SENTRY stakers see protocol usage metrics before decentralization
- Network benefit: AI governance is accessible today, not waiting for the protocol to launch
Architecture Role / Value Matrix
| Participant | Protocol Role | Incentive Mechanism | Accountability |
|---|---|---|---|
| Core Contributors | Protocol development, enclave image maintenance | 20% token allocation, 4-year vest with 1-year cliff | Code is open-source; enclave images are auditable via PCR0 |
| SENTRY Stakers | Delegate stake to operators, participate in governance | Share of Buy-and-Distribute flow proportional to delegated stake | Delegated stake subject to slashing if chosen operator misbehaves |
| TEE Proxy Operators | Run enclave nodes, execute PoGE workflow, submit attestation bundles | 70% of protocol fee revenue via Buy-and-Distribute | $10K minimum stake; 100% slash for equivocation; 21-day unbonding |
| Watcher Nodes | Verify operator bundles, file fraud proofs, submit Coverage Proofs | Tri-Layer: Dispute bounty (30-50%) + Proof-of-Vigilance subsidy + Reputation leverage | Honeypot detection required; false "All Clear" = ejection from subsidy pool |
| Mandate Curators | Author and publish governance templates as IP-NFTs | Flat-fee USDC royalties per agent/subnet/month | Templates are immutable once published; new version = new hash |
| Orchestrators | Provision agent budgets via Admin Client, manage Mandate assignments | Deterministic spend control; insurance coverage for agent overspend | Explicit on-chain signature required to migrate agents to new template versions |
| Agent Developers | Build autonomous agents using Worker Wrapper SDK | Drop-in OpenAI SDK replacement with built-in compliance and audit trail | Agent reputation (Sentry Score) derived from on-chain compliance history |
Systemic Invariants
The non-negotiable properties the protocol must satisfy at every block height
Deterministic Execution
Every AI action is evaluated inside a TEE Enclave against a canonical Mandate ruleset. Identical inputs produce identical policy decisions on any node. Enforced by Invariant I.1: PCR0 must match canonical SentryEnclave.eif.
Economic Accountability
Misbehavior is not punished by committees — it is punished by mathematics. Equivocation triggers MIN_SLASH_EQUIVOCATION == 100% (Invariant II.1). The cost of corruption always exceeds the value extractable (Invariant II.3).
Capital Solvency
Enterprise losses are paid in USDC from the Senior Tranche, not volatile tokens. MAX_EPOCH_DRAWDOWN == 20% prevents bank runs (Invariant III.3). MIN_RESERVE_RATIO == 1.25 ensures overcollateralization at all times (Invariant III.2).
Technical Defensibility
Protocol defensibility increases with each layer of decentralization:
| Layer | Defensibility Level | Analysis |
|---|---|---|
| SaaS | Low | Anyone can build a spend-check API |
| Proxy Network | Medium | Network effects of node operators, but forkable |
| Audit Trail + Reputation | High | Historical data is non-reproducible. An agent's 12-month track record can't be forked |
| Marketplace + Insurance | Very High | Two-sided marketplace with embedded financial products. High switching costs due to non-forkable history |
Protocol Summary
SentryMandate is a governance protocol for the AI agent economy. Phase 1 is a centralized SaaS delivering AI spending controls — this validates product-market fit and generates near-term revenue. Phase 2 decentralizes into a zero-trust proxy network where node operators stake collateral and earn per-request fees. Phase 3 layers on the reputation oracle and insurance pool, making autonomous AI commercially viable. Each phase builds on the previous — SaaS validation, then proxy network fees, then reputation and insurance layers backed by non-forkable execution history.
Proof of Governed Execution
Verifiable proxy infrastructure powered by TEEs, zkTLS, and net-deflationary tokenomics
This section proves: Proof of Governed Execution (PoGE) eliminates the Execution Oracle Problem — nodes cannot leak keys, forge logs, or deviate from Mandate policy.
This specification defines the foundational architecture of the SentryMandate protocol. It resolves critical vulnerabilities inherent in standard proxy networks by implementing Proof of Governed Execution (PoGE), establishing a legally compliant Stake-to-Access value accrual model, and deploying Tranched Risk Pools to prevent systemic economic collapse.
1. Execution Layer: Proof of Governed Execution (PoGE)
Solves: The Execution Oracle Problem — Key Leakage & Log Forgery
Standard proxy nodes cannot cryptographically prove correct API execution without exposing the payload. SentryMandate replaces the standard proxy with a Verifiable Proxy utilizing TEEs and zkTLS.
1.1 The PoGE Workflow
The PoGE workflow proceeds in four steps: (1) Agent sends encrypted request with Mandate constraints, (2) TEE node evaluates the mandate and routes via zkTLS, (3) Node generates a cryptographic receipt proving correct execution without revealing the payload, (4) Node submits the receipt to claim its fee share.
See Section 07: Protocol Flow for the complete end-to-end execution lifecycle with flow diagrams.
2. Value Accrual Layer: Net-Deflationary Work Token
Solves: The Regulatory Death Trap — Unregistered Securities under Howey
Distributing protocol revenue to passive holders triggers regulatory risk. SentryMandate uses a Stake-to-Access (Work Token) model with Burn-and-Mint / Buy-and-Distribute Equilibrium. Value accrues exclusively to active participants through programmatic mechanics.
2.1 The Fiat-to-Token Pipeline
Enterprise USDC fees are programmatically market-bought into SENTRY and distributed exclusively to active operators who submit valid PoGE receipts. Slashed tokens are 100% burned, creating a net-deflationary loop at target volume.
See Section 11: Token Flow Architecture for the complete fiat-to-token pipeline, fee routing, and burn mechanics.
3. Economic Security Layer: Tranched Risk Pools
Solves: The Insurance Death Spiral — Systemic Slashing Events
Backing enterprise guarantees with volatile tokens risks a "death spiral" during mass overspend events. SentryMandate structures insurance like a DeFi lending market.
3.1 Tranche Architecture
SentryMandate structures insurance as a Dual-Tranche pool: a Senior Tranche (USDC) that pays enterprise claims in real dollars, and a Junior Tranche (staked SENTRY) that absorbs operator-specific slashing. The two tranches are structurally isolated.
See Section 10: Insurance Engine for full tranche mechanics, reserve ratios, and drawdown limits.
4. Hardcoded Protocol Parameters (v1.0)
The following parameters are calibrated to incentivize early operator participation, deter Sybil attacks, and sustain protocol operations through transaction-proportional fees.
4.1 Core Fee Engine
| Parameter | Value | Rationale |
|---|---|---|
| Protocol Fee | 0.5% of routed spend | Thin enough to mimic standard infrastructure costs; highly scalable at volume. |
| Node Operator Share | 70% | Aggressively drives the network effect and subsidizes operator compute costs. |
| Insurance Reserve Share | 20% | Converted to USDC to continuously capitalize the Senior Tranche. |
| Protocol Treasury Share | 10% | Funds ongoing R&D, DAO operations, and ecosystem grants. |
4.2 Security & Slashing Constants
| Parameter | Value | Enforces |
|---|---|---|
| Minimum Operator Stake | $10,000 (in SENTRY) | High enough to prevent Sybil attacks; low enough for DevOps adoption. |
| Unbonding / Cooldown | 21 Days | Ensures malicious actors cannot withdraw stake before fraud proofs finalize. |
| Downtime Slash | 0.1% | Soft penalty for minor unresponsiveness. |
| Accidental Mandate Violation | 5.0% | Medium penalty for misconfigured node logic. |
| Forged zkTLS / Key Leakage | 100% | Catastrophic penalty and permanent ban for intentional malicious acts. |
4.3 Token Allocation (Fixed Supply: 1,000,000,000 SENTRY)
| Allocation Bucket | Percentage | Vesting Schedule |
|---|---|---|
| Ecosystem & Node Emissions | 40% | Programmatic exponential decay over 8 years. |
| Core Contributors & Team | 20% | 4-year linear vest, 1-year cliff. |
| Early Backers | 15% | 3-year linear vest, 1-year cliff. |
| Protocol Treasury | 15% | Controlled by DAO governance. |
| Mandate Liquidity Mining | 10% | Incentive pool for top compliance/security researchers to populate the marketplace. |
5. The Definitive Non-Forkable History
Because SentryMandate utilizes zkTLS and TEEs, the resulting audit trail is not just a standard database log — it is a cryptographically verifiable ledger of every compliant action an AI has ever taken.
Institutions will demand a Sentry Score. This on-chain, non-forkable reputation data — built on proven compliance — forms an durable technical defensibility competitors cannot replicate by copying code.
Reputation data is cryptographically bound to on-chain execution history. Forking the code does not fork the trust.
Every Sentry Score datapoint originates from a verified TEE attestation. No self-reported metrics, no trust assumptions.
Network effects deepen with every verified execution, creating compounding defensibility through accumulated execution history.
AWS Nitro TEE hardware is not compromised at the silicon level. The PCR0 attestation chain is cryptographically sound. zkTLS MPC protocol (TLSNotary) is formally verified.
The TEE boundary is the trust perimeter. Outside: untrusted operator host OS, network layer. Inside: encrypted memory, ephemeral keys, attestation signing. The boundary is hardware-enforced, not software-enforced.
OperatorRegistry.sol rejects node registration without valid PCR0 matching canonical SentryEnclave.eif (Invariant I.1). CommitmentLedger.sol requires DA inclusion proof with every Merkle root (Invariant I.2).
Operator modifies enclave image to exfiltrate API keys or forge attestation bundles.
PCR0 hardware attestation changes with any image modification. OperatorRegistry.sol rejects mismatched PCR0 instantly. Operator loses routing eligibility and cannot earn fees.
zkTLS MPC colluder provides false receipt claiming higher/lower cost than actual.
TLSNotary requires threshold of MPC parties to agree. Receipts are independently verifiable against LLM provider billing APIs. Discrepancy triggers automatic fraud investigation.
Architecture Summary
- Execution Layer (PoGE): TEE + zkTLS verifiable proxy replaces trust-based nodes with cryptographic execution proofs
- Value Accrual (Work Token): Fiat-to-Token pipeline ensures regulatory-compliant, active-participant-only value distribution
- Risk (Tranched Pools): Senior USDC tranche absorbs catastrophic tail risk; Junior SENTRY handles operator penalties
- Fee Engine: 0.5% protocol fee split 70/20/10 across operators, insurance, and treasury
- Deflationary Mechanics: 100% slash-and-burn for malicious actors permanently removes supply
- Non-Forkable History: Non-forkable Sentry Score creates compounding enterprise defensibility
- Token Supply: Fixed 1B SENTRY with 8-year exponential emission decay
- Security: $10K min stake, 21-day unbonding, graduated 0.1%-100% slashing
Cryptographic Enforcement & Slashing
TEE/zkTLS-powered economic enforcement guaranteeing protocol credibility
This section proves: misbehavior is punished by mathematics, not committees. MIN_SLASH_EQUIVOCATION == 100% is hardcoded and non-negotiable (Invariant II.1).
Slashing is the economic enforcement mechanism that guarantees SentryMandate's credibility. The protocol relies on Trusted Execution Environments (TEEs) and cryptographic attestations to enforce objective, mathematically provable slashing, while preserving payload confidentiality.
1. The Evidence Engine
The "Watcher Paradox" dictates that third parties cannot view encrypted AI payloads to verify compliance without violating enterprise privacy. Solution: Proxy nodes operate inside hardware-secured TEEs (e.g., AWS Nitro Enclaves, Intel SGX).
The SentryMandate mandate engine runs inside the TEE.
The Agent sends encrypted request to the Enclave. It decrypts, evaluates the Mandate, routes via zkTLS, and encrypts the response back.
The Enclave generates a cryptographic proof: "I processed Request X per Mandate Y, resulting in Spend Z." Plaintext is never exposed.
The SentryVerifier contract checks the Enclave's signature. If valid, state is updated and operator earns rewards.
2. Slashable Entities & Offenses
Only Proxy Node Operators (via self-stake) are slashable in v1. Delegators and End Users are exempt. "Selective Refusal" is removed from v1 to allow compliance with local jurisdictional laws.
Class A — Integrity Violations (Auto-Slashable)
Objective, cryptographically proven on-chain. No human arbitration required.
| ID | Offense | Description |
|---|---|---|
| A1 | Forged Attestation | Operator submits a spend record or state transition that lacks a valid TEE signature. |
| A2 | Equivocation (Double-Signing) | Operator submits two conflicting state updates for the same request sequence/nonce. |
| A3 | Mandate Bypass | Operator submits a valid TEE signature, but the transaction trace proves a required approval threshold was skipped. |
Class B — Liveness Violations (Watcher-Initiated)
Watchers cannot read payloads, but they can verify network health.
| ID | Offense | Description |
|---|---|---|
| B1 | Unresponsiveness | Operator fails to respond to cryptographic heartbeat pings from the network. |
| B2 | SLA Breach | Operator consistently drops below the 99.9% uptime threshold required by the Active Routing Set. |
Class C — Key Negligence (Subjective / Arbitration)
| ID | Offense | Description |
|---|---|---|
| C1 | Proven Key Leakage | Operator negligence leads to extraction of enterprise API keys from infrastructure outside the TEE, resulting in unauthorized spend. Requires human governance arbitration. |
3. Penalty Matrix & Economics
Slashing must be severe enough to deter theft but forgiving enough of minor hardware hiccups. Slashed funds are primarily burned to create net-deflationary pressure for SENTRY.
Full Penalty Matrix
| Offense Class | Example | Severity | Penalty / Slash % | Post-Slash Action |
|---|---|---|---|---|
| Class B (Minor) | Missed heartbeats (1 hr) | Level 1 | 0.1% | Warning, temporary traffic reduction |
| Class B (Major) | Extended downtime (>24 hrs) | Level 2 | 1% – 5% | Chilled (removed from routing set for 7 days) |
| Class C (Subjective) | API Key Leakage | Level 3 | 10% – 50% | Governance arbitration, potential jail |
| Class A (Critical) | Forged TEE Attestation | Level 4 | 100% | Total stake burn, permanent protocol ban |
Slashed Stake Distribution
| Allocation | Percentage | Purpose |
|---|---|---|
| Burned | 50% | Permanently removed from supply (deflationary security). |
| Victim Compensation / Insurance | 30% | Sent to the USDC conversion pool to backstop enterprise overspend claims. |
| Challenger Reward | 20% | Paid to the Watcher/Fisherman who submitted the valid proof (Class B only). |
Minimum_Stake = $10,000 (SENTRY) | Unbonding = 21 days | Enforced by SlashingModule.sol (Invariant II.1)
4. Dispute & Slashing Flow
Path 1: The Auto-Slash (Class A)
Operator submits a malformed or forged AttestationBundle to the blockchain to claim their fee.
The SentryVerifier.sol contract automatically rejects the cryptographic signature.
The contract triggers SlashingModule.sol with the full penalty matrix for Class A offenses.
The Operator is instantly slashed for 100%, and the node is permanently banned from the protocol.
Path 2: The Watcher Challenge (Class B)
// Path 2: Watcher Challenge (Class B Offenses) Watcher detects unresponsive node | v Watcher submits Challenger Bond (500 SENTRY) + proof | v DisputeModule.sol opens Dispute Window (12 hrs) | +-- Operator responds with valid TEE attestation | => Dispute dismissed | +-- Operator fails to respond => Slashed (e.g., 1%) | +-- Watcher: Bond returned + 20% of slash +-- 50% of slash burned +-- 30% to Insurance Reserve
A Watcher detects a node failing to respond to routing requests.
Watcher submits a Challenger Bond (500 SENTRY) and cryptographic proof of missed heartbeats to DisputeModule.sol.
The Operator has a fixed Dispute Window (12 hours) to submit a valid TEE attestation proving they were online.
If the Operator fails, they are slashed (e.g., 1%), the Watcher gets bond back + 20%, and the rest is burned/reserved.
5. Defense Mechanisms: Cooldowns & Timelocks
Prevents operators from executing an attack and immediately withdrawing stake before penalties apply.
| Mechanism | Duration | Purpose |
|---|---|---|
| Unbonding Period | 21 Days | When an operator initiates an exit, their stake remains locked for 21 days. They continue to process traffic for the first 7 days, and serve as slashable collateral for the remaining 14 days to account for delayed fraud proofs. |
| Pending Dispute Lock | Until resolved | If a Watcher files a dispute against an Operator, the Operator's unbonding timer is frozen until the dispute is resolved. |
| Governance Timelocks | 14 Days | Any changes to slashing parameters require a 14-day timelock, giving operators time to unbond if they disagree with the new network economics. |
Fraud proofs are deterministically verifiable on-chain. The Challenger Bond mechanism deters frivolous disputes. At least one honest Watcher monitors each operator's traffic subset.
Slashing is objective — adjudicated by smart contract logic, not committees. Equivocation (signing two outcomes for one request) and zkTLS forgery are Class A violations: 100% slash, permanent ban. No governance override.
SlashingModule.sol enforces MIN_SLASH_EQUIVOCATION == 100% as an immutable constant (Invariant II.1). DisputeModule.sol dynamically scales Challenger Bond to bankrupt spam attackers (Invariant II.3).
Attacker floods dispute system with frivolous fraud proofs to freeze legitimate operator capital.
Dynamic Challenger Bond (Invariant II.3): base rate 10% of expected slash. Each failed dispute doubles the attacker’s bond. Exponential cost bankrupts spam before it degrades operator liveness.
Operator equivocates — signs two different outcomes for the same request_id.
MIN_SLASH_EQUIVOCATION == 100% (Invariant II.1). Entire stake burned. Operator permanently blacklisted. No governance parameter can lower this — it’s an immutable Solidity constant.
6. Smart Contract Architecture
| Contract | Responsibility |
|---|---|
| OperatorRegistry.sol | Manages node registration, minimum stake ($10,000 SENTRY equivalent), and unbonding queues. |
| EnclaveVerifier.sol | Stores public keys of authorized TEE images and verifies cryptographic signatures of incoming Attestation Bundles. |
| DisputeModule.sol | Handles Challenger bonds, liveness proofs, and the resolution timers. |
| SlashingModule.sol | Executes the penalty matrix, burns tokens, and routes rewards to Watchers and Insurance Reserve. |
Evidence Schema & Fraud Proofs
Deterministic, cryptographically verifiable, chain-anchored evidence model for objective fraud proofs and automated slashing
This section proves: every attestation bundle is a self-contained, independently verifiable proof — no oracle dependency, no trusted third party.
Define a deterministic, cryptographically verifiable, chain-anchored evidence model that enables objective fraud proofs, automated slashing, and verifiable audit histories — while preserving payload confidentiality for enterprise AI workloads and resolving high-throughput concurrency.
1. Design Principles
| # | Principle | Description |
|---|---|---|
| 1.1 | Determinism | Given (Mandate M, Request R), the policy evaluation must produce identical outputs. |
| 1.2 | Zero-Knowledge Privacy | Payloads (prompts/responses) are never stored or hashed in plaintext. Only metadata and zkTLS proofs are committed. |
| 1.3 | Hardware Root of Trust | Signatures must originate from TEE Enclave keys, bound to specific Platform Configuration Registers (PCRs). |
| 1.4 | Commutative State Transitions | Budget updates must use delta-state models (Event Sourcing / CRDTs) to allow asynchronous, concurrent agent execution without sequence locking. |
2. Core Evidence Objects
The architecture relies on four fundamental objects that compose the complete evidence chain.
The Rules — governance constraints published once by the author and referenced by hash.
The Intent — metadata-only record of the agent's requested action with ZK commitment.
The External Proof — cryptographic evidence of the TLS session with the LLM provider.
The Atomic Evidence Unit — hardware-signed master proof encompassing all other objects.
3. Mandate Object
Defines the governance rules. Published once by the author and referenced by hash thereafter.
{
"mandate_id": "UUID",
"version": "1.0",
"issuer_pubkey": "0x...",
"spend_limits": {
"per_call_max": 5.00,
"daily_max": 100.00
},
"allowed_endpoints": ["api.openai.com", "api.anthropic.com"],
"approval_threshold": null
}
4. Solving Concurrency: The Delta Spend Model
To allow an agent to make 50 simultaneous LLM calls, we eliminate budget_state_before. Instead, we track Delta Spend Events. The smart contract calculates the total budget by summing the validated deltas.
4.1 Execution Request Object (Metadata Only)
{
"request_id": "UUID",
"agent_id": "0x...",
"mandate_hash": "0xabc...",
"endpoint": "api.openai.com",
"payload_zk_commitment": "0x...",
"timestamp": 1708920000
}
Note: payload_zk_commitment is a zero-knowledge hash of the encrypted payload, proving what was sent without revealing the plaintext.
5. The zkTLS Provider Receipt
Because LLM providers don't sign responses, the TEE proxy establishes a zkTLS session (using the TLSNotary protocol or Opacity network) with the provider. The resulting receipt cryptographically proves the TLS session was with a verified certificate and the response contained specific usage data.
{
"zkTLS_proof_type": "TLSNotary_v1",
"server_domain": "api.openai.com",
"extracted_spend_delta": 0.02,
"cryptographic_proof": "0x[zk_SNARK_proof_data]"
}
6. The TEE Attestation Bundle (The Master Evidence)
This is the atomic unit of evidence. It is generated inside the AWS Nitro Enclave (or equivalent TEE) and signed by the Enclave's internal ephemeral key.
6.1 Bundle Structure
{
"bundle_version": "2.0",
"enclave_pubkey": "0x...",
"operator_id": "0x...",
"request_hash": "0x...",
"mandate_hash": "0x...",
"policy_decision": "ALLOW",
"delta_spend": 0.02,
"receipt_hash": "0x...",
"timestamp": 1708920005
}
6.2 The Hardware Signature
The TEE signs the bundle hash and wraps it in a CBOR Object Signing and Encryption (COSE) document. This document includes the PCRs (Platform Configuration Registers) which prove to the blockchain that the exact, audited SentryMandate code was running.
7. Storage & Merkle Commitments
Storing every bundle on-chain is prohibitively expensive. We use a Rollup-style commitment model.
The complete JSON of the Request, the zkTLS Receipt, and the Attestation Bundle are stored in decentralized storage (e.g., Arweave, Celestia, or EigenDA). This ensures Data Availability without on-chain storage costs.
Every 10 minutes (an Epoch), the Operator submits a Merkle Root of all bundle_hashes processed, alongside the sum of the delta_spend for each agent.
// On-chain transaction submitted by Operator function commitEpoch( bytes32 merkleRoot, uint256 epochTotalSpend, bytes memory TEE_Signature ) external;
8. Fraud Proof Construction (Auto-Slashing)
Because the system is fully deterministic and backed by TEE/zkTLS, human arbitration is completely removed from Class A (Integrity) violations.
If an Operator claims an agent spent $0.02, but the zkTLS proof is invalid:
Input: The zkTLS_Receipt and the Attestation Bundle.
Verification: The smart contract validates the zkTLS SNARK. If Verify(zkTLS) == FALSE, the Operator is auto-slashed 100%.
If an Operator routes a call that violates the mandate (e.g., routing to api.hacker.com when only api.openai.com is allowed):
Input: Mandate Object, Attestation Bundle.
Verification: The contract checks if Bundle.endpoint is in Mandate.allowed_endpoints. If not, and policy_decision == ALLOW, the Operator is auto-slashed.
If an Operator tries to hide spend by signing two different bundles for the same request_id:
Input: Bundle_A, Bundle_B.
Verification: If Bundle_A.request_id == Bundle_B.request_id BUT Bundle_A.hash != Bundle_B.hash, the Operator is auto-slashed.
Evidence Schema Summary
- Deterministic: Same Mandate + Request always produces identical policy evaluation output
- Zero-Knowledge: Payloads never stored in plaintext; only metadata and zkTLS proofs committed
- Hardware Root of Trust: All signatures originate from TEE Enclave keys bound to PCRs
- Delta Spend Model: CRDTs enable 50+ concurrent LLM calls without sequence locking
- Rollup Commitments: Off-chain Data Availability with on-chain Merkle root every 10 minutes
- Automated Fraud Proofs: Three fraud proof types remove all human arbitration from Class A violations
End-to-End Protocol Flow
The complete lifecycle of a governed AI request inside SentryMandate — from provisioning through execution, settlement, and reputation compounding.
This section proves: the full request-to-settlement lifecycle completes in under 10 minutes, with every step cryptographically anchored.
0. High-Level System Topology
SentryMandate operates across three distinct layers, each with dedicated responsibilities.
| Layer | Components |
|---|---|
| Client Layer | The AI Agent and the Enterprise Dashboard. |
| Execution Layer (Off-Chain) | The decentralized network of TEE Proxy Nodes utilizing zkTLS. |
| Settlement Layer (On-Chain/L2) | SentryMandate Smart Contracts (Registry, Staking, Escrow, Reputation). |
┌─────────────────────────────────────────────────────────┐ │ CLIENT LAYER │ │ AI Agent ←→ Enterprise Dashboard │ └────────────────────────────┬────────────────────────────┘ ▼ ┌─────────────────────────────────────────────────────────┐ │ EXECUTION LAYER │ │ TEE Proxy ←→ zkTLS ←→ LLM APIs │ └────────────────────────────┬────────────────────────────┘ ▼ ┌─────────────────────────────────────────────────────────┐ │ SETTLEMENT LAYER │ │ Registry │ Staking │ Escrow │ Reputation │ └─────────────────────────────────────────────────────────┘
SentryMandate utilizes TEE Enclaves, zkTLS, and a Layer-2 Sequencer to guarantee microsecond latency, zero-knowledge privacy, and mathematically impossible budget overspending.
1. Initialization Phase: Provisioning the Agent
Before an agent can make a single call, the financial and governance rails must be laid.
The Enterprise Compliance Officer uses the SaaS dashboard to select a template (e.g., "Healthcare Agent Baseline").
The Mandate is hashed. The hash (H_M) is published to the SentryMandate smart contract.
The Enterprise deposits $1,000 USDC into the protocol's Escrow Contract.
The Agent is provisioned with a cryptographic identity (an Ed25519 keypair). The Sentry protocol maps this Agent ID to the Mandate Hash and the Escrow Balance.
2. The Execution Lifecycle (The Fast Path)
The sub-100ms flow for standard, fully autonomous agent requests (no human approval required).
Step 2.1: The Request & Micro-Reservation
To prevent the double-spend problem without introducing global consensus latency, the Agent opens a rapid state channel with a specific TEE Node.
│
▼
TEE Node pings L2 Sequencer: "Does Agent have $2.00 available?"
│
▼
L2 Sequencer locks $2.00 in state channel → returns Lock Token
| # | Action | Detail |
|---|---|---|
| 1 | Agent Signs Request | Requests a $2.00 reservation limit for an OpenAI GPT-4o call. |
| 2 | TEE Pings Sequencer | "Does this Agent have $2.00 available in Escrow?" |
| 3 | Lock Token Issued | L2 Sequencer locks $2.00 in state channel, replies with cryptographic lock token. |
Step 2.2: TEE Mandate Evaluation
The Agent sends the encrypted prompt + the lock token to the TEE Node. The TEE Enclave decrypts the payload in memory. The Enclave runs the Mandate Evaluation Engine checking: Is the tool allowed? Is the endpoint allowed? Is the spend within the reservation?
All governance checks pass. The request is approved for forwarding to the target LLM API endpoint via the zkTLS module. No plaintext data ever touches persistent storage.
Step 2.3: zkTLS Routing
The TEE Node opens a zkTLS session with api.openai.com. It forwards the prompt, receives the response within the secure enclave boundary.
Generates the cryptographic zkTLS receipt — a SNARK proof proving the API call occurred and cost $0.05. This receipt is tamper-proof and publicly verifiable.
Step 2.4: Attestation & Refund
├── Request Hash
├── zkTLS Receipt
└── Delta Spend ($0.05)
│
▼
Enclave signs bundle with hardware key
│
▼
L2 Sequencer deducts $0.05 from Escrow
│
▼
Remaining $1.95 instantly unlocked → returned to Agent balance
│
▼
Encrypted LLM response returned to Agent
| # | Action | Detail |
|---|---|---|
| 1 | Bundle Packaging | TEE Enclave packages Request Hash, zkTLS Receipt, Delta Spend ($0.05) into an Attestation Bundle. |
| 2 | Hardware Signing | Enclave signs the bundle with its hardware key. |
| 3 | Sequencer Settlement | Sequencer deducts $0.05 from Escrow, instantly unlocks remaining $1.95 to Agent balance. |
| 4 | Response Delivery | Encrypted LLM response is returned to the Agent. |
Sigma(r_i, i=1..n) ≤ B_max
Concurrency Guarantee: To ensure total budget B_max is never exceeded across N concurrent nodes, the system enforces that the sum of all active micro-reservations never exceeds the total budget. Where r_i is the reserved micro-budget on node i. Actual spend s_i replaces r_i upon settlement.
3. The Human-In-The-Loop (HITL) Lifecycle (The Slow Path)
Triggered when the TEE Enclave evaluates the mandate and hits an approval rule (e.g., "Any transaction over $500 requires human sign-off").
│
▼
Returns 402 Approval Pending to Agent
│
▼
Encrypted webhook → Enterprise SaaS Dashboard
│
▼
Compliance Officer reviews & clicks "Approve"
│
▼
Officer's machine signs Approval Token
│
▼
Agent re-submits + Approval Token → TEE verifies → Step 2.3
TEE Enclave pauses execution, generates Intent_ID, returns 402 Payment Required / Approval Pending to Agent.
Node fires encrypted webhook to Enterprise SaaS Dashboard with cost, payload summary, and tool details.
Compliance Officer reviews the Intent (cost, payload summary, tool) and clicks "Approve."
Officer's local machine signs an Approval Token.
Agent receives Approval Token, re-submits request to TEE Node with token attached. TEE verifies signature, proceeds to Step 2.3.
4. Settlement & Slashing Pipeline
The Execution Layer syncs with the Settlement Layer to finalize economics.
│
▼
Merkle Root posted to base layer (Ethereum/Base)
│
▼
Smart Contract releases USDC fees from Escrow
│
▼
Auto-buys SENTRY → routes to Node Operators
│
▼
Watcher Nodes challenge Merkle Root if fraud detected → auto-slash
Every 10 minutes, L2 Sequencer compresses all validated TEE Attestation Bundles into a Merkle Root.
Merkle Root posted to base layer (Ethereum/Base).
Smart Contract releases USDC fees from Escrow. Auto-buys SENTRY tokens, routes to Node Operators.
Watcher Nodes challenge Merkle Root. TEE signatures and zkTLS proofs are deterministic — any forged spend triggers auto-slash of Operator stake.
5. Reputation & Reputation Compounding
Once the block is finalized, the Reputation Oracle updates.
| Update | Effect |
|---|---|
| Agent Score | Agent's public profile updated to reflect another successful, compliant execution (e.g., "99.9% Compliance Rating over 10,000 calls"). |
| Operator Score | Node Operator's uptime and execution validity metrics increase, driving more traffic to their node. |
| Mandate Royalty | If enterprise used a third-party Mandate Template, the Royalty Engine triggers, sending a micro-fraction of the USDC fee to the template author's wallet. |
The Compounding Defensibility: Every execution cycle strengthens the network. Agent scores increase, attracting more enterprise customers. Operator scores improve, attracting more node operators. Template royalties incentivize better governance design. Competitors can fork the code, but never the verified execution history.
Network Architecture
High-throughput TEE mesh topology, intent-based routing, parallel budget channels, and fault-tolerant failover mechanics for the SentryMandate decentralized network.
This section proves: MAX_ROUTING_SHARE == 15% prevents any single operator from monopolizing the network (Invariant VI.1), while VDF-based blind routing prevents targeted bribery.
1. Network Topology (The 3-Node Architecture)
SentryMandate relies on a separation of concerns to maintain high throughput and strict security across a permissionless set of TEE-secured operators.
1.1 TEE Proxy Node (The Execution Layer)
Role: The heavy lifters. They run the Enclave, evaluate mandates, execute zkTLS connections to LLMs, and generate cryptographic Attestation Bundles.
Hardware: Must be a verifiable Trusted Execution Environment (AWS Nitro, Intel SGX).
Identity: Node identity is bound to its operator_pubkey AND the PCR_Measurement (the cryptographic hash proving it is running unmodified SentryMandate code).
1.2 Sequencer / Router Node (The Matching Layer)
Role: High-availability relayers that act as the network's "front door."
Function: They ingest Agent Intents, match them to the best available TEE Proxy Node based on latency and SLA, and manage the underlying State Channels to prevent double-spending.
| Phase | Governance |
|---|---|
| Phase 1 | Operated centrally by SentryMandate. |
| Phase 3 | Decentralized via a lightweight consensus mechanism (e.g., Tendermint/CometBFT). |
1.3 Watcher Node (The Audit Layer)
Role: Independent cryptographic auditors.
Function: They do not read payloads or recompute policy decisions (which breaks privacy). Instead, they verify the TEE signatures, validate the zkTLS SNARK proofs, and challenge the Merkle Roots submitted by Operators.
2. Intent-Based Routing & Discovery
Agents do not waste compute cycles tracking node uptime. They utilize Execution Intents.
2.1 The Routing Lifecycle
│
▼
Sequencer matches to optimal TEE Node
│
▼
Sequencer facilitates encrypted P2P WebSocket handshake
│
▼
Agent ←── direct connection ──→ TEE Enclave
Agent broadcasts an Intent to the Sequencer: "I need to route a request to OpenAI. My mandate hash is X. I need a node with <50ms latency."
Sequencer checks its real-time active routing set. It selects Operator_Node_7 based on current ping, stake weight, and capability.
Sequencer passes routing information to the Agent and the Node, facilitating a direct, encrypted peer-to-peer websocket connection between the Agent and the TEE Enclave.
2.2 Capability Advertisement (Off-Chain)
Operators continuously stream their capabilities to the Sequencers:
| Capability | Example |
|---|---|
| Supported Providers | Anthropic, OpenAI, custom internal APIs |
| Region | us-east-1 to minimize latency to specific API endpoints |
| Current Load | Available concurrent connections |
3. The Parallel Budget Mesh (Solving Concurrency)
To achieve horizontal scalability, the network uses mathematical state channels instead of database locks.
3.1 Splitting the Budget
If an Agent has a total daily budget of B_max = $100, and needs to make n concurrent requests, the Sequencer issues cryptographic micro-reservation tokens (r) to multiple TEE Nodes simultaneously.
The network mathematically guarantees that the sum of all active reservations across all nodes never exceeds the total budget.
Sigma(r_i, i=1..n) ≤ B_max
3.2 The Micro-Reservation Flow
│
▼
Sequencer locks $10 (5 x $2 reservations) in L2 Escrow
│
▼
Sequencer issues 5 Lock Tokens → 5 TEE Nodes
│
▼
All 5 Nodes execute LLM calls in parallel
│
▼
Node 1 finishes — actual cost $0.05
│
▼
Attestation Bundle submitted → unused $1.95 unlocked
Agent needs to make 5 concurrent OpenAI calls.
Sequencer locks $10 (five $2 reservations) in the L2 Escrow.
Sequencer issues five distinct Lock Tokens to 5 different TEE Nodes.
The Nodes execute the LLM calls in parallel.
Node 1 finishes, actual cost was $0.05. It submits the Attestation Bundle.
Sequencer instantly unlocks the unused $1.95, returning it to the Agent's available liquidity pool.
4. Failover & Anti-Censorship Mechanics
If a TEE Proxy Node fails mid-request, the Agent must not lose its budget lock.
4.1 Ephemeral State Recovery
│
▼
Agent sends Cancel_Intent to Sequencer
│
▼
Sequencer gives Node 2-second grace period
│
├── Node produces valid AttestationBundle → Request completed
│
└── Node fails → Lock Token invalidated → Full refund to Agent
│
▼
Sequencer re-routes to fallback node
If the Agent does not receive the encrypted response from the TEE Node within the TTL (e.g., 15 seconds), it sends a Cancel_Intent to the Sequencer.
The Sequencer requires the TEE Node to produce a valid Attestation Bundle within a 2-second grace period. If the Node fails to produce the cryptographically signed spend record, the Sequencer invalidates the node's Lock Token and fully refunds the micro-reservation to the Agent.
The Sequencer instantly issues a new Lock Token and routes the Agent to a secondary fallback node.
4.2 Censorship Resistance
If an Operator repeatedly accepts Lock Tokens but fails to process the request (a "soft censorship" attack), Watcher Nodes will observe a high volume of Cancel_Intents associated with that operator_pubkey. This triggers an automatic SLA downgrade, drastically reducing the Operator's traffic weight and slashing their stake for unresponsiveness.
Assignment: VDF-randomized blind routing — clients cannot select operators (Invariant VI.1, VI.2)
5. Engineering Checklist (Architecture Execution)
Implementation modules and deliverables for the SentryMandate network architecture.
- Intent Mempool and matching engine
- State Channel manager (Micro-reservation locking/unlocking)
- WebSocket relay infrastructure
- Nitro Enclave / SGX image generation
- zkTLS client integration (e.g., TLSNotary)
- Ephemeral key generation and COSE signing logic
sentry-agent-sdk(Python/TypeScript)- Automatic Intent generation and fallback retry logic
- Local payload encryption before transmission to the TEE
Node Architecture Comparison Matrix
Detailed comparison of responsibilities, trust assumptions, and hardware requirements across all three node types in the SentryMandate network.
| Property | TEE Proxy Node | Sequencer / Router | Watcher Node |
|---|---|---|---|
| Primary Role | Execute mandates, zkTLS, attestations | Match intents, manage state channels | Audit, verify SNARKs, challenge fraud |
| Trust Model | Hardware-attested (TEE) | Centralized Ph1, decentralized Ph3 | Permissionless verification |
| Hardware | AWS Nitro / Intel SGX | HA server cluster | Standard compute |
| Staking | $10,000 min operator bond (slashable, 21-day unbonding) | Protocol-operated initially | Challenger Bond (10% base rate) |
| Revenue | 70% of 0.5% protocol fee per execution | Protocol fee share | 30-50% of slashed amount (bounties) |
| Data Access | Full payload (in enclave) | Metadata only | Signatures and proofs only |
VDF computation is not predictable before execution. Network latency between proxy nodes and LLM providers remains within 200ms. L2 Sequencer randomization seed is verifiable.
Clients cannot select specific operators (Blind Routing, Invariant VI.2). No single operator handles >15% of global volume per epoch (Anti-Monopoly Ceiling, Invariant VI.1). Assignment is VDF-randomized, not reputation-weighted.
L2 Sequencer enforces MAX_ROUTING_SHARE == 15% algorithmically — excess routing triggers automatic queue removal until next epoch. VDF proofs are submitted on-chain for audit.
Single cloud provider operates 50% of nodes, creating centralization risk and single point of failure.
MAX_ROUTING_SHARE == 15% (Invariant VI.1). Any operator exceeding 15% of global epoch volume is algorithmically removed from the matching queue until the next epoch.
Enterprise bribes specific operator for preferential treatment or data exfiltration.
Cryptographic Blind Routing (Invariant VI.2): VDF-based randomized assignment. Clients cannot deterministically select operators. Bribery requires corrupting the entire matching algorithm.
Routing Protocol Reference
message ExecutionIntent { string agent_id = 1; string mandate_hash = 2; string target_provider= 3; uint32 max_latency_ms = 4; string region = 5; bytes agent_sig = 6; } message CancelIntent { string lock_id = 1; string agent_id = 2; string reason = 3; bytes sig = 4; }
Architecture Guarantee: This architecture guarantees millisecond latency, parallel execution, and cryptographic integrity across a permissionless set of TEE-secured operators. The separation of concerns between TEE Proxy, Sequencer, and Watcher Nodes ensures that no single component can unilaterally compromise the system's security, availability, or economic guarantees. The intent-based routing model eliminates the need for agents to maintain complex node registries, while the parallel budget mesh enables true horizontal scalability without sacrificing budget integrity.
Deterministic Reputation Engine
The compounding non-forkable execution history of SentryMandate — transforming cryptographically verified TEE/zkTLS evidence into non-forkable, mathematically sound Trust Oracles for agents, operators, and mandates.
This section proves: the Global Sentry Score is a view function derived from immutable on-chain history — it cannot be manually edited, purchased, or governance-voted (Invariant IV.1).
1. The Dual-Axis Reputation Paradigm
If you group all behavior into a single average, the data becomes useless. A true Trust Oracle must measure two distinct vectors.
| Axis | Measures | Key Questions |
|---|---|---|
| Character Score | Strict adherence to the Mandate | Did the agent try to overspend? Did it try to access denied tools? Did it attempt a prompt injection to bypass governance? |
| Competence Score | Operational excellence | Did the API call succeed? Was the latency low? Did the agent avoid 4xx/5xx errors? |
A liability — the agent efficiently executes unauthorized actions. It never crashes, but it constantly violates governance rules, overspends budgets, and accesses forbidden tools.
Useless — the agent never breaks rules but constantly crashes, times out, and generates errors. It is fully compliant but operationally worthless to the enterprise.
2. Agent Reputation Math (Sybil & Exploit Resistant)
2.1 Solving the Cold Start & Sybil Farming Problem
If a new agent spawns with a perfect 100% reputation, attackers will constantly spin up new IDs, burn through their budgets via mandate violations, and discard them. Furthermore, if you only count the number of transactions, an attacker could make 10,000 micro-calls of $0.001 to wash out a single $5,000 violation.
We use a Bayesian Confidence Model weighted by Fiat Volume. New agents start with an "Unknown" score. They must earn their way up by processing real, high-value, compliant transactions over time. This eliminates both Sybil farming (new IDs start low) and volume washing (micro-calls contribute negligible weight).
2.2 Character Score Formula
We use Alpha and Beta constants (set by governance) to represent the network's initial skepticism of a new, unknown agent.
// Variables V_compliant = Total fiat dollar volume of all compliant, successful spend V_violation = Total fiat dollar volume of all blocked/attempted violations Alpha = Network prior for success (e.g., 100) Beta = Network prior for failure (e.g., 500) // Formula Character_Score = (V_compliant + Alpha) / (V_compliant + V_violation + Alpha + Beta)
Character_Score = (V_compliant + Alpha) / (V_compliant + V_violation + Alpha + Beta)
Result: A brand new agent with $0 spend starts with a mathematically low score (100/600 = 0.16). As the agent successfully processes $10,000 in compliant volume, the constants are washed out, and the score asymptotically approaches 0.99.
2.3 Competence Score Formula
Competence uses an exponential time-decay model. Recent API failures hurt the agent, but if the developer patches the agent's code, historic errors fade away.
// Variables C_success = Count of successful zkTLS execution receipts C_fail = Count of 4xx/5xx errors or timeouts Decay_Factor = Weighting that prioritizes recent epochs over historic // Formula Competence_Score = Sum(C_success * Decay_Factor) / Sum((C_success + C_fail) * Decay_Factor)
Competence_Score = Sum(C_success * Decay) / Sum((C_success + C_fail) * Decay)
2.4 Global Sentry Score
The final metric used for enterprise gating. If either Character or Competence drops, the Global Score drops.
Global_Sentry_Score = Character_Score * Competence_Score
3. Operator Reputation (The Routing Engine)
Operator reputation dictates how the L2 Sequencer routes traffic. If an operator's score drops, they are starved of traffic, resulting in zero fee generation.
| Metric | Description |
|---|---|
| Uptime_Ratio | Percentage of successful heartbeat responses. |
| Commitment_Timeliness | Percentage of Merkle evidence roots posted to the blockchain before the epoch deadline. |
| Equivocation_Rate | Confirmed slashing events (e.g., forged logs) divided by total requests. |
Operator_Score = Uptime_Ratio * Commitment_Timeliness * (1 - Equivocation_Rate)
Because of the (1 - Equivocation_Rate) multiplier, if an operator is caught forging a single log and slashed, their score is permanently crippled, effectively banning the node from the active routing set.
4. Mandate Template Reputation
Compliance templates created by AI Governance Architects are economic assets. Their reputation dictates their ranking in the Marketplace.
// Variables Adoption_Count = Number of unique enterprise subnets using the template Violation_Rate = Percentage of calls under this mandate that resulted in a violation Dispute_Rate = Frequency of human-in-the-loop dispute escalations Certification_Weight = Multiplier applied if audited by a recognized security firm // Formula Template_Score = (Adoption_Count_Weight) + (1 - Violation_Rate) + (1 - Dispute_Rate) * Certification_Weight
Template_Score = (Adoption_Count_Weight) + (1 - Violation_Rate) + (1 - Dispute_Rate) * Certification_Weight
5. Enterprise API & Insurance Integration
5.1 The Gating Payload
When an enterprise or a smart contract queries the Reputation Oracle, it returns a deterministic, verifiable JSON payload.
{
"agent_id": "0x1234abcd...",
"global_sentry_score": 0.985,
"tier": "AAA",
"metrics": {
"character_score": 0.999,
"competence_score": 0.971,
"lifetime_governed_spend": 45200.50,
"attempted_violations": 2
},
"insurance_eligibility": {
"status": "ELIGIBLE"
}
}
5.2 Dynamic Insurance Pricing
Because the Reputation Engine is fully deterministic, it serves as the exact pricing oracle for the network's Insurance Risk Pools. When an enterprise purchases a $10,000 Overspend Guarantee for their agent, the premium is dynamically priced by the smart contract.
// Variables Base_Rate = Protocol baseline insurance fee (e.g., 1%) Coverage_Amount = Total fiat dollar guarantee (e.g., $10,000) Global_Sentry_Score = Agent's current trust score (e.g., 0.80) // Formula Insurance_Premium = Base_Rate * Coverage_Amount * (2 - Global_Sentry_Score)
Insurance_Premium = Base_Rate * Coverage_Amount * (2 - Global_Sentry_Score)
| Agent Tier | Score | Premium Effect |
|---|---|---|
| AAA | 1.0 | Premium multiplier is 1x (standard). |
| B | 0.75 | Premium spikes by 25%. |
| Below C | < 0.60 | Smart contract automatically denies coverage. |
6. Reputation Invariants & The Reputation Invariants
The three immutable rules governing the SentryMandate reputation system and the non-forkable historical ledger they establish.
| Invariant | Rule |
|---|---|
| Immutability | Reputation state is a derived view of the underlying TEE/zkTLS evidence log. It cannot be manually edited by an admin, only recomputed from the blockchain. |
| Inheritance | Sub-agents spawned by a master orchestrator can "borrow" the parent's Character Score for 7 days by locking a portion of the parent's staked collateral. |
| The Non-Forkable History | Competitors can fork SentryMandate's open-source code, but they cannot fork 2 years of cryptographically verified, successful enterprise AI execution history. The reputation ledger is the network's core asset. |
Reputation state is a derived view of the underlying TEE/zkTLS evidence log. No administrator, governance vote, or protocol upgrade can manually edit a score. The only way to change reputation is to recompute it from the immutable on-chain evidence trail. This ensures that trust is always grounded in verifiable cryptographic proof, never subjective human judgment.
Sub-agents spawned by a master orchestrator can "borrow" the parent's Character Score for 7 days by locking a portion of the parent's staked collateral. This enables enterprise orchestration patterns where a master agent spawns specialized workers without each worker starting from the cold-start baseline of 0.16.
Competitors can fork SentryMandate's open-source code, but they cannot fork 2 years of cryptographically verified, successful enterprise AI execution history. The reputation ledger is the network's core non-forkable asset — a compounding technical advantage that grows stronger with every successful governed execution.
Character Score Growth Simulation
Demonstrating how the Bayesian model evolves from cold start to AAA tier with Alpha=100 and Beta=500.
| V_compliant ($) | V_violation ($) | Character Score | Tier |
|---|---|---|---|
| $0 | $0 | 0.167 | Unknown |
| $500 | $0 | 0.545 | C |
| $1,000 | $0 | 0.688 | B |
| $5,000 | $0 | 0.911 | A |
| $10,000 | $0 | 0.953 | AAA |
| $50,000 | $0 | 0.990 | AAA |
| $10,000 | $5,000 | 0.648 | Below C |
The Reputation Invariants: This engine powers the economic layer of autonomous agents, enabling programmable wallets, insurance underwriting, and enterprise gating. It is completely resistant to Sybil attacks, "cold start" exploits, and volume farming. The reputation ledger is the network's core non-forkable asset — every execution cycle strengthens protocol defensibility further.
Dual-Tranche Insurance Engine
Cryptographically proven slashing events become automated dollar-denominated payouts for enterprise clients via Dual-Tranche capital, dynamic utilization curves, and systemic risk limiters.
This section proves: Dual-Tranche architecture insulates SENTRY token price from enterprise claim events. MAX_EPOCH_DRAWDOWN == 20% prevents bank runs (Invariant III.3).
1. The Dual-Tranche Capital Structure
The Insurance Pool separates network security from enterprise fiat remediation via two distinct capital tranches.
| Property | Detail |
|---|---|
| Asset | USDC (Stablecoins) |
| Capital Providers | DeFi Liquidity Providers (LPs) and SentryMandate protocol revenue |
| Purpose | Pays out approved claims to Enterprises in stable, dollar-denominated value |
| Yield | LPs earn a baseline APY funded directly by the insurance premiums paid by the enterprises |
| Property | Detail |
|---|---|
| Asset | Staked SENTRY tokens |
| Capital Providers | Node Operators |
| Purpose | Absorbs the immediate penalty of an operator failure (e.g., forged logs, downtime). Slashed tokens are liquidated into USDC to backfill the Senior Tranche, protecting the LPs from bearing the brunt of localized operator errors. |
2. Dynamic Premium Calculation
Premiums are dynamically calculated per agent based on Reputation Score (Risk) and Pool Utilization (Capital Scarcity).
The smart contract tracks how much capital is actively underwriting risk versus sitting idle.
Low utilization means cheap premiums. Above optimal, exponential multiplier cools demand and attracts USDC.
If utilization is low (plenty of capital), premiums are cheap. If utilization crosses the optimal threshold (e.g., 80%), the system applies an exponential multiplier to premiums. This makes new policies expensive, simultaneously cooling down demand and generating high yield to attract new USDC deposits.
// Variable Definitions U = Current Utilization Ratio U_optimal = Target Utilization (0.80) Curve_Steepness = Governance parameter (e.g., 4) Risk_Multiplier = (2 - Global_Sentry_Score) // From the Reputation Engine output // Score = 1.0 (perfect) to 0.0 (blacklisted) Formula: Dynamic_Premium = Coverage_Amount * Base_Rate * Risk_Multiplier * (1 + (U / U_optimal)^Curve_Steepness)
Premium scaling across agent quality levels and pool stress conditions:
| Agent Rating | Reputation Score | Coverage Amount | Pool Utilization | Pool State | Approx. Premium |
|---|---|---|---|---|---|
| AAA-rated | 1.0 | $50,000 | U = 0.50 | Healthy | ~$100/month |
| B-rated | 0.75 | $50,000 | U = 0.90 | Stressed | $400+/month |
The 4x premium differential creates a powerful incentive for operators to maintain impeccable behavior.
3. The Claims Adjudication Pipeline
Class A Claims (Integrity Violations) are fully deterministic via TEEs and zkTLS, requiring zero human arbitration.
|
v
Smart Contract evaluates TEE Attestation Bundle
|
+--- Signature forged OR zkTLS proves overspend
| ---> Claim AUTO-APPROVED
v
Junior Tranche: Operator instantly slashed
(SENTRY burned/sold for USDC)
|
v
Senior Tranche: USDC payout transferred
to Enterprise treasury wallet
A Watcher Node or Enterprise submits cryptographic proof the agent exceeded its mandate limit.
Smart contract evaluates the TEE Attestation Bundle. Forged signature or zkTLS overspend proof triggers auto-approval.
Responsible operator instantly slashed. SENTRY burned or sold for USDC from Junior Tranche first-loss capital.
Exact USDC loss amount (up to policy limit) transferred to Enterprise treasury from Senior Tranche.
For subjective claims (e.g., "The operator leaked our API key outside the enclave"), the enterprise submits to the SentryMandate DAO Arbitration Panel, staking a small bond to prevent spam. Approved claims pay out via the same Senior Tranche pipeline.
|
v
DAO Arbitration Panel reviews evidence
|
+--- Panel votes APPROVE ---> Senior Tranche Payout
|
+--- Panel votes DENY ---> Bond forfeited (spam prevention)
4. Systemic Risk Controls
Protection against correlated failures via epoch-based settlement and mandatory deductibles.
Claims batch into 24-hour epochs with a Maximum Drawdown Limit (20% of total USDC pool per epoch).
Black Swan Scenario: A catastrophic event triggers $5,000,000 in claims in a single day, but the 20% drawdown limit on a $10M pool is only $2,000,000.
- The system does not go bankrupt under any single-epoch stress event
- The $2,000,000 available is distributed pro-rata among all affected enterprises proportionally to their verified losses
- The remaining $3,000,000 in claim balances are rolled into the next epoch or covered by emergency treasury reserves
All policies enforce a strict 5% deductible. The enterprise absorbs the first 5% of any verified loss.
The 5% deductible serves three critical functions:
- Moral Hazard Reduction: Enterprises cannot treat insurance as a free pass to skip internal safeguards
- Claims Volume Control: Small, nuisance claims are absorbed by the enterprise, reducing pipeline congestion
- Capital Efficiency: The 5% buffer preserves pool solvency during periods of elevated claim frequency
MAX_EPOCH_DRAWDOWN == 20% → max 20% of USDC reserves disbursable per 24-hour epoch (Invariant III.3)
Claims paid in USDC (Senior Tranche) | Slashed SENTRY liquidated to USDC before application (Invariant III.1)
5. The Economic Feedback Loop
The integration of Evidence, Slashing, Reputation, and Insurance creates a self-healing economic loop. Each component reinforces the others, making the system progressively more robust over time.
|
v
TEE Evidence proves violation cryptographically
(zkTLS receipts + Attestation Bundles)
|
v
Operator SENTRY is slashed (Junior Tranche absorbs loss)
|
v
Enterprise is made whole in USDC (Senior Tranche payout)
|
v
Agent's Reputation Score permanently drops
(Reputation Engine recalculates)
|
v
Agent's future Insurance Premiums mathematically spike
(Interest Rate Curve formula recalculates)
|
v
High premiums increase LP yield
(Attracting new liquidity providers)
|
v
More LPs deposit USDC ---> expanding total underwriting capacity
|
v
(Cycle repeats — each iteration strengthens the entire system)
USDC maintains its peg. DeFi LP deposits in Senior Tranche are sufficient to cover maximum epoch liability. Reputation Engine pricing model accurately reflects agent risk.
Enterprise claims are paid exclusively in USDC (Senior Tranche). Slashed SENTRY (Junior Tranche) is liquidated to USDC before application. The two tranches are structurally isolated — token price crashes cannot bankrupt enterprise coverage.
InsurancePool.sol enforces MIN_RESERVE_RATIO == 1.25 (Invariant III.2). MAX_EPOCH_DRAWDOWN == 20% limits single-epoch payouts (Invariant III.3). Policy issuance auto-pauses if ratio drops to 1.24.
Zero-day agent framework exploit triggers 5,000 simultaneous insurance claims, draining the pool.
MAX_EPOCH_DRAWDOWN == 20% (Invariant III.3). Protocol cannot disburse >20% of USDC reserves in a single 24-hour epoch. Excess claims are strictly pro-rata.
SENTRY token price crashes 90%, depleting Junior Tranche collateral.
Dual-Tranche isolation (Invariant III.1): Enterprise claims are paid from Senior Tranche (USDC only). Junior Tranche absorbs operator-specific slashing only. Token volatility cannot reach enterprise coverage.
The Insurance Engine transforms SentryMandate from a monitoring protocol into a full enterprise-grade guarantee system. Dual-Tranche isolation, actuarial pricing, automated claims, epoch-based risk controls, and the self-reinforcing feedback loop create a resilient system that grows stronger with each claim processed.
Complete Value & Token Movement Map
How smart contracts route USDC and SENTRY across five distinct flow paths, maintaining token supply reduction and operator incentive alignment.
This section proves: the 70/20/10 fee split (Operators/Insurance/Treasury) creates a self-sustaining economic loop where Burned > Emitted at target volume (Invariant VII.2).
1. The Asset Primitives
Asset isolation by function avoids regulatory friction and preserves capital efficiency.
| Asset | Used By | Function |
|---|---|---|
| USDC (Stablecoins / Fiat) | Enterprises | SaaS fees, API routing budgets, Insurance Premiums, and Mandate Marketplace purchases. Enterprises never hold volatile tokens. |
| SENTRY (Protocol Token) | Node Operators & Watchers | Staking, Security (Slashing), Governance, and capturing the economic output of the network. |
2. Flow A: Core Execution (Buy-and-Distribute)
The primary heartbeat: enterprise funds paying for governed AI routing.
Trigger: Enterprise spends $100.00 on OpenAI calls. Network charges 0.5% tax ($0.50).
|
v
Protocol charges 0.5% fee → $0.50 USDC enters FeeRouter contract
|
v
FeeRouter executes market buy on DEX (Uniswap)
$0.50 USDC → SENTRY at current market price
|
v
Purchased SENTRY sent to RewardsModule and split:
|
+-- 70% → Active Node Operators (pro-rata by zkTLS receipts)
+-- 20% → Burned (sent to 0x000...dead address)
+-- 10% → DAO Treasury (protocol R&D)
Let F = Total SENTRY purchased via network usage fees. F_ops (70%) -> Routed to active Node Operators (pro-rata based on successful zkTLS receipts). F_burn (20%) -> Sent to the dead address (0x000...) to permanently deflate supply. F_tres (10%) -> Routed to the DAO Treasury for protocol R&D.
Distribution: 70% → Active Operators (Buy-and-Distribute) | 20% → Insurance Reserve (USDC) | 10% → Protocol Treasury
Deflationary_Target: Tokens_Burned_via_Fees + Tokens_Burned_via_Slashing > Tokens_Emitted (Invariant VII.2)
3. Flow B: Staking & Slashing (Security Engine)
Operators must stake a minimum of $10,000 in SENTRY (21-day unbonding) to route enterprise traffic. Slashing: 0.1% downtime, 5% mandate violation, 100% forgery/equivocation.
Trigger: DevOps firm runs TEE Proxy Node. Stake: $10,000 SENTRY into OperatorRegistry.
|
v
Smart contract verifies proof → instantly slashes Operator stake
|
+-- 20% → Rewarded to the Watcher (fraud proof submitter)
+-- 30% → Sold on DEX for USDC → Insurance Pool
+-- 50% → Burned permanently
Let S = Total SENTRY slashed from the malicious operator. S_chal (20%) -> Rewarded to the Watcher who submitted the valid fraud proof. S_sell (30%) -> Sold on a DEX for USDC and sent to the Insurance Pool to cover enterprise loss. S_burn (50%) -> Burned permanently to penalize the attacker and enrich the remaining network.
4. Flow C: Insurance Engine (Dual-Tranche Capital)
Separate opt-in product capitalized by decentralized LPs.
Trigger: Enterprise buys a $50,000 overspend guarantee. Premium: $200/month in USDC.
|
+-- 80% → Yield paid to Liquidity Providers (LPs)
+-- 20% → Protocol Treasury
Let P = Total USDC Premium paid by the enterprise. P_uw (80%) -> Yield paid out to the Liquidity Providers (LPs) who deposited USDC to back the pool. P_tres (20%) -> Routed to the Protocol Treasury.
Loss verified by DisputeModule. InsurancePool releases exact USDC loss to Enterprise wallet.
The InsurancePool is continuously backfilled by the S_sell mechanism from slashed operators, protecting the LPs from taking the full hit.
5. Flow D: Mandate Marketplace (IP Royalties)
Governance Architects write Mandate Templates minted as on-chain IP.
Trigger: Enterprise licenses "HIPAA-Compliant Healthcare" template. Fee: $500 USDC.
|
+-- 85% → Mandate Author's wallet (USDC)
+-- 15% → FeeRouter → market-buy SENTRY → Operators/Burn (feeds Flow A)
Let M = Total USDC paid for the Mandate license. M_auth (85%) -> Routed directly to the Mandate Author's wallet in USDC. M_buy (15%) -> Routed to the FeeRouter to market-buy SENTRY and distribute to Operators/Burn (feeding the Core Execution Flow).
6. Flow E: Network Bootstrapping (Emissions)
Decaying emissions ensure operator profitability before volume.
Trigger: New epoch finalized on L2 sequencer. EmissionsDistributor mints SENTRY.
Let E = Epoch Emission of newly minted SENTRY. E_ops (100%) -> Routed to the RewardsModule to subsidize Operator yields.
As time goes on, E decays toward zero, and the system relies entirely on the Buy-and-Distribute F_ops from Flow A.
7. Global Parameter Matrix (v1.0 Constants)
Smart contract parameters at launch. Modifiable only via DAO vote with 14-day timelock.
| Parameter | Meaning | Value / Split | Asset |
|---|---|---|---|
| protocol_fee_rate | Base routing tax on governed spend | 0.5% | USDC → SENTRY |
| fee_split_ops | Fee share used to buy SENTRY for operators | 70% | SENTRY |
| fee_split_burn | Fee share used to buy and burn SENTRY | 20% | SENTRY |
| fee_split_tres | Fee share used to fund the DAO treasury | 10% | SENTRY |
| min_operator_stake | Minimum bond to run a TEE Proxy node | $10,000 eq | SENTRY |
| slash_split_chal | Slashed tokens rewarded to the Watcher | 20% | SENTRY |
| slash_split_ins | Slashed tokens sold to backfill Insurance | 30% | USDC |
| slash_split_burn | Slashed tokens permanently destroyed | 50% | SENTRY |
| market_split_auth | Royalties paid to Mandate creators | 85% | USDC |
| premium_split_uw | Insurance premiums paid to LPs | 80% | USDC |
8. Summary of the Economic Engine
Integrated value circulation path.
|
v
Protocol auto-buys SENTRY off the market
(constant, volume-driven demand)
|
v
SENTRY paid to Operators (subsidize server costs)
OR burned (deflationary pressure)
|
v
Operators forced to stake SENTRY (removed from circulation)
|
v
Operator survival tied to flawless enterprise execution
|
v
More volume → more buys → more burns → more scarcity
→ more value → more operators → more capacity → MORE VOLUME
Enterprises pay in stable Fiat/USDC. No volatile tokens, no wallets, pure SaaS billing.
The protocol auto-buys SENTRY off the market, creating constant volume-driven demand scaling with adoption.
SENTRY is paid to Operators or burned. Every transaction permanently removes supply.
Operators stake SENTRY, tying financial survival to flawless enterprise execution.
Operator Node Specification
Strict executable contract between Protocol, Operators, Watchers, and Orchestrators. TEE & zkTLS hardened.
This section proves: every operator node boots an identical, auditable enclave image. PCR0 attestation is verified on-chain before any routing eligibility (Invariant I.1).
1. Node Identity & Hardware Root of Trust
Hardware-backed TEEs are mandatory. No standard cloud instances.
When a SentryMandate Node boots, it MUST execute these three steps in order:
Launch the official SentryEnclave.eif image inside the TEE.
Generate unique ephemeral enclave_keypair (secp256k1) within isolated enclave memory.
Generate Attestation Document signed by AWS Nitro Hypervisor with enclave_pubkey and PCR measurements.
The operator binds staked tokens to the Enclave's identity via the smart contract:
{
"operator_wallet": "0xABC...",
"enclave_pubkey": "0xDEF...",
"pcr_0_measurement": "hash_of_sentry_binary",
"stake_amount": 10000,
"status": "ACTIVE"
}
If the operator alters the code to bypass mandate checks, the PCR measurement will change, and the network will instantly reject the node.
2. Required Public APIs
All APIs exposed via TLS 1.3.
Capability & Key Exchange. Used by routing sequencers and agents to verify node health and fetch the encryption key.
{
"status": "READY",
"enclave_pubkey": "0xDEF...",
"supported_providers": [
"api.openai.com",
"api.anthropic.com"
],
"zkTLS_version": "TLSNotary_v1.2",
"current_epoch": 442
}
Core execution pipeline. Payload encrypted using enclave_pubkey.
{
"request_id": "UUID-1234",
"agent_id": "0xAGENT...",
"mandate_hash": "0xMANDATE...",
"lock_token": "0x[MicroReservation]",
"encrypted_payload": "base64(RSA-OAEP(...))"
}
{
"status": "SUCCESS",
"policy_decision": "ALLOW",
"delta_spend": 0.05,
"attestation_bundle_hash": "0xBUNDLE...",
"enclave_signature": "0x[Signed]"
}
3. Internal Enclave State Machine
Deterministic execution. Silent failures are slashable offenses.
|
If DENY → Halt + return Attestation
If ALLOW:
zkTLS_CONNECT → EXECUTE & METER → BUILD_BUNDLE → SIGN & FLUSH
|
v
RESPOND
| Step | Operation | Description |
|---|---|---|
| 1 | RECEIVE | Ingest the encrypted payload and the lock_token. |
| 2 | VERIFY_LOCK | Validate that the lock_token signature matches the Agent's public key and contains sufficient micro-budget. |
| 3 | DECRYPT | Unseal the payload entirely inside enclave memory. |
| 4 | EVALUATE_MANDATE | Check the decrypted intent against the mandate_hash rules. If DENY: halt and return Attestation. |
| 5 | zkTLS_CONNECT | Open a secure multiparty computation (MPC) connection to the LLM provider. |
| 6 | EXECUTE & METER | Send the prompt, receive the response, extract the exact total_cost from provider HTTP headers. |
| 7 | BUILD_BUNDLE | Construct the JSON Attestation Bundle: request_id, delta_spend, and the zkTLS receipt. |
| 8 | SIGN & FLUSH | Sign the bundle with enclave_privkey. Flush plaintext prompt and response from memory. |
| 9 | RESPOND | Return the encrypted LLM response and the signed bundle to the Agent. |
4. Evidence & Merkle Commitment
Nodes must prove their work to the L1 blockchain to earn SENTRY rewards.
Every Attestation Bundle is hashed and stored in an append-only log, forming the Merkle tree leaves.
Every 10 minutes (or as defined by governance), the Node MUST:
Compute the Merkle Root of all bundle_hashes generated in that epoch.
Sum the total delta_spend processed across all requests in the epoch.
Submit a commitEpoch() transaction to the SentryMandate Smart Contract.
Failure to submit the Merkle Root within the 60-second grace period triggers an automatic Class B (Liveness) slashing event.
5. Security & Isolation Requirements
Strict hardware isolation for insurance compatibility.
| Requirement | Rule |
|---|---|
| Zero Disk Persistence | The TEE must not have access to persistent disk storage. All sensitive data (prompts, API keys) must exist solely in volatile RAM. |
| Key Isolation | The human node operator must never be able to SSH into the running enclave or run memory dump commands. |
| Replay Protection | The node must cache processed request_ids in memory for the duration of the lock TTL to reject duplicate execution attempts. |
6. Conformance & Slashing Triggers
Immediate Class A (100%) slashing for cryptographic invariant violations.
| Invariant | Violation |
|---|---|
| Equivocation Invariant | Generating two validly signed Attestation Bundles with different delta_spend amounts for the exact same request_id. |
| zkTLS Invariant | Submitting an Attestation Bundle where the reported delta_spend does not mathematically match the cryptographic zkTLS receipt generated from the provider. |
| Mandate Bypass Invariant | Signing a policy_decision: ALLOW when the deterministic evaluation of the mandate rules explicitly dictates a DENY. |
Operators run unmodified SentryEnclave.eif images. AWS Nitro instance availability meets 99.9% SLA. Host OS cannot read enclave memory through side-channel attacks.
The operator controls the host OS but NOT the enclave. API keys, prompts, and responses exist only in encrypted enclave RAM. The operator cannot read, modify, or exfiltrate execution data. Any image modification changes PCR0, instantly stripping routing eligibility.
OperatorRegistry.sol verifies PCR0 on registration and periodically during operation. Minimum stake: $10,000 in SENTRY. 21-day unbonding ensures fraud proofs finalize before withdrawal. 0.1% downtime slash enforces liveness.
Adversarial Modeling & Incentive Stress Testing
We assume rational, highly capitalized, and coordinated adversaries. The goal: make misbehavior mathematically irrational.
This section proves: every identified attack vector has a quantified cost-of-attack that exceeds value-extractable, making rational exploitation unprofitable.
This document stress-tests the entire SentryMandate economic stack. We assume rational, highly capitalized, and coordinated adversaries. The goal is to establish strict mathematical invariants that guarantee misbehavior is economically irrational, and that the network remains solvent even under coordinated attack.
1. The Wash-Trading Exploit Emission Farming
An attacker controls both a heavily funded Enterprise Agent and a high-capacity Node Operator. The attacker routes millions of dummy AI requests to their own node. They pay the protocol routing fee in USDC, but farm disproportionate amounts of SENTRY token emissions, dumping them on the open market for a net profit.
The protocol dynamically adjusts emissions to ensure that wash trading operates at a mathematical loss. If token price spikes and E_tx momentarily exceeds the cost to execute a transaction, the protocol automatically scales back emissions for that epoch to restore the negative-sum invariant.
Variables: E_tx = Fiat value of the SENTRY emission reward for a single transaction. F_tx = Fiat protocol fee paid by the Agent. C_api = Actual cost of the LLM API call. Invariant (must ALWAYS hold): E_tx < F_tx + C_api
2. The zkTLS Ransomware Attack Data Withholding
A malicious Operator accepts a request, successfully evaluates the mandate, and pays the OpenAI API cost. The Operator receives the highly valuable LLM response (e.g., proprietary financial analysis). The Operator withholds the response from the Agent, demanding an out-of-band payment to release the data.
Encrypted Escrow: The Node cannot claim the Agent's micro-reservation payment directly. The Node must post the Attestation Bundle AND the encrypted LLM response payload to a temporary Data Availability (DA) layer.
Atomic Unlock: The smart contract verifies the payload is available on the DA layer before unlocking the USDC fee to the Node. If the Node withholds the data, the lock expires, the Node absorbs the OpenAI API cost as a pure loss, and the Agent is fully refunded.
3. The Insurance Drain Correlated Black Swans
A zero-day exploit is discovered in a widely used open-source Agent framework (e.g., LangChain). Thousands of agents are hijacked simultaneously and forced to overspend, bypassing their mandates. The attackers file thousands of legitimate insurance claims at the exact same moment to drain the Senior Tranche (USDC) liquidity pool.
Claims are batched into 24-hour settlement epochs with hardcoded maximum drawdown caps, ensuring the protocol survives even coordinated mass-claim events through pro-rata distribution.
| Mechanism | How It Works |
|---|---|
| Pro-Rata Batching | Claims are not processed synchronously. They are batched into 24-hour settlement epochs. |
| Maximum Drawdown Cap | The protocol hardcodes a maximum drawdown of 20% of the total USDC pool per epoch. |
| Shared Pain | If total verified claims exceed the 20% drawdown cap, the available funds are distributed pro-rata among the harmed enterprises. This prevents the first claimants from draining the pool and ensures the protocol survives to the next epoch. |
4. Reputation Poisoning & Sybil Agents Score Manipulation
A malicious enterprise competitor spins up thousands of Sybil agents. They route traffic to a specific, honest Node Operator, but intentionally format the payloads to fail or time out, artificially tanking the Operator's Competence Score and getting them chilled from the routing set.
The protocol uses minimum spend floors and economic staking to make Sybil-based reputation poisoning prohibitively expensive.
| Defense | Mechanism |
|---|---|
| The Minimum Spend Floor | Failed requests or disputes from an Agent with less than $500 in lifetime compliant spend carry a weight of exactly zero against an Operator's score. |
| Economic Staking for Claims | To file a dispute or impact a Node's reputation, the Agent must post a Challenger Bond in SENTRY. If the dispute is proven to be frivolous spam, the bond is 100% burned. Sybil attacks become prohibitively expensive. |
5. The 51% Governance Cartel Too Big To Slash
A cartel of large infrastructure providers accumulates 51% of the circulating SENTRY token supply. They pass a malicious DAO proposal to reduce the Slashing Penalty for forged logs from 100% to 0%. They then proceed to forge logs and steal enterprise funds without economic consequence.
Quadratic voting and a Security Veto Council combine to render cartel governance capture mathematically futile.
| Defense | Mechanism |
|---|---|
| Quadratic Voting | Token voting power does not scale linearly (1 token != 1 vote). It scales quadratically: votes = sqrt(tokens). This drastically reduces the power of concentrated holders and cartels. A whale with 51% supply only gets ~71% of the vote weight of a uniform distribution. |
| The Security Veto Council | A hardcoded multisig wallet — controlled by 7 publicly doxed, highly reputable AI and cryptography security researchers — holds a permanent veto over specific smart contract modules. The DAO can vote on emissions, treasury grants, and marketplace fees, but any change to SlashingModule.sol or InsurancePool.sol parameters must pass the DAO AND survive a 14-day timelock without being vetoed by the Council. |
6. Global Economic Invariants The Math That Must Hold
If the protocol is engineered correctly, these four conditions remain mathematically true under all network loads.
Accounting for 100% slash probability via TEE verification. Honest operators earn consistent, risk-free yield. Dishonest operators face certain economic destruction through automated slashing triggered by cryptographic proof mismatch.
Building a reputation sufficient to access the highest insurance tiers requires sustained, legitimate economic activity. The cost of farming this reputation always exceeds the maximum extractable value from a fraudulent claim.
The combined value of all staked SENTRY tokens and the USDC insurance pool must always exceed the total potential liability the protocol faces in any single epoch. This ensures the protocol can always make enterprises whole.
The total amount of SENTRY destroyed through slashing penalties and protocol fee burns must consistently exceed the amount of new SENTRY created through epoch rewards. This ensures the token supply is structurally deflationary.
// ============================================================ // GLOBAL ECONOMIC INVARIANTS — Must hold under ALL conditions // ============================================================ // INVARIANT 1: The Honesty Premium require( Yield_from_honest_routing > Expected_value_of_forging_logs, "INVARIANT_VIOLATED: Honesty must always be more profitable than fraud" ); // INVARIANT 2: The Sybil Cost require( Cost_to_acquire_AAA_Reputation > Value_of_max_Insurance_Claim_payout, "INVARIANT_VIOLATED: Reputation farming must never be profitable" ); // INVARIANT 3: The Solvency Floor require( Total_SENTRY_Staked + Total_USDC_in_Pool > Total_Active_Exposure, "INVARIANT_VIOLATED: Protocol must always remain solvent" ); // INVARIANT 4: The Deflationary Baseline require( SENTRY_Burned_Slashing + SENTRY_Burned_Fees > SENTRY_Emitted_Rewards, "INVARIANT_VIOLATED: Token supply must be structurally deflationary" ); // If ANY invariant is violated, the protocol enters EMERGENCY MODE: // - Emissions are halted // - Premium multiplier spikes to 10x // - Veto Council is alerted for manual intervention
Attack Vector Severity Summary
| Attack Vector | Severity | Defense Mechanism | Attacker Expected Outcome |
|---|---|---|---|
| Wash-Trading Exploit | CRITICAL | Negative-Sum Emission Invariant | Net financial loss per transaction |
| zkTLS Ransomware | CRITICAL | Atomic Settlement via DA Layer | Pure API cost loss + zero revenue |
| Insurance Drain | CRITICAL | Epoch Batching + 20% Drawdown Cap | Pro-rata payout, pool survives |
| Reputation Poisoning | HIGH | Spend Floor + Challenger Bonds | Bond burned, zero score impact |
| 51% Governance Cartel | CRITICAL | Quadratic Voting + Veto Council | Vote power diluted, veto blocks execution |
51% token cartel attempts to weaken slashing parameters via governance vote.
Security Veto Council: 5-of-7 multisig can reject any change to SlashingModule.sol or InsurancePool.sol (Invariant VII.1). Quadratic voting dilutes whale concentration. 14-day timelock provides community response window.
Operator and Watcher collude — operator commits fraud, Watcher stays silent for a bribe.
Randomized Overlapping Assignments: operator does not know how many Watchers are assigned. Bribing one Watcher is useless if 2 others are independently auditing the same bundle. Cost of bribing the entire pool exceeds value extractable.
By enforcing these invariants via immutable smart contracts, SentryMandate ensures that fraud, censorship, and systemic attacks are not just difficult — they are mathematically guaranteed to result in net financial losses for the attacker. Every vector has been stress-tested. Every defense has a formula. Every formula has an on-chain enforcement mechanism. The cost of corruption always towers over the profit from corruption, rendering adversarial behavior a dominated strategy across all game-theoretic equilibria examined in this analysis.
Mechanism Design Validation & Cryptoeconomic Stress Tests
We do not assume good actors. We assume highly capitalized, colluding adversaries operating during extreme macro-market volatility.
This section proves: honest operation is the dominant Nash equilibrium — no coalition of rational actors can profit by deviating from protocol rules.
The output of this simulation defines the Safe Parameter Envelope (SPE) — the exact mathematical bounds hardcoded into the SentryMandate smart contracts. We do not assume good actors. We assume highly capitalized, colluding adversaries operating during extreme macro-market volatility.
Preamble: The Three Critical Vulnerabilities
Before designing the simulation, three architectural vulnerabilities must be acknowledged and resolved.
Watcher Starvation Problem
The Free-Rider Paradox
The Flaw: TEEs and zkTLS make fraud near-impossible. If Operators behave perfectly, Watchers catch zero fraud. Watchers burn money on AWS costs for months with zero revenue, so they shut down. Once Watchers are gone, Operators realize nobody is looking, and the attacks begin.
The Fix: Protocol-Injected Honeypots. The protocol intentionally generates fake, mathematically flawed Attestation Bundles. The first Watcher to catch the intentional mistake receives a calibrated SENTRY reward. This guarantees Watchers are constantly paid to stay vigilant, even in a perfectly honest network.
Out-of-Band Collusion
The Bribe Vector
The Flaw: What if an Enterprise Agent wants to bypass a $1,000 spend limit? The Agent pings the Operator on Telegram: "I will send you $10,000 in Bitcoin directly if you alter the enclave code to approve my request."
The Fix: Cryptographic Blind Routing. Routing is handled by the L2 Sequencer using random verifiable delay functions (VDFs). The Agent cannot predict which Operator receives its request, making bribery mathematically irrational.
Static Environment Fallacy
Ignoring Reflexivity
The Flaw: Crypto networks do not die in a vacuum; they die due to external macro shocks. If Bitcoin crashes 40%, SENTRY will crash 60%. When SENTRY crashes, the dollar-value of Operator Stake crashes, making the Cost of Corruption cheaper than the Profit from Corruption.
The Fix: Chaos Engineering & Price Reflexivity. The simulation injects exogenous market shocks (price crashes, extreme L1 gas spikes) to ensure economic invariants hold even during a global market panic.
1. The Core Adversarial Profiles
We model bounded-rational, profit-maximizing actors equipped with infinite capital.
1.1 The Cartel Operator
| Property | Detail |
|---|---|
| Goal | Maximize extracted value through coordinated censorship, data withholding, or log equivocation. |
| Behaviors | Will spin up hundreds of Sybil nodes; will attempt to bribe Watchers; will collude with other operators to achieve >51% routing share. |
1.2 The Malicious Enterprise Agent
| Property | Detail |
|---|---|
| Goal | Bypass mandate spend limits or extract disallowed data from LLMs. |
| Behaviors | Will attempt out-of-band bribery of Operators; will attempt reputation farming via wash-trading; will orchestrate distributed Denial of Service (DDoS) on Watcher Nodes during an attack. |
1.3 The Lazy/Bribable Watcher
| Property | Detail |
|---|---|
| Goal | Maximize SENTRY rewards while minimizing AWS compute costs. |
| Behaviors | Will shut down servers if fraud is rare (starvation); will accept bribes from Cartel Operators to ignore specific invalid bundles. |
2. Solving the Watcher Starvation Paradox
To ensure the immune system of the network never powers down, the simulation models a Protocol-Injected Honeypot Mechanism.
Variables: Cost_Watcher = Monthly compute cost to run a Watcher Node. Reward_Honeypot = SENTRY bounty for catching the protocol's intentional mistake. Frequency_Honeypot = How often the protocol drops a fake bundle. Invariant (must hold in Simulation): (Reward_Honeypot * Frequency_Honeypot) > Cost_Watcher
3. The Bribe Mathematical Invariants
The simulation must prove that the Cost of Corruption (CoC) is always strictly greater than the Profit from Corruption (PfC), even when out-of-band bribery is utilized.
Variables: Value_Extracted = The fiat value the Agent gains by bypassing the mandate. Stake_Operator = The fiat value of the Operator's bonded SENTRY tokens. Bribe_Amount = The out-of-band payment from Agent to Operator. Conditions for an Attack to Occur: 1. Bribe_Amount > Stake_Operator // Operator demands enough to cover their slashed stake 2. Value_Extracted > Bribe_Amount // Agent must make a profit after paying the bribe The Strict Invariant the Simulation Must Prove: Stake_Operator > Value_Extracted
Because the routing is randomized by the Sequencer, an Agent cannot guarantee which Operator gets their request. To execute the attack, the Agent must bribe multiple Operators, exponentially increasing the Bribe_Amount and guaranteeing the attack operates at a net financial loss.
4. The Simulation Engines (The Stack)
We run four distinct simulation pipelines using Python (e.g., cadCAD or RadCAD frameworks).
Discrete-time simulation tracking the state of 1,000 Agents, 100 Operators, and 50 Watchers over 1,000,000 epochs. It tracks routing assignments, bundle generation, and localized slashing events.
We inject severe external market variables into the ABS environment to test protocol resilience under extreme conditions.
| Shock | Scenario | Key Question |
|---|---|---|
| -80% Price Crash | Fiat value of SENTRY drops 80% in 24 hours. | Does Stake_Operator drop so low that Value_Extracted becomes profitable? |
| Gas Spike | L1 Ethereum gas fees spike 10,000%. | Does it become too expensive for Watchers to submit fraud proofs? (Requires tuning the L2 rollup cadence). |
We randomize internal parameters across 10,000 parallel runs to locate the exact "breakpoints" where the system goes insolvent.
- Sweeping
Protocol_Feefrom 0.1% to 5.0% - Sweeping
Max_Insurance_Drawdownfrom 5% to 50%
The simulation must output a passing grade for all 8 scenarios listed below. Each scenario models a specific, realistic attack vector against the protocol.
5. The Red Team Scenarios (Exam Questions)
The simulation must output a passing grade for all 8 scenarios.
| ID | Scenario | Attack | Success Criteria |
|---|---|---|---|
| S1 | Sybil Wash Trade | Attacker spins up 100 Agents and 10 Operators and trades with themselves to farm SENTRY emissions. |
Protocol fee paid by attacker exceeds SENTRY emissions earned. |
| S2 | Coordinated Bank Run | 10% of all active AI agents trigger a maximum insurance claim in the same epoch. | Senior Tranche distributes pro-rata, reserve ratios do not hit zero, LP yield spikes to attract recapitalization. |
| S3 | Watcher DoS Attack | Cartel Operators launch a sustained DDoS against all Watcher IPs, then submit forged logs. | L2 Sequencer pauses epoch finality if Watcher quorum heartbeat drops below 50%. |
| S4 | Token Death Spiral | SENTRY price crashes 80%. |
Dynamic Premium multiplier spikes; routing paused for nodes whose fiat stake drops below $10,000 minimum. |
| S5 | Lazy Watcher | Watchers stop verifying zkTLS proofs to save compute. | Protocol-Injected Honeypot slashes lazy Watchers for failing to report the intentional fake bundle. |
| S6 | Malicious Template Upgrade | An author pushes a malicious update to an IP-NFT mandate. | Zero agents affected because migrations require explicit cryptographic opt-in signatures from enterprise orchestrator. |
| S7 | Governance Cartel Capture | A whale buys 51% of circulating token supply to reduce slashing penalties. | Quadratic Voting curve mathematically nullifies linear capital advantage; Veto Council blocks execution. |
| S8 | TEE Zero-Day Exploit | AWS Nitro Enclaves are fundamentally compromised globally. | Protocol initiates hard freeze via Veto Council, locking Insurance Pool until hardware patches applied. |
6. Simulation Outputs & The Safe Parameter Envelope (SPE)
The output of this simulation suite is the SPE Matrix, a hardcoded JSON file imported directly into the SentryMandate Smart Contracts upon deployment. The DAO is cryptographically forbidden from voting a parameter outside of its simulated safe bounds.
{
"protocol_fee_rate": {
"min_safe": 0.003,
"max_safe": 0.015,
"optimal": 0.005
},
"insurance_reserve_ratio": {
"min_safe_threshold": 1.25,
"lockdown_trigger": 1.05
},
"watcher_honeypot_frequency": {
"epochs_per_injection": 144
}
}
By rigorously simulating reflexivity, out-of-band bribery, and watcher starvation, SentryMandate transcends theoretical game theory and becomes mathematically provable, battle-tested infrastructure. The SPE ensures every on-chain constant is validated against adversarial conditions and macro shocks.
Public Testnet Design, Safety Controls & Launch Phases
This section validates the protocol across software, economic modeling, and hardware performance constraints — testing TEE latency, zkTLS proof generation, L2 micro-reservations, and Dual-Tranche Insurance resilience.
This section proves: five Mainnet Exit Gates must pass on the Crucible testnet before genesis — no gate can be skipped or governance-overridden.
1. The 3-Phase Network Rollout
Core Protocol Engineering Team only. Local EVM forks combined with local AWS Nitro Enclave simulators. Chain is reset daily.
20 Allowlisted DevOps firms, 5 Allowlisted Watcher operators, and internal QA Agents. Public EVM Testnet (Sepolia). Shadow Slashing.
Public. Anyone with Testnet SENTRY can spin up a node. Red Team hackers incentivized via bug bounties. LIVE slashing. Break the cryptoeconomics.
Phase 0: Forge — Internal Devnet
| Property | Detail |
|---|---|
| Audience | Core Protocol Engineering Team only. |
| Environment | Local EVM forks (e.g., Anvil/Hardhat) combined with local AWS Nitro Enclave simulators. |
| Objective | Validate smart contract determinism, TEE boot sequencing, and basic zkTLS mock-proof generation. |
| State | Highly volatile. The chain is reset daily. |
Phase 1: Vanguard — Permissioned Alpha
| Property | Detail |
|---|---|
| Audience | 20 Allowlisted DevOps firms, 5 Allowlisted Watcher operators, and internal QA Agents. |
| Environment | Public EVM Testnet (e.g., Sepolia or Base Sepolia). |
| Objective | Test multi-node routing, SentryMandate micro-reservations, and network liveness under real-world internet latency. |
| Slashing | Shadow Mode — Calculated and logged, but testnet stake is not actually burned. |
Phase 2: Crucible — Permissionless Beta
| Property | Detail |
|---|---|
| Audience | Public. Anyone with Testnet SENTRY can spin up a node. Red Team hackers heavily incentivized via bug bounties. |
| Environment | Persistent Public EVM Testnet. |
| Objective | Break the cryptoeconomics. Test Dual-Tranche insurance pool, live slashing, and the Watcher honeypot mechanism. |
| Slashing | Live. Malicious nodes are aggressively slashed and jailed. |
2. Hardware & Cryptographic Pre-Requisites
Unlike standard Web3 protocols, SentryMandate cannot be tested on standard hardware.
To join the OperatorRegistry in Vanguard or Crucible, the Operator MUST submit a cryptographic Attestation Document.
- Smart contract verifies signature matches the AWS Root Certificate
- Smart contract verifies
PCR0measurement matches the approved, open-sourceSentryEnclave.eiftestnet image
We do not want Testnet operators burning real fiat on OpenAI API calls.
- Core team hosts
mock.api.openai.comserver - Server accepts prompts, waits 500ms (simulated latency), returns standardized JSON with fake
total_cost - TEE Enclaves generate real zkTLS proofs against Mock API to simulate cryptographic overhead
3. The Testnet Asset Faucets
To test the Dual-Tranche economics, users need access to two distinct testnet tokens.
3.1 Testnet SENTRY (tSENTRY)
| Property | Detail |
|---|---|
| Use | Operator Staking, Watcher Challenger Bonds, and Governance Voting. |
| Distribution | Available via a public Discord faucet (drip-limited to prevent Sybil hoarding). Allowlisted Alpha operators receive a bulk airdrop of 10,000 tSENTRY to meet the minimum node stake. |
3.2 Mock-USDC (mUSDC)
| Property | Detail |
|---|---|
| Use | Enterprise SaaS payments, Insurance Premiums, Mandate Marketplace licensing, and the Senior Insurance Tranche. |
| Distribution | Unlimited minting for testnet Agents to simulate large enterprise API budgets. |
4. The Chaos Engineering Schedule — Adversarial Test Scenarios
During the Crucible Beta, the core team will intentionally execute the following adversarial drills on a public schedule. The network must demonstrate resilience and automatic recovery to pass the Mainnet gates.
4.1 Drill 1: The Watcher Honeypot
Action: The core team uses an admin override to inject a mathematically forged Attestation Bundle (claiming a spend of $0.05 when the zkTLS receipt says $0.50) into the L2 Sequencer.
Success Criteria: A public Watcher Node must detect the mismatch, submit the Challenger Bond, and successfully slash the forged bundle before the epoch finalizes, claiming the tSENTRY bounty.
4.2 Drill 2: The Latency Shock
Action: The core team intentionally overloads the Mock LLM API, causing 50% of all requests to time out after 10 seconds. This simulates catastrophic upstream provider degradation that would occur during peak usage or provider outages.
Success Criteria: The SentryMandate micro-reservations must automatically expire, successfully releasing the locked mUSDC back to the Agents without trapping enterprise funds in dead state channels. All timeout recovery paths must execute cleanly without manual intervention from the protocol team.
4.3 Drill 3: The Insurance Bank Run
Action: The core team simulates a zero-day exploit, triggering 5,000 simultaneous maximum-payout insurance claims in a single epoch. This replicates the worst-case correlated failure scenario where a widely deployed agent framework is compromised.
Success Criteria: The InsurancePool contract must trigger the 20% Maximum Drawdown Limit. It must distribute the mUSDC pro-rata, prevent insolvency, and automatically spike the dynamic premium pricing for the next epoch. The Senior Tranche must never reach zero liquidity.
4.4 Drill 4: The 51% Governance Attack
Action: The core team distributes 60% of the circulating tSENTRY supply to a single "Attacker" wallet. The attacker submits a DAO proposal to reduce the Slashing Penalty to 0. This tests the protocol's governance safety mechanisms under the most extreme whale concentration scenario.
Success Criteria: The Quadratic Voting algorithm must severely dilute the whale's voting power. Even if the vote passes, the Veto Council multisig must successfully execute a block, proving the safety rails work. The 14-day timelock must provide sufficient window for the council to act.
5. Slashing Rollout Plan (Shadow to Live)
Slashing bugs destroy communities. We roll this out with extreme caution.
5.1 Shadow Slashing (Vanguard Phase)
Watchers submit disputes. The DisputeModule evaluates the evidence and emits a ShadowSlash event. Dashboards show "Operator X would have lost 10,000 tSENTRY," but balances remain unchanged.
Goal: Tune the parameters and eliminate false positives caused by network jitter.
5.2 Live Objective Slashing (Crucible Phase)
The training wheels come off.
| Offense Class | Penalty | Action |
|---|---|---|
| Class A Forged zkTLS, Equivocation | 100% | Instantly burn entire operator stake. |
| Class B Downtime, Missed Heartbeats | 0.1% — 5% | Slash based on severity. |
Goal: Prove that the deflationary burn mechanics function correctly under adversarial load.
6. Telemetry & Observability Dashboards
A testnet is only useful if the data is highly legible to the community and stakeholders. SentryMandate must host a public Grafana/Dune Analytics dashboard tracking:
- Total
mUSDCrouted through the network - Total
tSENTRYburned via protocol fees (Buy-and-Distribute engine) - Current Operator APY (Yield from emissions + fees)
- Active Watcher Count and geographic distribution
- Number of Honeypot bundles caught vs. missed
- Total
tSENTRYslashed and burned
- Total
mUSDCin the Senior Tranche - Current Utilization Ratio (U)
- Real-time Premium Multiplier (current policy pricing)
7. Mainnet Exit Gates (Acceptance Criteria)
SentryMandate will NOT launch Mainnet until every single one of these quantifiable gates is passed during the Crucible Beta.
| Gate | Requirement | Threshold |
|---|---|---|
| Gate 1 | Hardware Stability | Network sustains 1,000 concurrent Agent requests/second through verified AWS Nitro Enclaves with P95 latency < 200ms (excluding LLM generation time). |
| Gate 2 | Economic Solvency | Network successfully survives the "Insurance Bank Run" drill without the Senior Tranche hitting zero liquidity. |
| Gate 3 | Immune System Verification | Watcher Nodes successfully catch 100% of Protocol-Injected Honeypot forged bundles over a 14-day consecutive period. |
| Gate 4 | Deflationary Proof | Amount of tSENTRY burned via protocol fees and slashing exceeds amount emitted via epoch rewards for at least 3 consecutive days. |
| Gate 5 | Marketplace Legibility | At least 10 unique IP-NFT Mandate Templates are minted, sub-licensed, and successfully route royalties to their authors. |
8. The Red Team Bug Bounty Program
During the Crucible Beta, the protocol treasury will allocate $250,000 in USDC (real fiat, not testnet) to incentivize white-hat hackers.
The protocol pays bounties for successfully demonstrating any of the following critical attack vectors against the testnet deployment:
| Target | Attack Vector | Severity |
|---|---|---|
| TEE Payload Extraction | Successfully extracting a plaintext payload from a running AWS Nitro Enclave node. This would compromise the fundamental confidentiality guarantee of the protocol. | Critical |
| zkTLS Forgery | Successfully forging a zkTLS receipt that bypasses the DisputeModule logic. This would break the integrity of cost attestation proofs. |
Critical |
| Double-Spend | Successfully double-spending an SentryMandate micro-reservation. This would compromise the payment settlement layer. | Critical |
| Infinite Mint | Finding a math exploit that allows infinite minting of the tSENTRY token. This would destroy all tokenomic guarantees. |
Critical |
IP-NFT Marketplace: Governance Policy Licensing
Mint compliance policies as on-chain IP-NFTs, license them to enterprises, and earn automated trustless royalties via curation markets.
This section proves: Mandate templates are immutable IP-NFTs — silent upgrades are impossible (Invariant V.1), and flat-fee licensing prevents royalty stacking (Invariant V.2).
IP-NFT Standard The Asset Standard: Mandates as IP-NFTs
The Mandate Marketplace transforms AI compliance from a bespoke engineering chore into a globally liquid, tokenized asset class. Governance Architects, security researchers, and legal firms mint policy configurations as on-chain IP-NFTs, license them to enterprises, and earn automated trustless royalties. A Mandate is minted on the Layer-2 Settlement chain using an IP-NFT standard (similar to ERC-6551 or Story Protocol), ensuring the template itself can own its royalty revenue streams.
1.1 Template Registration
An AI Governance Architect submits a canonical JSON policy and mints the Master NFT.
{
"template_id": "0xIP_NFT_ADDRESS",
"version": "1.0.0",
"author_wallet": "0xAUTHOR...",
"category": "FINANCE_COMPLIANCE",
"mandate_ruleset": {
"max_daily_spend": 500,
"allowed_endpoints": ["api.bloomberg.com", "api.openai.com"],
"forbidden_tools": ["local_file_system", "shell_execution"]
},
"licensing_terms": {
"model": "MONTHLY_FLAT",
"price_usdc": 50.00
},
"immutable_hash": "0x[SHA256(canonical_json)]"
}
1.2 Immutable Version Control
Once minted, version 1.0.0 is cryptographically frozen. If the author wants to add api.anthropic.com to the allowed endpoints, they must mint version 1.1.0.
↓ Author publishes update
v1.1.0 (new mint — adds api.anthropic.com)
↓ Enterprise Dashboard flags upgrade available
Enterprise Orchestrator (e.g., CrewAI) must explicitly sign on-chain tx to migrate agents to v1.1.0
- Enterprises using
1.0.0are unaffected. - The Enterprise Dashboard flags that an upgrade is available.
- The Enterprise Orchestrator (e.g., CrewAI) must explicitly sign an on-chain transaction to migrate its agents to
1.1.0. This mathematically prevents supply-chain rug pulls.
Licensing Engine The Licensing & Royalty Engine
To protect enterprises from unpredictable fees, SentryMandate deprecates percentage-based API royalties in favor of Programmable Flat-Fee Subscriptions.
2.1 The Payment Flow
When an Enterprise licenses a template, it opens a streaming payment channel or pays a 30-day upfront fee in USDC. The smart contract splits this fee:
Royalty_Author = Fee_License × 0.80 (80% → Template Author)
Yield_Curators = Fee_License × 0.10 (10% → Staked Curators)
Revenue_Protocol = Fee_License × 0.10 (10% → Protocol Treasury)
├— 80% ($40) → Author's wallet (USDC)
├— 10% ($5) → Curators (pro-rata by SENTRY stake)
└— 10% ($5) → Protocol Treasury
2.2 IP Composability (Sub-Licensing)
Because these are standard IP-NFTs, they are composable. An author can create a Master Finance Template inheriting rules from a Base Security Template by someone else. The smart contract cascades USDC royalties down the dependency tree.
↓ inherits
Master Finance Template (Author B) ← earns royalties from direct licensees
↓ licensed by
Enterprise Agent Fleet ← pays single flat USDC fee
TCR The Token-Curated Security Market
Enterprises need to know which templates are safe. Instead of relying on centralized Admin Badges, SentryMandate uses cryptoeconomic staking to crowdsource security audits.
3.1 Staking for Yield (Curators)
Any SENTRY staker can act as a Curator. If a Curator reviews a template's JSON code and determines it is well-audited and robust, they can stake SENTRY tokens on that template.
Curators earn a share of licensing revenue (from the 0.5% protocol fee stream), distributed pro-rata based on their staked SENTRY.
If the template contains malicious logic (e.g., it routes funds to a hacker) and is reported, the template is delisted, and the Curators' staked SENTRY is 100% slashed and burned.
3.2 The Mathematical Curation Yield
Stake_User = The amount of SENTRY staked by this specific Curator.
Total_Stake_On_Template = The sum of all SENTRY staked on this specific template.
Curator_Cut = The percentage of licensing revenue allocated to curators (e.g., 0.10).
Result: High-quality, safe templates attract significant amounts of staked SENTRY because they generate high licensing volume. Malicious templates attract zero stake (because attackers know they will be slashed). The amount of SENTRY staked on a template becomes its ultimate, un-fakeable security badge.
Reputation The Template Reputation System
A Template's ranking is dictated by a deterministic algorithm, influenced by the Dual-Axis Reputation Engine.
4.1 Marketplace Ranking Score
Templates are ranked from 0 to 100 based on verified on-chain history:
| Weight | Factor | Measures |
|---|---|---|
| 40% | Economic Security | The total dollar value of SENTRY staked on the template by Curators. |
| 30% | Execution Competence | The average Competence_Score of all AI agents currently operating under this mandate. (Do agents using this template crash often?) |
| 20% | Lindy Effect / Time Alive | How long the template has been actively used without a dispute or slashing event. |
| 10% | Adoption Volume | The total active USDC licensing volume. |
Insurance Integration with the Insurance Engine
The Marketplace interfaces with the Tranched Risk Pools. When an enterprise applies for Overspend Insurance, the smart contract checks the immutable_hash of the Mandate the agent runs.
| Scenario | Staked Curators | History | Insurance Effect |
|---|---|---|---|
| Blue Chip Discount | AAA-ranked template (e.g., $1M in SENTRY staked) | Extensive, clean | Steep discount on monthly USDC premium. |
| Custom/Unknown Penalty | Zero staked curators | Zero history | Maximum premium multiplier — risk of misconfiguration is entirely unvetted. |
Enterprise UI Enterprise UI & Discovery (The Frontend)
The Marketplace is exposed to the Enterprise Compliance Officer via a seamless, Web2-style SaaS interface.
| Feature | Description |
|---|---|
| Filters | Search by Industry (e.g., Healthcare, DeFi Trading), Max Spend Limits, Allowed Providers (e.g., Anthropic Only). |
| Risk Visualizer | A clear indicator showing how much SENTRY is staked backing the template's security. |
| One-Click Deployment | The Compliance Officer clicks License & Deploy. The SaaS backend handles the USDC payment, updates the Agent's identity on the L2 Sequencer, and instantly enforces the new rules across the TEE Proxy network. |
Flywheel The Economic Flywheel
The Marketplace completes the SentryMandate network effect:
↓
Curators review code & stake SENTRY on templates to earn yield
↓
Enterprises see high staked value → license templates with confidence
↓
Agents use templates → drive volume to TEE Operators
↓
Enterprise insurance premiums drop (vetted rules = lower risk)
↓
Authors & Curators earn USDC royalties
↓
Incentivized to build even better templates
└——— cycle repeats ———┤
This transforms SentryMandate from a simple middleware proxy into the definitive App Store for Autonomous AI Governance.
Deep Dive Marketplace Mechanics
The Governance Architect compiles a canonical JSON policy and hashes it with SHA-256 to produce the immutable_hash on the L2 Settlement chain. The minting transaction creates a Master IP-NFT owning all downstream royalty streams. Updates enforce append-only versioning: 1.0.0 stays frozen while 1.1.0 is minted separately. Orchestrators must sign an on-chain migration transaction to adopt new versions.
Licensing supports streaming payment channels (per-second USDC transfers) and 30-day upfront flat fees. The MarketplaceModule executes an atomic three-way split on every payment. Composability enables hierarchical inheritance where derived templates extend parent rulesets. Royalty cascades walk the dependency tree, distributing USDC to every author with a minimum 10% parent allocation.
Staking SENTRY is a financially-backed safety claim. Staking rewards follow a time-weighted schedule favoring validator longevity; slashing ensures only genuine auditors stake meaningfully. The ranking algorithm is deterministic: Economic Security normalized against max stake, Execution Competence from live agent scores, Lindy Effect from dispute-free duration, Adoption Volume from USDC demand. No manual curation or pay-for-placement.
AAA-ranked templates receive maximum insurance premium discounts; unranked templates face maximum multipliers. One-click deployment executes atomically: vault approves USDC, MarketplaceModule records the license, L2 Sequencer binds agents to the template hash, TEE Proxies enforce within one epoch. Under 30 seconds from click to enforcement with on-chain settlement.
Cryptoeconomic Enforcement Layer
Economic parameters designed to sustain Watcher profitability under baseline operational conditions, with modeled resilience against bribery and cartel coordination.
This section proves: the Tri-Layer Incentive Engine (Dispute Bounty + Proof-of-Vigilance Subsidy + Reputation Leverage) guarantees Watcher liveness even when fraud rate approaches zero.
Core Problem The Starvation Paradox
The fundamental equation of a Watcher's expected profit reveals a critical and deeply structural vulnerability at the heart of any purely bounty-based monitoring system in decentralized networks.
| Variable | Meaning |
|---|---|
Probability_of_Detection | The chance of finding a valid mandate violation or forged log. |
Slash_Reward | The payout for successfully slashing an Operator. |
Compute_Cost | The ongoing server and gas costs to process the evidence logs. |
The Paradox: As the network matures and operators realize cheating results in guaranteed slashing, Probability_of_Detection approaches zero. When it hits zero, Expected_Profit becomes strictly negative. Watchers exit the network. The moment watchers exit, detection actually becomes zero, making it highly profitable for Operators to begin cheating.
The Starvation Death Spiral
↓
Watchers catch zero fraud → EV goes negative
↓
Watchers shut down AWS servers → detection drops to zero
↓
Operators realize nobody is looking → attacks begin
↓
THE STARVATION DEATH SPIRAL — Network silently degrades into a trust-based Web2 proxy
Solution: We abandon the reliance on pure bounty hunting and move to a Tri-Layer Incentive Engine.
Tri-Layer Engine Three Stacked Economic Drivers
We do not rely on a single incentive. We stack three distinct economic drivers to guarantee permanent Watcher liveness across all network conditions and market cycles.
Layer 1: Dispute Reward Share (The Core Bounty)
When a Watcher successfully proves an Operator committed fraud (e.g., equivocation, forged zkTLS), the Operator's stake is slashed. The Watcher's reward must exceed the opportunity cost of the capital requirements of holding the Challenger Bond.
The Hardening Rule: The Reward_Percentage must be hardcoded between 30% and 50%. If an Operator loses a $10,000 stake, the Watcher must walk away with $3,000 to $5,000. If it drops below 25%, the asymmetric risk of fighting a highly capitalized Operator deters independent Watchers.
Layer 2: Proof-of-Vigilance Subsidy (The Baseline Yield)
To solve the Starvation Paradox, we must pay Watchers even when zero fraud occurs. We implement a Monitoring Subsidy. Watchers submit periodic Coverage Proofs to the L2 Sequencer.
↓
Deterministically recomputes policy outcomes for random 100-bundle subset
↓
Signs cryptographic attestation: "Epoch 442 is 100% clean"
↓
Protocol pays flat SENTRY baseline yield
- The Mechanism: A Watcher downloads an Operator's Merkle root, deterministically recomputes the policy outcomes for a random subset of 100 bundles, and signs a cryptographic attestation stating: "I verified Epoch 442, and it is 100% clean."
- The Reward: The protocol pays a flat
SENTRYbaseline yield (funded by token emissions early on, and protocol fees later) to all Watchers who submit valid Coverage Proofs. - The Honeypot Hook: To ensure Watchers aren't just blindly signing "All Clear" proofs, the protocol randomly injects fake bundles. If a Watcher signs an "All Clear" on an epoch containing a Honeypot, they are instantly booted from the subsidy pool.
Layer 3: Reputational Leverage (The Watcher Score)
Watchers build an on-chain reputation based on their historic accuracy and uptime. A high Watcher Score unlocks structural network advantages:
| Advantage | Benefit |
|---|---|
| Dispute Priority | High-score Watchers get a 5-block head start to submit fraud proofs before lower-tier Watchers can claim the bounty. |
| Capital Efficiency | High-score Watchers receive a 50% discount on the required Challenger Bond size, vastly improving their Return on Capital. |
Bond Calibration Cryptoeconomic Bond Calibration
If it costs nothing to file a dispute, attackers will spam the network with fake disputes to freeze Operator capital (a Denial of Service attack). Watchers must post a Challenger Bond.
| Rule | Mechanism |
|---|---|
| Base Rate | The multiplier defaults to 10% (e.g., a $1,000 bond to challenge a $10,000 stake). |
| Exponential Spam Backoff | If a specific Watcher wallet loses a dispute (meaning it was frivolous), their personal multiplier doubles for the next dispute (20%, 40%, 80%). |
| Reset | A successfully proven dispute instantly resets their multiplier back to the base rate. |
Detection Detection Probability Maximization
To ensure detection remains high even if the raw number of Watchers is low, the L2 Sequencer acts as a central coordinator for audit assignments.
4.1 Randomized Overlapping Assignments
Watchers do not blindly download the entire global firehose of data (which is computationally impossible at scale). The Sequencer assigns pseudo-random subsets of traffic to specific Watcher subsets.
Operator B traffic → assigned to Watchers 2, 4, 7
Operator C traffic → assigned to Watchers 3, 5, 9
↓
Overlapping assignments guarantee coverage
If Watcher 1 gets lazy → Watchers 4 and 9 still catch fraud
4.2 High-Value Traffic Flagging
Not all bundles are created equal.
| Bundle Value | Verification Level |
|---|---|
| Standard ($0.02 LLM call) | Standard random sampling. |
| High-Value ($5,000 wallet transfer) | Mandatory Multi-Signature Review — protocol flags the bundle, and 3 independent Watchers must process it before the transaction fully settles. |
Anti-Collusion Anti-Collusion & Bribery Resistance
The Threat: Operator X commits a $10,000 fraud. Watcher Y detects it. Operator X messages Watcher Y: "I will pay you $6,000 under the table to ignore this."
The Mathematical Defense
Bribery only works if the Operator can guarantee silence. Because the L2 Sequencer uses Randomized Overlapping Assignments, the Operator does not know how many Watchers are auditing that specific bundle.
↓
But Watcher Z is ALSO assigned to the same bundle
↓
Watcher Z reports the fraud
↓
Operator X loses: $6,000 bribe (gone) + $10,000 stake (slashed) = $16,000 total loss
The Invariant: To successfully bribe the network, the Operator must bribe a majority of the entire global Watcher pool, ensuring that the Cost of Bribery is always exponentially higher than the Value Extracted.
Sustainability Long-Term Sustainability Curve
Watcher rewards must carefully transition to ensure the protocol does not inflate itself to death.
| Phase | Epoch Range | Revenue Mix | Strategy |
|---|---|---|---|
| The Bootstrap | 0 – 180 | 90% Layer 2 Monitoring Subsidy (Token Emissions) | Overpay Watchers to build the network's reputation. |
| The Transition | 180 – 365 | Gradual shift to protocol fees | DAO slowly redirects 5% of all USDC routing fees into the Watcher Yield Pool, replacing emissions with real fiat yield. |
| Endgame | Year 2+ | 3% – 8% of total global fee flow | Monitoring the AI economy becomes as predictable and boring as validating Ethereum blocks. |
Constitution Hardcoded Parameter Floors
To prevent governance capture from softening the immune system, the following parameters are hardcoded as immutable constants in the Solidity contracts. They cannot be altered by a DAO vote.
MIN_SLASH_EQUIVOCATION: 100% // No mercy for objective fraud. MIN_WATCHER_REWARD_SHARE: 25% // The DAO cannot vote to steal the Watcher's cut. MAX_CHALLENGER_BOND: 20% // The DAO cannot price independent Watchers of expected slash out of the market. SUBSIDY_FREEZE_THRESHOLD: // The Monitoring Subsidy cannot be deactivated unless // the rolling 30-day protocol fee revenue exceeds the // 30-day Watcher compute baseline.
Pre-Flight Mainnet Pre-Flight Checklist
Before the Mainnet genesis block is mined, the engineering team must prove the following in the Crucible Testnet:
- The 1% Simulation: Run the testnet where the violation rate is artificially suppressed to 1%. Prove that the Layer 2 Monitoring Subsidy keeps Watcher EV positive.
- The Spam Loop Test: Program a bot to submit 10,000 false disputes. Prove that the dynamic bond scaling liquidates the bot's capital before it degrades the network.
- The Bribe Threshold Test: Prove that an Operator cannot successfully bribe a randomized Watcher quorum without spending more than their staked collateral.
- The Honeypot Liveness Check: Prove that if Watchers fail to catch the protocol-injected honeypot, their baseline yields are immediately suspended.
Security is not elegance; it is brute economic force. By overpaying early, overlapping assignments, and enforcing merciless slashing, you guarantee the network's immune system never sleeps.
Watcher compute costs remain below the Proof-of-Vigilance subsidy. Randomized overlapping assignments guarantee at least one honest Watcher per operator. Honeypot injection is indistinguishable from real traffic.
Watchers do not trust operators — they independently recompute policy outcomes. Operators do not know which Watchers are assigned to their traffic (preventing targeted bribery). The bribery cost exceeds the value extractable (Invariant II.3).
MIN_WATCHER_REWARD_SHARE == 25% is immutable — DAO cannot reduce Watcher compensation. Honeypot injection every N epochs is automatic (Invariant II.2). Subsidy freeze threshold prevents premature deactivation.
Network reaches 100% honest operation. Watchers find zero fraud. Expected value goes negative. Watchers exit. Security collapses (Starvation Paradox).
Proof-of-Vigilance Subsidy (Layer 2): flat SENTRY baseline yield paid for valid Coverage Proofs, regardless of fraud rate. Honeypot injection ensures lazy Watchers are caught and ejected.
Watcher blindly signs ‘All Clear’ proofs without actually verifying bundles.
Protocol injects forged Honeypot bundles every N epochs (Invariant II.2). Signing ‘All Clear’ on a Honeypot epoch results in instant ejection from subsidy pool and forfeiture of staked bond.
Analysis Watcher Economics Deep Dive
The Dispute Reward Share creates a powerful incentive alignment where Watchers are financially motivated to invest in superior detection infrastructure. A Watcher who can detect fraud faster than competitors captures the entire bounty. The 30-50% reward range ensures that even after accounting for the Challenger Bond lockup cost and the computational overhead of generating fraud proofs, the expected return on a successful dispute significantly exceeds traditional DeFi yield farming. This transforms Watchers from passive monitors into active profit-seeking adversaries of any misbehaving Operator.
The Proof-of-Vigilance Subsidy eliminates the fundamental game-theoretic weakness of pure bounty systems. By guaranteeing a baseline yield regardless of network honesty levels, the protocol ensures that rational economic actors maintain monitoring infrastructure even during extended periods of zero fraud. The Honeypot injection mechanism provides the critical accountability layer: Watchers cannot simply collect subsidies without performing genuine verification work. The combination of guaranteed income and random auditing creates an incentive-compatible mechanism.
Layer 3 creates a compounding advantage for honest, long-term Watchers. The 5-block dispute priority window means high-reputation Watchers have exclusive first access to valuable bounties, while the 50% Challenger Bond discount dramatically improves their capital efficiency. These advantages compound over time: a Watcher with a perfect track record can deploy the same capital more efficiently and capture more bounties than a newcomer, creating natural barriers to entry that reward sustained honest participation.
The exponential spam backoff mechanism creates a mathematical guarantee against dispute flooding. An attacker submitting frivolous disputes faces geometrically escalating bond requirements (10%, 20%, 40%, 80%), meaning that after just 4 failed attempts, they must post 80% of the expected slash amount as collateral. Combined with the base rate of 10%, the bond system ensures that legitimate Watchers face minimal barriers while bad actors are rapidly priced out of the dispute system entirely.
Constitutional Invariants & Non-Negotiable System Laws
Permanent, non-negotiable cryptographic and economic constraints hardcoded into Solidity contracts and TEE Enclaves.
This section proves: 16 invariants across 7 domains are hardcoded as immutable Solidity assertions — governance cannot override without hard-forking the protocol.
These are not community guidelines; they are code-level assertions hardcoded into the Solidity smart contracts and the TEE Enclave images. If a transaction attempts to violate these invariants, the transaction simply reverts. Governance cannot override these without hard-forking the protocol.
Domain I Core Execution & Cryptography Invariants
I.1 The TEE Isolation Mandate
No request may be executed, and no evidence bundle may be generated, outside of a hardware-verified Trusted Execution Environment.
Code-Level Invariant: The OperatorRegistry must reject any node registration that lacks a valid PCR0 hardware attestation matching the canonical SentryEnclave.eif image.
Result: Operator code modification is mathematically impossible without instantly stripping the node of its routing eligibility.
I.2 The Data Availability (DA) Prerequisite
A Merkle root commitment to the Layer 1 blockchain is null and void if the underlying data is withheld.
Code-Level Invariant: The CommitmentLedger.sol contract requires a valid DA inclusion proof (e.g., Celestia blob pointer) alongside every Merkle root submission.
Result: Watchers are guaranteed access to the raw data required to generate fraud proofs.
I.3 The SentryMandate Concurrency Law (No Double Spends)
An AI Agent cannot double-spend its fiat API budget, even when routing thousands of parallel requests.
Code-Level Invariant: Sigma(active_micro_reservation_locks) for a specific (agent_id, mandate_hash) pair MUST be <= total_available_USDC_budget
Result: Real-time budget safety is guaranteed without requiring synchronous global database locks.
Domain II Economic Enforcement & Slashing Invariants
II.1 The Objective Fraud Death Penalty
Equivocation (signing two different outcomes for the same request ID) and zkTLS forgery are unforgivable offenses.
Code-Level Invariant: MIN_SLASH_EQUIVOCATION == 100% There is no governance parameter to lower this. If cryptographic fraud is proven, the operator's entire stake is burned/liquidated, and the operator_pubkey is permanently blacklisted.
II.2 The Watcher Liveness Guarantee
The protocol's immune system must never starve, even in a perfectly honest network.
Code-Level Invariant (A): The L2 Sequencer must autonomously inject a forged "Honeypot" bundle every N epochs. Code-Level Invariant (B): If Watcher participation drops below the safe quorum, the protocol automatically halts all new Insurance policy issuance until the Watcher pool is recapitalized.
II.3 The Bribe Resistance Floor
The cost of corrupting the network must always exceed the value that can be extracted.
Code-Level Invariant: The DisputeModule.sol dynamically scales the Challenger Bond to ensure that spamming the dispute system mathematically bankrupts the attacker before it affects operator liveness.
Domain III Capital Solvency & Insurance Invariants
III.1 The Dual-Tranche Capital Wall
Fiat-denominated enterprise losses cannot be underwritten by volatile protocol tokens.
Code-Level Invariant: Insurance claims MUST be paid out in USDC (Senior Tranche). Slashed SENTRY tokens (Junior Tranche) MUST be liquidated to USDC before being applied to the Insurance Pool.
III.2 The Reserve Ratio Floor
The Insurance pool must remain overcollateralized at all times (MIN_RESERVE_RATIO == 1.25; TVL/liabilities must exceed 125%).
Code-Level Invariant: MIN_RESERVE_RATIO == 1.25 The Total Value Locked (TVL) in USDC must be at least 25% higher than the maximum active coverage liabilities. If the ratio drops to 1.24: → Smart contract automatically pauses all new policy writing → Exponentially spikes premiums
III.3 The Black Swan Drawdown Limit
A zero-day agent framework exploit must not bankrupt the Liquidity Providers.
Code-Level Invariant: MAX_EPOCH_DRAWDOWN == 20% The protocol cannot disburse more than 20% of its total USDC reserves in a single 24-hour epoch. If verified claims exceed this cap, payouts are strictly pro-rata.
Domain IV Trust & Reputation Invariants
IV.1 Reputation is Derived, Not Stored
The Global_Sentry_Score cannot be manually edited by an admin, a DAO vote, or a multisig.
Code-Level Invariant: Reputation is a view function. It is calculated dynamically strictly by querying the immutable history of: - TEE Attestation Bundles - Slashing events - zkTLS success rates
IV.2 The Volume-Weighted Sybil Defense
An agent cannot wash-trade its way to an AAA-rated trust score using micro-transactions.
Code-Level Invariant: The Reputation Engine mathematically weights compliance by the fiat dollar volume of the transaction, isolating high-value safety from low-value spam.
Domain V Marketplace & IP Invariants
V.1 Immutable Governance IP
When an AI Governance Architect publishes a Mandate Template, that specific version is frozen forever.
Code-Level Invariant: Updating a template generates a completely new IP-NFT hash. Enterprise orchestrators (e.g., CrewAI) must explicitly sign an on-chain transaction to migrate an agent to a new version. Silent upgrades or "supply chain rug pulls" are IMPOSSIBLE.
V.2 Flat-Fee Predictability
Mandate authors cannot tax an enterprise's API spend dynamically.
Code-Level Invariant: Marketplace licensing is enforced as a flat-fee subscription (USDC per agent/subnet per month). Royalty stacking on API volume is FORBIDDEN to maintain predictable enterprise overhead.
Domain VI Network Topology Invariants
VI.1 The Anti-Monopoly Ceiling
The network must never degrade into a centralized proxy operated by a single dominant cloud provider.
Code-Level Invariant: MAX_ROUTING_SHARE == 15% If an Operator handles 15% of the global volume in a single epoch, they are algorithmically removed from the matching queue until the next epoch begins.
VI.2 Cryptographic Blind Routing
An enterprise agent cannot deterministically select which specific Operator processes its request, preventing out-of-band bribery.
Code-Level Invariant: The L2 Sequencer assigns nodes using a Verifiable Delay Function (VDF) or verifiable randomness, matching intents based on capability and latency, but removing targeted operator selection from the client side.
Domain VII Immutable Governance Invariants
VII.1 The Veto Council
A 51% token-weighted DAO cartel cannot hijack the security of the network to steal the USDC treasury.
Code-Level Invariant: Upgrades to SlashingModule.sol and InsurancePool.sol must: 1. Pass a Quadratic DAO vote 2. Survive a 14-day timelock 3. NOT be rejected by the 5-of-7 Security Veto Council multisig
VII.2 The Deflationary Baseline
The tokenomics must ensure that the network operates as a net-negative sum environment for token supply.
Code-Level Invariant: Tokens_Burned_via_Fees + Tokens_Burned_via_Slashing > Tokens_Emitted (Once the network reaches its target organic volume)
Summary Matrix Invariant Summary Matrix
The complete map of all 17 invariants across all 7 domains:
| Domain | Invariant | Hardcoded Value |
|---|---|---|
| Execution | TEE Isolation | PCR0 must match canonical SentryEnclave.eif |
| Execution | Data Availability | DA inclusion proof required with every Merkle root |
| Execution | No Double Spends | Sigma(locks) <= budget per (agent_id, mandate_hash) |
| Slashing | Fraud Death Penalty | MIN_SLASH_EQUIVOCATION == 100% |
| Slashing | Watcher Liveness | Honeypot injection every N epochs; auto-halt on low quorum |
| Slashing | Bribe Resistance | Dynamic Challenger Bond scaling |
| Insurance | Dual-Tranche Wall | Claims paid in USDC only; SENTRY liquidated first |
| Insurance | Reserve Ratio | MIN_RESERVE_RATIO == 1.25 |
| Insurance | Drawdown Limit | MAX_EPOCH_DRAWDOWN == 20% per 24-hour epoch |
| Reputation | Derived, Not Stored | view function only — no manual edits |
| Reputation | Sybil Defense | Compliance weighted by fiat dollar volume |
| Marketplace | Immutable IP | New version = new hash; explicit migration required |
| Marketplace | Flat-Fee Only | No dynamic API volume royalties |
| Topology | Anti-Monopoly | MAX_ROUTING_SHARE == 15% |
| Topology | Blind Routing | VDF-based randomized assignment |
| Governance | Veto Council | Quadratic vote + 14-day timelock + 5-of-7 multisig |
| Governance | Deflationary Baseline | Burned > Emitted at target volume |
These invariants are the foundation of SentryMandate's security guarantees. Violation of any invariant indicates a critical flaw requiring immediate remediation and audit. Successful enforcement of these constraints is a prerequisite for enterprise adoption. These laws are written in code. They do not evolve.
Failure Mode Analysis
Systemic Bottlenecks and Hardcoded Guardrails — Ranked by Probability and Severity
This section proves: every identified failure mode has a pre-committed, automated defense — no human intervention required for first-response.
Purpose: This document ranks the existential threats to the SentryMandate protocol in order of probability, not drama. It strips away the theoretical elegance of the architecture to address the brutal reality of distributed systems: invisible labor dies, insurance models snap, and liquidity centralizes. For every identified failure mode, this specification defines the explicit, hardcoded cryptoeconomic failsafe required to prevent it.
Threat Overview
| # | Threat | Probability | Severity |
|---|---|---|---|
| 1 | Watcher Starvation Paradox | Highest | High |
| 2 | Insurance Calibration Snap | High | Highest |
| 3 | Parameter Miscalibration ("Rational Cheater") | Medium | Critical |
| 4 | Routing Centralization Drift | Medium | High |
| 5 | Overengineering Before Revenue | Medium | Existential |
| 6 | Governance Capture | Low (near-term) | Existential (long-term) |
The Core Risk
Decentralization without adversaries is just distributed SaaS. Everything in SentryMandate depends on someone monitoring, someone disputing, and someone being economically motivated to care. Because our TEE/zkTLS architecture makes fraud mathematically difficult, operators will likely behave perfectly.
If operators behave perfectly, Watchers catch zero fraud. If Watcher EV (Expected Value) is too low, they turn off their AWS servers. Once they leave, detection probability drops to zero, and the network silently degrades into a trust-based Web2 proxy.
Failsafe A — The Vanguard Subsidy (Phase 1 & 2)
We do not rely on slash-rewards to keep Watchers alive early on. The Protocol Treasury allocates a flat USDC monthly stipend to the first 50 Watcher Nodes simply for maintaining 99.9% uptime and submitting blank cryptographic "All Clear" proofs to the L1. We overpay them to create a culture of adversarial pride.
Failsafe B — The Protocol-Injected Honeypot
|
v
All Watchers continuously verify proofs
|
v
First Watcher to catch the fake --> significant SENTRY bounty
|
v
Watcher EV remains highly positive, even in a perfectly honest network
The L2 Sequencer is programmed to intentionally inject mathematically forged Attestation Bundles into the Data Availability layer every 12 hours. The first Watcher to "catch" the protocol's intentional mistake receives a significant SENTRY bounty. This guarantees Watcher EV remains highly positive, even in a perfectly honest network.
The Core Risk
Insurance is mathematically fragile. It does not degrade slowly; it snaps. In the early stages, we have no real data on claim frequency, zero-day framework vulnerabilities, or mandate complexity risk. If premiums are too low, a single correlated event (e.g., an OpenAI API bug causing 500 agents to overspend) drains the entire liquidity pool in one block.
Architectural Failsafes
| Failsafe | Mechanism |
|---|---|
| Shadow Underwriting (Months 1-6) |
We explicitly delay the introduction of real DeFi Liquidity Providers (LPs). We run a 6-month sandbox. Agents pay real USDC premiums, but any resulting claims are paid out of a centralized, capped Protocol Treasury grant. We collect the violation data without exposing third-party capital to unknown tail risks. |
| Epoch-Based Drawdown Cap |
Hardcoded into InsurancePool.sol. The protocol cannot pay out more than 20% of its Total Value Locked (TVL) in any 24-hour epoch. If claims exceed this, payouts are distributed pro-rata. |
| Reputation-Coupled Deductible |
Enterprises must bear a minimum 5% deductible on all losses, ensuring they maintain local safeguards and do not rely entirely on the proxy mesh to catch their own poorly written agent code. |
The Core Risk
If the slashing penalties are too soft, the jail duration is too short, or the challenger reward is too low, the math flips. A malicious Operator will calculate:
"If I forge this log and steal $5,000, and the slash penalty is only $1,000, cheating is an optimal trading strategy."
Slashing must hurt exponentially more than the maximum plausible upside.
Failsafe — Immutable Minimum Floors
The smart contracts contain hardcoded parameter bounds that even the DAO cannot override.
Full specification → Section 18: Protocol Invariants
The Binary Forgery Penalty
There is no "mercy" or "accidental" tier for Class A integrity violations. If a TEE signature is forged or a zkTLS receipt is altered, the node is permanently banned from the OperatorRegistry and total capital is liquidated instantly.
The Core Risk
Even if we onboard 100 independent Operators, market forces naturally trend toward Pareto distributions. Within 6 months, 70% of all agent traffic might default to a single, highly reliable AWS-backed mega-node. While the network technically still works, censorship resistance dies, and the risk of operator-level collusion increases sharply.
Architectural Failsafes
| Failsafe | Mechanism |
|---|---|
| Anti-Monopoly Traffic Throttling |
The L2 Sequencer (which manages the SentryMandate locks) enforces a strict algorithmic cap. No single operator_pubkey can receive more than 15% of the total global routing volume in any given epoch. |
| Forced Diversification |
If a single mega-node hits its 15% capacity ceiling, the Sequencer mathematically forces enterprise traffic down the routing list to smaller, AAA-rated independent nodes, ensuring the economic rewards are distributed across the mesh. |
The Core Risk
We have designed a flawless, cryptoeconomically secure decentralized protocol. But enterprises do not buy decentralization; they buy solutions to their pain points. If we focus on the DAO, the tokenomics, and the Watcher network before we prove that enterprises actually want to pay for mandate enforcement, we risk investing engineering resources in decentralization features before validating product-market fit.
Failsafe — The MVP Revenue Mandate
Phase 1 of the 180-Day Blueprint completely abstracts the tokenomics away from the end user. We ship a centralized, TEE-backed SaaS product first.
The Volume Prerequisite
The ultimate bottleneck is volume. We do not activate the decentralized Operator Network (Phase 3) until the SaaS platform is actively processing at least:
# The Volume Prerequisite — Non-Negotiable Activation Gate # The decentralized Operator Network CANNOT launch until this threshold is met. Minimum_Activation_Threshold: 1,000,000 governed API calls / month # Without this organic baseline volume, the fee generation # will not support a decentralized ecosystem. # Revenue first. Decentralization second. Always.
The Core Risk
This becomes a high-severity risk 18 to 36 months post-launch (contingent on token price and adoption velocity). When total enterprise API spend routed through the protocol reaches significant scale and the Insurance Pool holds substantial TVL, attackers will attempt to buy 51% of the governance tokens to hijack the treasury or dilute the slashing penalties.
Architectural Failsafes
| Failsafe | Mechanism |
|---|---|
| Quadratic Voting | Token voting power scales with sqrt(tokens), mathematically destroying the leverage of large-holder whales. A holder with 1,000,000 tokens gets 1,000 votes — not 1,000,000. |
| The Immutable Veto Council |
A 5-of-7 multisig held by independent, doxed security researchers holds a permanent veto over SlashingModule.sol and InsurancePool.sol. The DAO can vote to increase marketplace royalties, but they cannot soften the security enforcement without Council approval. |
If SentryMandate ships exactly as architected, the cryptography will hold. The code will be correct.
The protocol will succeed or fail entirely on Incentive Participation.
By subsidizing Watchers early, delaying third-party insurance capital until the sandbox is proven, and enforcing 100% slashes for equivocation, SentryMandate establishes durable technical defensibility through non-forkable execution history.
| Threat | Primary Failsafe | Activation Phase | Status |
|---|---|---|---|
| Watcher Starvation | Vanguard Subsidy + Honeypot | Phase 1-2 | Mitigated |
| Insurance Snap | Shadow Underwriting + Epoch Cap | Phase 1-3 | Mitigated |
| Rational Cheater | Immutable Floors + Binary Penalty | Phase 2 | Mitigated |
| Routing Monopoly | 15% Throttle + Forced Diversification | Phase 3 | Mitigated |
| Overengineering | Revenue Mandate + Volume Gate | Phase 0-1 | Mitigated |
| Governance Capture | Quadratic Voting + Veto Council | Phase 4+ | Mitigated |
MVP Build Plan
Protocol-First SaaS to Decentralized Infrastructure — Week-by-Week Engineering and Go-To-Market Roadmap
This section proves: a concrete engineering checklist maps every protocol component to a specific phase, week range, and measurable deliverable.
Purpose: This is the exact, week-by-week engineering and go-to-market roadmap. It targets initial customer acquisition and SaaS revenue generation by Month 2, while writing a codebase designed for minimal refactoring during decentralization. All infrastructure components — TEE integration, zkTLS generation, state management — are built for reuse in Phase 3. We build TEE-native infrastructure operated centrally at first, progressively stripping away admin privileges until the protocol is fully permissionless.
See Section 02: Thesis for the six-phase timeline overview, and Section 21: Master Execution Roadmap for the detailed Gantt chart and per-phase milestones.
Goal: Build the irreversible, hardware-secured execution engine. This is the hardest engineering phase. If this is done right, the rest of the roadmap is just scaling.
0.1 The TEE Enclave Image (Rust/C++)
- Build the
SentryEnclave.eifimage for AWS Nitro Enclaves - Implement secure vsock communication for inbound/outbound encrypted payloads
- Automate Ephemeral Key generation on boot
Strict Constraint: This code must be hyper-optimized. It must execute the mandate evaluation entirely in isolated RAM.
0.2 The zkTLS Client Integration
- Integrate a zkTLS client (e.g., TLSNotary) directly into the Enclave
- Build standard receipt parsers for
api.openai.comandapi.anthropic.comto cryptographically extract thetotal_costheaders
0.3 The Deterministic Mandate Engine
- Canonical JSON serializer
- Stateless rule evaluator (Regex matching for endpoints, integer checks for spend limits)
- Attestation Bundle generator (creating the exact schema defined in
EVIDENCE_SCHEMA.md)
Goal: Ship a revenue-generating product. SentryMandate acts as the sole, centralized Operator Node running the verified Phase 0 TEE implementation.
1.1 The Enterprise Admin Dashboard (Web SaaS)
- React/Next.js frontend for Compliance Officers
- Fiat billing integration (Stripe) for monthly SaaS subscriptions
- Visual "Mandate Builder" to configure JSON spend limits without coding
- Treasury View: Connect an enterprise credit card to fund the agent's fiat API budget
1.2 The SentryMandate SDK (The Developer Experience)
- A lightweight Python/TypeScript SDK (
pip install sentry-mandate) - Crucial Function: This SDK acts as a programmable wallet. It automatically intercepts an agent's standard OpenAI call, requests a micro-reservation from the Sentry backend, encrypts the prompt with the TEE public key, and routes it to the proxy.
- Integration Target: Build native wrappers for high-level orchestrators like CrewAI, LangChain, and AutoGen
+-----------------------------------------------------+ | SentryMandate SDK | | | | +---------------------+ +----------------------+ | | | Admin Client | | Worker Wrapper | | | | | | | | | | For Sovereign | | Drop-in replacement | | | | Orchestrators | | for OpenAI SDK | | | | | | | | | | | | Takes lock token, | | | | | | encrypts prompt | | | | Provisions budgets | | locally, routes to | | | | Generates crypto | | TEE proxy | | | | lock tokens | | | | | +---------------------+ +----------------------+ | +-----------------------------------------------------+
1.3 The Centralized L2 Sequencer
- A high-speed centralized backend (Go or Rust) that handles the micro-reservation state channels (Budget Locking)
- Generates Merkle Roots of all TEE bundles every 10 minutes and stores them in a high-availability database (AWS Aurora)
Note: Not on a blockchain yet, but cryptographically prepared for it.
Goal: Transition the trust model. Move the cryptographic evidence from internal databases to public Data Availability layers, proving to early customers that SentryMandate cannot alter their audit logs.
2.1 Layer 1 Smart Contract Deployment (Testnet)
| Contract | Responsibility |
|---|---|
| CommitmentLedger.sol | Accepts the 10-minute Merkle Roots from the L2 Sequencer. |
| FeeRouter.sol | Takes the 0.5% protocol fee (simulated in testnet USDC) and executes the DEX market-buy for SENTRY. |
| OperatorRegistry.sol | The staking contract. |
2.2 The Public Explorer (Read-Only)
- A public web portal where anyone can paste a
request_idorbundle_hashand instantly verify the TEE signature and Merkle inclusion proof against the L1 smart contract
This becomes the ultimate sales tool for enterprise clients: "Don't trust our database; verify the cryptography."
Goal: Decentralize the execution layer. Allow external DevOps firms to route traffic, and launch the tokenized Mandate economy.
3.1 Federated Operator Onboarding
- Allowlist 10 trusted infrastructure partners
- They download the
SentryEnclave.eifimage and boot their own AWS Nitro instances - The
OperatorRegistryenforcesPCRattestation checks before granting them routing weight
3.2 Shadow Slashing & Watcher Network
- Deploy the
DisputeModule - Release the open-source Watcher Node client
- Begin injecting "Honeypot" forged bundles into the testnet
Constraint: Slashing is strictly in "Shadow Mode." We log what would have been slashed to tune the parameters and eliminate false positives caused by network jitter.
3.3 The Mandate Marketplace (v1.0)
- Deploy the IP-NFT smart contracts
- Enable AI Governance Architects to mint compliance templates
- Activate the Flat-Fee royalty routing logic so authors earn testnet USDC when agents adopt their rules
Goal: Remove the guardrails. Token Generation Event (TGE). Activate live slashing and the Dual-Tranche Insurance Pool.
4.1 Token Generation & Live Economics
- Deploy the
SENTRYtoken to Ethereum/Base Mainnet - Activate the
FeeRouterto begin actively market-buying and burning/distributing realSENTRYusing the fiat revenue generated from the Phase 1 SaaS customers
4.2 Live Objective Slashing
- Shadow Mode ends
- If a federated operator's TEE goes offline or fails a heartbeat, their staked
SENTRYis aggressively and permanently burned
4.3 The Dual-Tranche Insurance Pilot
- Open the Senior Tranche to DeFi Liquidity Providers to deposit real USDC
- Activate the Reputation Engine to dynamically price premiums for the enterprise agents that have been building their "Credit Scores" since Phase 1
- Cap maximum coverage at conservative limits (e.g., $10,000 per agent) to prevent black swan pool drains while the actuarial math stabilizes
| Principle | Rule |
|---|---|
| Hardware First | No code is written for the proxy that cannot run inside a restricted vsock TEE environment. |
| No Backdoors | The Admin Dashboard cannot have a "force approve" button that bypasses the enclave's cryptographic signature. If it does, the evidence is legally worthless. |
| Data Blindness | Operators and core team members must never have the ability to read plaintext enterprise LLM prompts. |
| Fiat Focus | Enterprises must never be forced to custody SENTRY tokens to use the product. |
| Role | Alias | Expertise | Focus |
|---|---|---|---|
| Systems/Cryptography Engineer | The Wizard | Deep expertise in Rust, AWS Nitro Enclaves, and Multi-Party Computation (zkTLS). | Most critical hire. Builds the TEE Enclave and zkTLS integration. |
| Smart Contract Engineer | The Economist | Solidity expert. | Builds the FeeRouter, Staking, and the rigorous math of the Insurance Pools. |
| Backend Engineer | The Plumber | Go or Rust. | Builds the high-throughput L2 Sequencer and the SentryMandate state channels. |
| Full-Stack/DevEx Engineer | The Bridge | React, Python, TypeScript. | Builds the Enterprise SaaS Dashboard and the Agent SDKs. Ensures the UX is polished and production-ready. |
SentryMandate SDK — Drop-In Worker Wrapper
The Worker Wrapper replaces the standard OpenAI SDK with a single import. Lock token initialization, automatic prompt encryption, TEE routing, and zkTLS receipt generation happen transparently.
# Before: Standard OpenAI SDK (no governance, no audit trail) # from openai import OpenAI # client = OpenAI(api_key="sk-...") # After: SentryMandate Worker Wrapper (drop-in replacement) from sentry_mandate import WorkerWrapper # Lock token issued by the Orchestrator's Admin Client # Encodes: agent_id, mandate_hash, budget_ceiling, expiry client = WorkerWrapper( lock_token="eyJhZ2VudCI6ICJjYXJsYm90LWhpdmUtMDciLC...", tee_endpoint="https://proxy.sentrymandate.network", ) # Identical OpenAI-compatible interface # Under the hood: prompt encrypted locally → routed to TEE Enclave # → Mandate rules evaluated → zkTLS receipt generated → response returned response = client.chat.completions.create( model="gpt-4", messages=[{"role": "user", "content": "Transfer $420 to vendor-0x9f3..."}], ) # Every response includes a cryptographic receipt receipt = response.sentry_receipt print(receipt.tee_attestation) # Hardware-signed attestation bundle print(receipt.zktls_proof) # Cryptographic proof of API call print(receipt.mandate_verdict) # PASS | DENY | BUDGET_EXCEEDED print(receipt.cost_usd) # Exact cost: $0.0847 print(receipt.merkle_index) # Position in 10-min commitment root
Orchestrator → Agent Communication Flow
The 180-Day Path to Mainnet
Centralized SaaS to Fully Permissionless Tokenized Infrastructure — Complete Execution Plan
This section proves: the 27-week path from hardware prototype to mainnet genesis has explicit exit gates — Phase N+1 does not begin until Phase N deliverables are verified.
Purpose: This document stitches the entire SentryMandate architecture into a chronological execution roadmap. It transitions the protocol from a centralized, hardware-secured SaaS product into a fully permissionless, tokenized infrastructure network.
Wk 1-4 Wk 5-10 Wk 11-14 Wk 15-20 Wk 21-26 Wk 27+ +-----------+ +--------------+ +--------------+ +--------------+ +--------------+ +--------------+ | PHASE 0 | | PHASE 1 | | PHASE 2 | | PHASE 3 | | PHASE 4 | | PHASE 5 | | Hardware --> SaaS GTM & --> Settlement --> "Vanguard" --> "Crucible" --> MAINNET | | & Crypto | | Revenue | | & Transparency| | Testnet & | | Beta & | | GENESIS | | Core | | Generation | | Layer | | Marketplace | | Chaos Drills | | | +-----------+ +--------------+ +--------------+ +--------------+ +--------------+ +--------------+ TEE Enclave L2 Sequencer L1 Contracts Federated Ops Permissionless TGE zkTLS Client SentryMandate SDK Public Explorer Shadow Slash Adversarial Test Scenarios Live Slashing Mandate Engine Dashboard+Stripe CommitmentLedger IP-NFT Market Reputation Eng Insurance Pool FeeRouter Watcher Network Buy-and-Distribute
Weeks 1-4 — Build the irreversible execution engine
Weeks 5-10 — Ship revenue-generating product
Weeks 11-14 — Move evidence to public chain
Weeks 15-20 — Decentralize the execution layer
Weeks 21-26 — Open network, chaos drills
Week 27+ — TGE, live slashing, insurance pool
Objective: Build the irreversible execution engine. All code targets enclave-native execution from Day 1, minimizing refactoring for decentralization.
| Milestone | Deliverables |
|---|---|
| The TEE Enclave Image | Compile the SentryEnclave.eif for AWS Nitro. Build the internal state machine that generates ephemeral keys and signs Attestation Bundles entirely in isolated RAM. |
| zkTLS Integration | Embed the multiparty computation client (e.g., TLSNotary) into the enclave to generate cryptographic receipts from api.openai.com and api.anthropic.com. |
| Deterministic Mandate Engine | Write the stateless rule evaluator and canonical JSON serializer to guarantee identical inputs always produce identical policy decisions across any node. |
Deliverables Checklist
SentryEnclave.eifcompiled and booting on AWS Nitro- Ephemeral key generation verified inside enclave RAM
- zkTLS client (TLSNotary) integrated and generating receipts
- Receipt parsers for OpenAI and Anthropic
total_costheaders - Canonical JSON serializer passing determinism tests
- Stateless rule evaluator (endpoint regex, spend limit checks)
- Attestation Bundle generator matching
EVIDENCE_SCHEMA.md
Objective: Ship a revenue-generating product. SentryMandate acts as the sole, centralized Operator Node. Enterprises pay in fiat.
| Milestone | Deliverables |
|---|---|
| The L2 Sequencer | Build the high-throughput Go/Rust backend that manages the SentryMandate micro-reservations and generates 10-minute Merkle Roots of all TEE bundles. |
| The SentryMandate SDK | Release the Python/TypeScript packages with strict separation of concerns. |
| Enterprise Dashboard | Deploy the React frontend. Integrate Stripe for fiat SaaS subscriptions. Build the visual Mandate template creator. |
Deliverables Checklist
- L2 Sequencer handling micro-reservations at target throughput
- 10-minute Merkle Root generation pipeline
sentry-mandatePython package publishedsentry-mandateTypeScript package published- Admin Client: budget provisioning + lock token generation
- Worker Wrapper: drop-in OpenAI SDK replacement
- Native wrappers for CrewAI, LangChain, AutoGen
- React Enterprise Dashboard deployed
- Stripe fiat billing integration live
- Visual Mandate Builder UI functional
Objective: Shift the trust model. Move cryptographic evidence from internal databases to public Data Availability layers. Prove to early customers that SentryMandate cannot alter their audit logs.
| Contract | Responsibility |
|---|---|
| CommitmentLedger.sol | Accepts the 10-minute Merkle Roots from the L2 Sequencer. |
| FeeRouter.sol | The Buy-and-Distribute engine that takes simulated USDC fees and market-buys testnet SENTRY. |
| OperatorRegistry.sol | The staking contract enforcing PCR hardware attestations. |
The Public Explorer lets enterprises paste a request_id to verify TEE signatures and Merkle proofs against the blockchain. "Don't trust our database; verify the cryptography."
Deliverables Checklist
CommitmentLedger.soldeployed to testnetFeeRouter.soldeployed with simulated Buy-and-Distribute logicOperatorRegistry.soldeployed with PCR attestation verification- Public Explorer web portal live
- End-to-end verification:
request_idto TEE signature to Merkle proof to L1
Objective: Decentralize the execution layer. Allow external DevOps firms to route traffic and launch the tokenized Mandate economy.
| Milestone | Deliverables |
|---|---|
| Federated Onboarding | Allowlist 10 trusted infrastructure partners. They boot their own AWS Nitro instances using the official image and register on-chain using testnet SENTRY. |
| Shadow Slashing | Release the open-source Watcher Node client. Begin "Proof-of-Vigilance" monitoring subsidy. Run Slashing Module in Shadow Mode to tune out false positives. |
| Mandate Marketplace | Deploy IP-NFT contracts. Allow AI Governance Architects to mint compliance templates. Activate Flat-Fee royalty routing logic. |
Deliverables Checklist
- 10 allowlisted operators running their own Nitro instances
OperatorRegistryenforcing PCR checks for federated nodes- Open-source Watcher Node client released
- Proof-of-Vigilance monitoring subsidy active
- Shadow Slashing logging (no actual burns)
- Honeypot injection pipeline operational
- IP-NFT contracts deployed
- Mandate template minting functional
- Flat-Fee royalty routing distributing testnet USDC to authors
Objective: Open the network to the public and intentionally try to break the cryptoeconomics.
| Milestone | Deliverables |
|---|---|
| Permissionless Onboarding | Anyone with testnet SENTRY can spin up a TEE proxy or a Watcher Node. |
| Reputation Engine | Activate the Dual-Axis (Character x Competence) Bayesian trust scoring for all testnet agents. |
See Section 15: Testnet Specification for the full Doomsday Drill suite and exit gate criteria.
Deliverables Checklist
- Permissionless node onboarding functional
- All 4 Adversarial Test Scenarios executed and passed
- Reputation Engine scoring agents in real time
- Live slashing active (testnet stake burned on violation)
- Watcher honeypot catch rate: 100% over 14 consecutive days
Objective: Remove the guardrails. Token Generation Event (TGE). Activate live slashing, real capital, and the Dual-Tranche Insurance Pool.
| Milestone | Deliverables |
|---|---|
| Token Generation Event | Deploy the SENTRY token to Ethereum/Base Mainnet. |
| Live Objective Slashing | End Shadow Mode. If a node goes offline or forges a zkTLS receipt, 100% of their staked SENTRY is instantly burned. |
| Dual-Tranche Insurance | Open the Senior Tranche to DeFi LPs for real USDC deposits. Activate dynamic premium pricing based on Agent Reputation Score. |
| Buy-and-Distribute | Activate the FeeRouter to take fiat revenue from Phase 1 SaaS customers, market-buy real SENTRY, and distribute to the active Operator mesh. |
Mainnet Launch Flow
|
v
Shadow Mode ends --> Live Objective Slashing activated
|
v
Senior Tranche opens --> DeFi LPs deposit real USDC
|
v
Reputation Engine prices insurance premiums dynamically
|
v
FeeRouter: SaaS fiat --> market-buy SENTRY --> distribute / burn
|
v
MAINNET IS LIVE: Fully permissionless, fee-sustained, economically secured
Deliverables Checklist
SENTRYtoken deployed to MainnetFeeRouteractively executing market buys- Live slashing operational (Class A: 100% burn)
- Senior Tranche accepting real USDC deposits
- Dynamic premium pricing driven by Reputation Engine
- Buy-and-Distribute engine routing real
SENTRYto operators - All 5 Mainnet Exit Gates from
TESTNET_SPEC.mdpassed
SentryMandate is a protocol that makes the mandate tamper-proof, the evidence unforgeable, and the economics fee-sustained. Every mechanism across these 21 sections survives adversarial conditions at scale.
From the TEE enclave that never reveals a plaintext prompt, to the Watcher network that hunts fraud even when none exists, to the insurance pool that absorbs catastrophic loss without insolvency — every mechanism across these 21 sections survives adversarial markets and stands as the definitive trust layer for the autonomous economy.
The 180-day clock starts now. Revenue first. Decentralization second. Mainnet is the destination. The mandate is the law.