SECTION 01 — ARCHITECTURE LETTER
SentryMandate — Governance Protocol for Autonomous AI Systems
Canonical Terminology
PoGE — Proof of Governed Execution. Hardware-attested proof that a TEE node executed an AI request under policy constraints.
DA Commitment — Data Availability Commitment. Merkle root + blob pointer posted to L1, guaranteeing Watchers can reconstruct evidence.
Watcher Node — Independent auditor that verifies operator bundles, earns Proof-of-Vigilance subsidy, and files fraud proofs.
Dual-Tranche Pool — Insurance architecture: Senior Tranche (USDC, pays claims) + Junior Tranche (staked SENTRY, absorbs slashing).
Burn-and-Mint Equilibrium — Deflationary loop: fees buy SENTRY → distribute to operators; slashed SENTRY is burned permanently.
TEE Enclave — Trusted Execution Environment (AWS Nitro). Isolated RAM where keys are generated and attestation bundles signed.
zkTLS — Zero-Knowledge Transport Layer Security. Cryptographic receipt proving an API call was made without exposing payload.
Mandate — Deterministic policy rule (spend caps, endpoint allow-lists) enforced inside the TEE before every API request.

The Era of the Sovereign Agent

A technical specification for builders and protocol architects from Jared Fritz Helm

This section establishes: the design philosophy — why SentryMandate treats every AI action as a financial transaction requiring hardware-attested proof.

No-go if: the protocol cannot achieve sub-second TEE attestation latency at production throughput.

We are standing at the edge of a fundamental shift in how the internet operates.

For the last three years, AI has been a copilot — a tool that generates text while a human keeps their hands on the steering wheel. That era is ending. We are entering the era of the Sovereign Agent. Autonomous AI agents increasingly handle programmatic transactions — negotiating contracts, purchasing data, provisioning infrastructure, and routing capital — creating demand for enforceable governance layers.

But there is a fatal bottleneck preventing mass enterprise adoption: Financial Accountability.

If you hand a sovereign agent an API key or a programmable wallet today, you are one hallucination, one zero-day exploit, or one prompt-injection attack away from draining your corporate treasury. Enterprises are terrified of this, and rightly so. Decentralization without strict, mathematically enforced accountability is just distributed chaos.

SentryMandate was built to solve this exact problem.

SentryMandate provides the governance execution layer between autonomous agents and external API providers, enforcing policies before transaction settlement.

This is not a simple Web2 proxy, and it is not a decentralized theater project relying on human altruism. SentryMandate is a deterministic, cryptographically enforced, and hardware-secured governance protocol.

What Makes This Architecture Resilient

01 Privacy

Privacy via TEEs and zkTLS

We assume that independent server operators cannot be trusted. SentryMandate nodes run exclusively inside hardware-isolated Trusted Execution Environments (like AWS Nitro Enclaves). We verify the exact cost of an OpenAI or Anthropic API call using Zero-Knowledge proofs (zkTLS) without ever reading the enterprise's proprietary prompt. We prove the spend; we are blind to the data.

Enterprise PromptTEE EnclavezkTLS ProofVerified Spend
02 Scale

Horizontal Scalability via L2 State Channels

Through our SentryMandate SDK, an orchestrator like CrewAI can spawn thousands of sub-agents simultaneously. Instead of bottlenecking the network with global database locks, we use L2 state channels to issue micro-reservation "gift cards" that execute in parallel and refund instantly.

OrchestratorSDK SpawnL2 ChannelsParallel ExecInstant Refund
03 Security

Cryptoeconomic Enforcement Layer

We do not assume good actors; we assume highly capitalized, rational adversaries. Operators must stake a minimum of $10,000 in SENTRY to route traffic. If they forge a log or attempt to bypass a mandate, they are instantly, mathematically slashed by 100% (with a 21-day unbonding period ensuring slashable collateral remains locked). We heavily subsidize an independent network of Watcher Nodes to guarantee that this immune system never sleeps.

Forged Log DetectedWatcher Alert100% SlashNetwork Secured
04 Insurance

Dollar-Denominated Insurance

Enterprises do not want to be insured in volatile crypto tokens. SentryMandate utilizes a Dual-Tranche Insurance Pool. Operator mistakes are paid for by slashing their staked SENTRY (0.1% for downtime up to 100% for forgery), but enterprise overspend guarantees are backed by overcollateralized pools of real USDC stablecoins (MIN_RESERVE_RATIO == 1.25).

Operator StakeTranche A (Burn) | Tranche B (USDC)Enterprise Protection

The Reputation Oracle: Non-Forkable History

Competitors can fork our open-source code, but they cannot fork our history.

Every action routed through SentryMandate generates a cryptographically signed Attestation Bundle, building a verifiable execution history. Third parties can query the Reputation Oracle to validate agent behavior before granting service access, establishing minimum compliance thresholds based on historical evidence.

The Mandate Marketplace enables governance template authors to publish standardized policies as on-chain IP-NFTs. The protocol distributes a share of the 0.5% routing fee to template authors based on adoption, creating incentives for high-quality governance standards.

100%
Cryptographic Attestation Coverage
AAA
Agent Safety Rating Standard
USDC
Royalty Denomination for IP Authors

The Path Forward

The 180-day roadmap prioritizes a centralized SaaS implementation to establish product-market fit while engineering the core protocol for decentralized operation. Each phase progressively migrates infrastructure from centralized control to a permissionless, fee-sustained protocol with on-chain governance.

Phase 1
Centralized SaaS Launch

Deploy the governance platform with paying customers. Validate core protocol mechanics with production usage data and measurable compliance outcomes.

Phase 2
Decentralized Proxy Network

Deploy the zero-trust proxy node network. Enable staking, slashing, and node operator economics. Build network effects through infrastructure partnerships and independent operators.

Phase 3
Permissionless Protocol

Strip away all admin privileges. Launch the Mandate Marketplace, Insurance Layer, and Reputation Oracle. SentryMandate becomes a fully fee-sustained, deflationary protocol owned by its participants.

This protocol addresses a critical infrastructure gap: governance enforcement for autonomous agents with financial constraints.

To the engineers reading this: the standard is perfection. Determinism is non-negotiable.

To the protocol participants: the architecture scales from centralized SaaS to fully permissionless operation without breaking invariants.

Let's build.

Jared Fritz Helm
Founder, SentryMandate

Architecture Specification

sentry-mandate-architecture.yaml
protocol:
  name: "SentryMandate"
  tagline: "Governance Protocol for Autonomous AI"
  position: "Intermediary between agent intent and spend"

privacy_layer:
  execution_env: "Trusted Execution Environments (TEEs)"
  provider: "AWS Nitro Enclaves"
  verification: "zkTLS — Zero-Knowledge Transport Layer Security"
  data_visibility: "Blind to prompt content, proves spend amount"
  trust_model: "Operators assumed untrusted by default"

scalability_layer:
  sdk: "SentryMandate SDK"
  orchestrator: "CrewAI compatible"
  mechanism: "L2 State Channels — Micro-Reservations"
  parallelism: "Thousands of sub-agents simultaneously"
  refund_policy: "Instant refund on unused micro-reservations"

security_layer:
  model: "Cryptoeconomic Enforcement Layer"
  assumption: "Highly capitalized rational adversaries"
  staking: "$10,000 minimum (SENTRY), 21-day unbonding"
  slashing: "0.1% downtime | 5% mandate violation | 100% forgery/equivocation"
  watchers: "Subsidized independent Watcher Node network"

insurance_layer:
  model: "Dual-Tranche Insurance Pool"
  tranche_a: "Operator staked token burn"
  tranche_b: "USDC reserves (MIN_RESERVE_RATIO 1.25, MAX_EPOCH_DRAWDOWN 20%)"
  denomination: "Dollar-denominated — no crypto volatility"

defensibility:
  asset: "Trust Oracle — Reputation data"
  mechanism: "Cryptographic Attestation Bundles"
  output: "AAA Safety Ratings for autonomous agents"
  defensibility: "History cannot be forked"

execution:
  timeline: "180-day sprint"
  phase_1: "Centralized SaaS — immediate revenue"
  phase_2: "Decentralized proxy network"
  phase_3: "Permissionless deflationary protocol"
  endgame: "Strip admin privileges — fully fee-sustained"

Threat Model

Attack Vector Risk Level SentryMandate Defense Mechanism
Prompt Injection Spend Drain Critical Pre-call budget enforcement via Zero-Trust Proxy mandate.spend_cap
API Key Exfiltration Critical Keys never leave TEE hardware isolation boundary tee.key_isolation
Operator Log Forgery High Watcher Nodes detect and trigger 100% slash slash.full_burn
Infinite Loop Spend High Per-call and daily spend caps with real-time decrement budget.realtime
Unauthorized Tool Access High Mandate Engine tool restriction enforcement mandate.tool_acl
Single Point of Failure Medium Decentralized node routing with automatic failover routing.failover
Node Censorship Medium Agent re-routes to alternative node operator routing.anti_censor
Volatile Insurance Payouts Medium USDC stablecoin reserves eliminate crypto volatility insurance.usdc_pool

Vision Quantified

180 days
Sprint to Revenue-Generating SaaS
100%
Slashing Penalty for Mandate Violations
Blind
Zero Data Visibility — Prove Spend Only
1000s
Parallel Sub-Agents via L2 Channels
The SentryMandate Equation
Agent Intent + Financial Accountability + Hardware Isolation + Cryptoeconomic Enforcement = Governed Autonomous Agent Economy
Protocol Revenue Model
Revenue = Protocol Fee (0.5%) × Total Governed Agent Spend + Marketplace Fees + Insurance Premiums
Next → Section 02: Thesis formalizes the execution model into a six-phase deployment.
SECTION 02 — THESIS

Governance Protocol for the AI Agent Economy

The cryptoeconomic enforcement layer between AI agents and money — the full strategic thesis

This section proves: a six-phase execution plan can transition SentryMandate from centralized SaaS to fully permissionless infrastructure in 27 weeks.

No-go if: Phase 0 TEE enclave fails PCR0 reproducible builds, invalidating Invariant I.1.
0 Hardware Core Wk 1–4 TEE Enclave zkTLS · Mandate Engine 1 SaaS + SDK Wk 5–10 L2 Sequencer SentryMandate SDK 2 Settlement Wk 11–14 L1 Contracts CommitmentLedger 3 Vanguard Wk 15–20 Federated Ops Shadow Slashing 4 Crucible Wk 21–26 Permissionless Doomsday Drills 5 Mainnet Wk 27+ TGE · Live Slashing Insurance Pool

Core Thesis

SentryMandate is building the governance layer between AI agents and money.

Every autonomous AI agent that spends money — on LLM calls, APIs, tools, compute, code execution — requires:

Today: thousands of developers experimenting with AI agents. Trajectory: autonomous agents increasingly managing programmatic spend across enterprise APIs.

The protocol operates as an intermediary between autonomous agents and external API providers.

Phased Execution Plan

We execute in six progressive phases, each expanding trust boundaries:

PhaseTimelineCore DeliverablesTrust Model Shift
Phase 0Wk 1–4TEE Enclave image, zkTLS integration, Deterministic Mandate EngineCentralized but hardware-attested
Phase 1Wk 5–10L2 Sequencer, SentryMandate SDK (Admin Client + Worker Wrapper), Enterprise Dashboard + StripeSingle-operator SaaS with cryptographic audit
Phase 2Wk 11–14CommitmentLedger.sol, FeeRouter.sol, OperatorRegistry.sol, Public ExplorerEvidence anchored to L1 — "Don't trust; verify"
Phase 3Wk 15–20Federated Operator onboarding (10 nodes), Shadow Slashing, Watcher Network, IP-NFT Marketplace v1Federated multi-operator with shadow enforcement
Phase 4Wk 21–26Permissionless node onboarding, 4 Doomsday Drills, Reputation Engine activation, live testnet slashingPermissionless with adversarial chaos testing
Phase 5Wk 27+TGE, Live Objective Slashing (100% burn), Dual-Tranche Insurance, Buy-and-Distribute FeeRouterFully permissionless, self-sustaining, economically secured

Phase 1 — Enterprise SaaS

01 Engine

Mandate Engine

  • Spend caps (daily, per-call, per-tool)
  • Tool restrictions (no code execution, no file system access, etc.)
  • Approval thresholds
  • Human-in-the-loop gating
  • Kill switches
  • Audit logging
02 Proxy

Zero-Trust Proxy

  • API key isolation
  • Budget enforcement before call execution
  • LLM call logging
  • Tool call enforcement
03 Dashboard

Dashboard

  • Treasury view (where funds live)
  • Mandate management
  • Spend analytics
  • Violation alerts
  • Risk scoring
04 Managed

Managed Proxy Service

  • Hosted infrastructure
  • SLA-backed uptime
  • Compliance-ready logs

Phase 1 Economic Model

Phase 1 Deliverables

Phase 2 — Zero-Trust Proxy Network

Core Mechanism

Decentralized proxy node network processes governed LLM calls.

1. Agent submits request2. Node validates mandate3. Budget confirmed4. Call forwarded to LLM5. Spend recorded6. Immutable log created

Operator Earnings

  • Per-request fee
  • Staking rewards (5-15% APY target)
  • Governance participation

Slashing Risks

  • Mandate violations
  • Key leakage
  • Spend forgery
  • Censorship

Target Operators

  • Infrastructure companies
  • Cloud providers
  • LLM providers
  • DevOps firms
  • Independent operators

Phase 2 Deliverables

Protocol Fee Model

Revenue Layer: Spend Volume Fee

Thin fee on all governed LLM calls.

protocol-fee-model.yaml
fee_example:
  agent_spend: "$1.00"
  protocol_take: "0.5% of routed spend ($0.005 per $1.00)"
  at_scale: "$1B annual volume: 0.5% = $5M/year"

fee_distribution:  # 0.5% of routed spend
  - "70% → Node Operators (Buy-and-Distribute)"
  - "20% → Insurance Reserve (USDC)"
  - "10% → Protocol Treasury (DAO governance)"
Protocol Revenue at Scale
At $1B annual volume: 0.5% protocol fee = $5M/year in protocol revenue

Protocol Fee Deliverables

Mandate Marketplace

Mandates become transferable governance IP.

1. Bank creates compliance mandate2. Publishes template3. Other institutions license it4. Author earns royalty5. SentryMandate takes marketplace fee

Stakeholders

  • Compliance teams
  • AI safety researchers
  • Consultants
  • Auditors
  • Industry associations

Product Requirements

  • Template publishing
  • Version control
  • Mandate certification
  • Ratings system
  • Royalty engine
  • License enforcement

Marketplace Deliverables

Insurance + Guarantees Layer

Staked collateral backs financial guarantees.

"This agent is governed under a mandate backed by $10K collateral."

Violation DetectedDispute mechanism triggersOn-chain evidence reviewedCollateral used for remediation
USDC
Insurance premium share
Yield
Staking yield revenue
Fee
Claims processing fee

Insurance Deliverables

Verified Agent Reputation Layer

Governed activity produces an immutable track record.

Reputation Metrics

  • Calls processed
  • Violations
  • Completion rate
  • Spend stability
  • Mandate compliance history

Use Cases

  • API providers require minimum reputation
  • Enterprises require minimum score
  • Agents advertise reputation

Historical reputation data is non-forkable. This becomes the non-forkable execution history.

Reputation Deliverables

Stakeholder Win Matrix

See Section 03: Vision for the full Architecture Role / Value Matrix defining all seven participant categories.

Societal Narrative

SentryMandate provides:

Universal Safety Standard

HTTPS for AI agents — a baseline governance layer that becomes the default for every autonomous deployment.

Democratic Governance

Communities vote on standards. Financial protection through collateral. Accountability for autonomous systems.

Regulatory Alignment

Provides what regulators need without centralized control. Audit trails, spend limits, and kill switches baked into protocol.

This is the protocol's alignment layer — governance that serves network participants, not extractive intermediaries.

Defensibility Strategy

See Section 03: Vision → Technical Defensibility for the full defensibility progression analysis.

Aggressive Roadmap

Next 90 Days
Foundation Sprint

Scale SaaS adoption. Harden mandate engine. Launch managed proxy. Publish protocol whitepaper draft.

6 Months
Network Bootstrap

Node testnet. Staking model. Reputation beta. Mandate template publishing.

12 Months
Protocol Launch

Protocol launch. Marketplace live. Insurance mechanism live. Governance token operational.

Progressive Decentralization Path

1. Centralized SaaS2. TEE-backed proxy network3. Reputation + insurance layer4. Permissionless node operation5. On-chain governance
Next → Section 03: Vision defines value accrual mechanics and the participant incentive matrix.
SECTION 03 — VISION

The Case for Decentralized Implementation

Economic architecture for decentralized AI governance — fee structure, stakeholder incentives, and protocol alignment

This section proves: every fee, stake, and slash maps to a specific security mechanism — no value accrual without cryptoeconomic purpose.

No-go if: protocol fee revenue cannot sustain the Watcher Proof-of-Vigilance subsidy after token emission decay.
SENTRY MANDATE Core Contrib. SENTRY Stakers TEE Proxy Operators Mandate Curators Agent Developers Orchestrators Watcher Nodes token vest + PCR0 audit delegate + govern fees + attestations IP-NFT royalties Sentry Score budget + mandate fraud proofs

Core Insight

Autonomous agents that transact require governance. SentryMandate acts as the execution intermediary, enforcing policies before transaction settlement. As autonomous AI deployment scales, governance protocols become critical infrastructure that all agent transactions route through.

Value Accrual & Cryptoeconomic Security

01 Protocol Fee

Protocol Fee (0.5%)

Fees fund the Watcher monitoring subsidy, ensuring the network's immune system never starves (Invariant II.2).

  • A 0.5% fee on every governed LLM call is split: 70% to TEE Proxy Operators via Buy-and-Distribute, 20% to Insurance Reserve (USDC), 10% to Protocol Treasury
  • At $1B annual transaction volume, this generates $5M/year — funding continuous fraud-proof verification across the network
  • Security guarantee: The Watcher subsidy ensures that monitoring coverage remains economically viable even during low-activity epochs, preventing gaps in fraud detection
  • Invariant linkage: Fee flow is hard-coded at the smart-contract level; parameter changes require governance vote with 7-day timelock
02 Staking

Staking

$10,000 minimum stake prevents Sybil attacks; 21-day unbonding ensures fraud proofs finalize before withdrawal.

  • Sybil resistance: The $10K minimum stake makes it economically infeasible to spin up disposable operator identities to evade reputation consequences
  • Unbonding window: 21-day withdrawal delay exceeds the maximum fraud-proof challenge period (14 days), ensuring slashable collateral remains locked until all pending disputes resolve
  • Delegation model: SENTRY stakers delegate stake to operators, sharing both rewards and slashing risk — aligning delegator incentives with operator honesty
  • Security guarantee: Combined stake across all active operators forms the network's economic security budget; total stake must exceed maximum extractable value for any single epoch
03 Slashing

Slashing

100% equivocation slash (Invariant II.1) makes cryptographic fraud economically suicidal.

  • Equivocation (Invariant II.1): An operator who signs two different attestations for the same request loses 100% of staked collateral — MIN_SLASH_EQUIVOCATION == 100%
  • Liveness failure: Operators who fail to submit attestation bundles within the epoch window face progressive slashing (1% per missed epoch, capped at 10%)
  • Corruption cost (Invariant II.3): cost_of_corruption > extractable_value is enforced by ensuring minimum stake always exceeds maximum single-epoch extractable value
  • Security guarantee: Slashed funds are split between the reporting Watcher (30-50% bounty) and the insurance Senior Tranche, simultaneously rewarding vigilance and recapitalizing the safety net
04 Insurance

Insurance Premiums

Premiums capitalize the Senior Tranche (USDC), maintaining MIN_RESERVE_RATIO ≥ 1.25 (Invariant III.2).

  • Senior Tranche (USDC): Enterprise insurance premiums flow into a USDC-denominated Senior Tranche, ensuring claims are paid in stable value — not volatile tokens
  • Reserve ratio (Invariant III.2): MIN_RESERVE_RATIO ≥ 1.25 means the Senior Tranche always holds at least 125% of maximum potential epoch liability
  • Drawdown cap (Invariant III.3): MAX_EPOCH_DRAWDOWN == 20% prevents catastrophic depletion — no single epoch can drain more than one-fifth of the tranche
  • Security guarantee: When an agent violates its mandate, enterprise losses are paid from overcollateralized USDC reserves with deterministic claim adjudication via on-chain evidence
05 Identity

Verified Agent Identity and Reputation

The audit trail creates a reputation system for AI agents:

  • Agent X has 10,000 governed LLM calls, $0 in mandate violations, 99.8% completion rate
  • That reputation score has value — like a credit score for AI agents
  • Service providers, APIs, and platforms could require a minimum SentryMandate reputation score before granting access
  • Who wins: Execution history is non-forkable. SentryMandate controls the reputation oracle. Partners who integrate reputation checks into their platforms benefit from safer AI interactions
  • Network benefit: Bad actors and poorly governed agents get naturally filtered out. Reputation creates market pressure for good AI governance without regulation
06 Enterprise

Enterprise Hybrid (Phase 1 Revenue)

While the decentralized protocol matures, the centralized product generates revenue:

  • SaaS subscription (current model) — teams pay monthly for dashboard, mandates, budgets
  • Managed proxy service — hosted zero-trust proxy with SLA guarantees
  • Enterprise contracts — custom deployment, compliance features, dedicated support
  • Who benefits: The team validates product-market fit with real revenue. SENTRY stakers see protocol usage metrics before decentralization
  • Network benefit: AI governance is accessible today, not waiting for the protocol to launch

Architecture Role / Value Matrix

ParticipantProtocol RoleIncentive MechanismAccountability
Core ContributorsProtocol development, enclave image maintenance20% token allocation, 4-year vest with 1-year cliffCode is open-source; enclave images are auditable via PCR0
SENTRY StakersDelegate stake to operators, participate in governanceShare of Buy-and-Distribute flow proportional to delegated stakeDelegated stake subject to slashing if chosen operator misbehaves
TEE Proxy OperatorsRun enclave nodes, execute PoGE workflow, submit attestation bundles70% of protocol fee revenue via Buy-and-Distribute$10K minimum stake; 100% slash for equivocation; 21-day unbonding
Watcher NodesVerify operator bundles, file fraud proofs, submit Coverage ProofsTri-Layer: Dispute bounty (30-50%) + Proof-of-Vigilance subsidy + Reputation leverageHoneypot detection required; false "All Clear" = ejection from subsidy pool
Mandate CuratorsAuthor and publish governance templates as IP-NFTsFlat-fee USDC royalties per agent/subnet/monthTemplates are immutable once published; new version = new hash
OrchestratorsProvision agent budgets via Admin Client, manage Mandate assignmentsDeterministic spend control; insurance coverage for agent overspendExplicit on-chain signature required to migrate agents to new template versions
Agent DevelopersBuild autonomous agents using Worker Wrapper SDKDrop-in OpenAI SDK replacement with built-in compliance and audit trailAgent reputation (Sentry Score) derived from on-chain compliance history

Systemic Invariants

The non-negotiable properties the protocol must satisfy at every block height

I Execution

Deterministic Execution

Every AI action is evaluated inside a TEE Enclave against a canonical Mandate ruleset. Identical inputs produce identical policy decisions on any node. Enforced by Invariant I.1: PCR0 must match canonical SentryEnclave.eif.

II Accountability

Economic Accountability

Misbehavior is not punished by committees — it is punished by mathematics. Equivocation triggers MIN_SLASH_EQUIVOCATION == 100% (Invariant II.1). The cost of corruption always exceeds the value extractable (Invariant II.3).

III Solvency

Capital Solvency

Enterprise losses are paid in USDC from the Senior Tranche, not volatile tokens. MAX_EPOCH_DRAWDOWN == 20% prevents bank runs (Invariant III.3). MIN_RESERVE_RATIO == 1.25 ensures overcollateralization at all times (Invariant III.2).

Technical Defensibility

Protocol defensibility increases with each layer of decentralization:

Layer Defensibility Level Analysis
SaaS Low Anyone can build a spend-check API
Proxy Network Medium Network effects of node operators, but forkable
Audit Trail + Reputation High Historical data is non-reproducible. An agent's 12-month track record can't be forked
Marketplace + Insurance Very High Two-sided marketplace with embedded financial products. High switching costs due to non-forkable history

Protocol Summary

SentryMandate is a governance protocol for the AI agent economy. Phase 1 is a centralized SaaS delivering AI spending controls — this validates product-market fit and generates near-term revenue. Phase 2 decentralizes into a zero-trust proxy network where node operators stake collateral and earn per-request fees. Phase 3 layers on the reputation oracle and insurance pool, making autonomous AI commercially viable. Each phase builds on the previous — SaaS validation, then proxy network fees, then reputation and insurance layers backed by non-forkable execution history.

Progressive Decentralization Path
Centralized SaaS (revenue validation) → Decentralized Proxy Network (node operator economics) → Reputation Oracle + Insurance (protocol-level trust infrastructure)
Next → Section 04: Architecture details the TEE + zkTLS execution layer.
SECTION 04 — ARCHITECTURE

Proof of Governed Execution

Verifiable proxy infrastructure powered by TEEs, zkTLS, and net-deflationary tokenomics

This section proves: Proof of Governed Execution (PoGE) eliminates the Execution Oracle Problem — nodes cannot leak keys, forge logs, or deviate from Mandate policy.

No-go if: zkTLS multiparty computation adds >200ms latency per API call, making the proxy commercially unviable.
AI AGENT Encrypted Request + ZK Proof AWS NITRO ENCLAVE TEE v2.0 TRUSTED EXECUTION Mandate Evaluation + Routing zkTLS CHANNEL TLSNotary Protocol EXTERNAL LLM api.openai.com VERIFIED Receipt 0x3f...a1 1 2 3 4

This specification defines the foundational architecture of the SentryMandate protocol. It resolves critical vulnerabilities inherent in standard proxy networks by implementing Proof of Governed Execution (PoGE), establishing a legally compliant Stake-to-Access value accrual model, and deploying Tranched Risk Pools to prevent systemic economic collapse.

1. Execution Layer: Proof of Governed Execution (PoGE)

Solves: The Execution Oracle Problem — Key Leakage & Log Forgery

Standard proxy nodes cannot cryptographically prove correct API execution without exposing the payload. SentryMandate replaces the standard proxy with a Verifiable Proxy utilizing TEEs and zkTLS.

1.1 The PoGE Workflow

The PoGE workflow proceeds in four steps: (1) Agent sends encrypted request with Mandate constraints, (2) TEE node evaluates the mandate and routes via zkTLS, (3) Node generates a cryptographic receipt proving correct execution without revealing the payload, (4) Node submits the receipt to claim its fee share.

See Section 07: Protocol Flow for the complete end-to-end execution lifecycle with flow diagrams.

2. Value Accrual Layer: Net-Deflationary Work Token

Solves: The Regulatory Death Trap — Unregistered Securities under Howey

Distributing protocol revenue to passive holders triggers regulatory risk. SentryMandate uses a Stake-to-Access (Work Token) model with Burn-and-Mint / Buy-and-Distribute Equilibrium. Value accrues exclusively to active participants through programmatic mechanics.

2.1 The Fiat-to-Token Pipeline

Enterprise USDC fees are programmatically market-bought into SENTRY and distributed exclusively to active operators who submit valid PoGE receipts. Slashed tokens are 100% burned, creating a net-deflationary loop at target volume.

See Section 11: Token Flow Architecture for the complete fiat-to-token pipeline, fee routing, and burn mechanics.

3. Economic Security Layer: Tranched Risk Pools

Solves: The Insurance Death Spiral — Systemic Slashing Events

Backing enterprise guarantees with volatile tokens risks a "death spiral" during mass overspend events. SentryMandate structures insurance like a DeFi lending market.

3.1 Tranche Architecture

SentryMandate structures insurance as a Dual-Tranche pool: a Senior Tranche (USDC) that pays enterprise claims in real dollars, and a Junior Tranche (staked SENTRY) that absorbs operator-specific slashing. The two tranches are structurally isolated.

See Section 10: Insurance Engine for full tranche mechanics, reserve ratios, and drawdown limits.

4. Hardcoded Protocol Parameters (v1.0)

The following parameters are calibrated to incentivize early operator participation, deter Sybil attacks, and sustain protocol operations through transaction-proportional fees.

4.1 Core Fee Engine

ParameterValueRationale
Protocol Fee 0.5% of routed spend Thin enough to mimic standard infrastructure costs; highly scalable at volume.
Node Operator Share 70% Aggressively drives the network effect and subsidizes operator compute costs.
Insurance Reserve Share 20% Converted to USDC to continuously capitalize the Senior Tranche.
Protocol Treasury Share 10% Funds ongoing R&D, DAO operations, and ecosystem grants.

4.2 Security & Slashing Constants

ParameterValueEnforces
Minimum Operator Stake $10,000 (in SENTRY) High enough to prevent Sybil attacks; low enough for DevOps adoption.
Unbonding / Cooldown 21 Days Ensures malicious actors cannot withdraw stake before fraud proofs finalize.
Downtime Slash 0.1% Soft penalty for minor unresponsiveness.
Accidental Mandate Violation 5.0% Medium penalty for misconfigured node logic.
Forged zkTLS / Key Leakage 100% Catastrophic penalty and permanent ban for intentional malicious acts.

4.3 Token Allocation (Fixed Supply: 1,000,000,000 SENTRY)

Allocation BucketPercentageVesting Schedule
Ecosystem & Node Emissions 40% Programmatic exponential decay over 8 years.
Core Contributors & Team 20% 4-year linear vest, 1-year cliff.
Early Backers 15% 3-year linear vest, 1-year cliff.
Protocol Treasury 15% Controlled by DAO governance.
Mandate Liquidity Mining 10% Incentive pool for top compliance/security researchers to populate the marketplace.
1,000,000,000
Total Fixed Supply (SENTRY)
400,000,000
Ecosystem Emissions (40%)
8
Emission Decay Duration
21
Unbonding Period

5. The Definitive Non-Forkable History

Cryptographic Audit Ledger

Because SentryMandate utilizes zkTLS and TEEs, the resulting audit trail is not just a standard database log — it is a cryptographically verifiable ledger of every compliant action an AI has ever taken.

The Sentry Score

Institutions will demand a Sentry Score. This on-chain, non-forkable reputation data — built on proven compliance — forms an durable technical defensibility competitors cannot replicate by copying code.

Non-Forkable

Reputation data is cryptographically bound to on-chain execution history. Forking the code does not fork the trust.

Hardware-Attested

Every Sentry Score datapoint originates from a verified TEE attestation. No self-reported metrics, no trust assumptions.

Compounding

Network effects deepen with every verified execution, creating compounding defensibility through accumulated execution history.

Assumptions

AWS Nitro TEE hardware is not compromised at the silicon level. The PCR0 attestation chain is cryptographically sound. zkTLS MPC protocol (TLSNotary) is formally verified.

Trust Boundaries

The TEE boundary is the trust perimeter. Outside: untrusted operator host OS, network layer. Inside: encrypted memory, ephemeral keys, attestation signing. The boundary is hardware-enforced, not software-enforced.

On-Chain Enforcement

OperatorRegistry.sol rejects node registration without valid PCR0 matching canonical SentryEnclave.eif (Invariant I.1). CommitmentLedger.sol requires DA inclusion proof with every Merkle root (Invariant I.2).

⚠ Failure Mode

Operator modifies enclave image to exfiltrate API keys or forge attestation bundles.

✓ Defense

PCR0 hardware attestation changes with any image modification. OperatorRegistry.sol rejects mismatched PCR0 instantly. Operator loses routing eligibility and cannot earn fees.

⚠ Failure Mode

zkTLS MPC colluder provides false receipt claiming higher/lower cost than actual.

✓ Defense

TLSNotary requires threshold of MPC parties to agree. Receipts are independently verifiable against LLM provider billing APIs. Discrepancy triggers automatic fraud investigation.

Architecture Summary

  • Execution Layer (PoGE): TEE + zkTLS verifiable proxy replaces trust-based nodes with cryptographic execution proofs
  • Value Accrual (Work Token): Fiat-to-Token pipeline ensures regulatory-compliant, active-participant-only value distribution
  • Risk (Tranched Pools): Senior USDC tranche absorbs catastrophic tail risk; Junior SENTRY handles operator penalties
  • Fee Engine: 0.5% protocol fee split 70/20/10 across operators, insurance, and treasury
  • Deflationary Mechanics: 100% slash-and-burn for malicious actors permanently removes supply
  • Non-Forkable History: Non-forkable Sentry Score creates compounding enterprise defensibility
  • Token Supply: Fixed 1B SENTRY with 8-year exponential emission decay
  • Security: $10K min stake, 21-day unbonding, graduated 0.1%-100% slashing
Next → Section 05: Slashing defines the penalty schedule enforcing these guarantees.
SECTION 05 — SLASHING

Cryptographic Enforcement & Slashing

TEE/zkTLS-powered economic enforcement guaranteeing protocol credibility

This section proves: misbehavior is punished by mathematics, not committees. MIN_SLASH_EQUIVOCATION == 100% is hardcoded and non-negotiable (Invariant II.1).

No-go if: fraud proof verification gas cost exceeds 50% of the slashed stake value at L1 settlement.
FORGED FORGED LOG Invalid Attestation S 100% BURNED Permanent Supply Removal BLOCK N 0xa3f... BLOCK N+1 0xb7e... SLASH TX 0xf1c... BLOCK N+3 0xd2a... BLOCK N+4 0xe8c...

Slashing is the economic enforcement mechanism that guarantees SentryMandate's credibility. The protocol relies on Trusted Execution Environments (TEEs) and cryptographic attestations to enforce objective, mathematically provable slashing, while preserving payload confidentiality.

1. The Evidence Engine

The "Watcher Paradox" dictates that third parties cannot view encrypted AI payloads to verify compliance without violating enterprise privacy. Solution: Proxy nodes operate inside hardware-secured TEEs (e.g., AWS Nitro Enclaves, Intel SGX).

01The Enclave

The SentryMandate mandate engine runs inside the TEE.

02Execution

The Agent sends encrypted request to the Enclave. It decrypts, evaluates the Mandate, routes via zkTLS, and encrypts the response back.

03Attestation Bundle

The Enclave generates a cryptographic proof: "I processed Request X per Mandate Y, resulting in Spend Z." Plaintext is never exposed.

04On-Chain Verify

The SentryVerifier contract checks the Enclave's signature. If valid, state is updated and operator earns rewards.

2. Slashable Entities & Offenses

Only Proxy Node Operators (via self-stake) are slashable in v1. Delegators and End Users are exempt. "Selective Refusal" is removed from v1 to allow compliance with local jurisdictional laws.

Class A — Integrity Violations (Auto-Slashable)

Objective, cryptographically proven on-chain. No human arbitration required.

IDOffenseDescription
A1Forged AttestationOperator submits a spend record or state transition that lacks a valid TEE signature.
A2Equivocation (Double-Signing)Operator submits two conflicting state updates for the same request sequence/nonce.
A3Mandate BypassOperator submits a valid TEE signature, but the transaction trace proves a required approval threshold was skipped.

Class B — Liveness Violations (Watcher-Initiated)

Watchers cannot read payloads, but they can verify network health.

IDOffenseDescription
B1UnresponsivenessOperator fails to respond to cryptographic heartbeat pings from the network.
B2SLA BreachOperator consistently drops below the 99.9% uptime threshold required by the Active Routing Set.

Class C — Key Negligence (Subjective / Arbitration)

IDOffenseDescription
C1Proven Key LeakageOperator negligence leads to extraction of enterprise API keys from infrastructure outside the TEE, resulting in unauthorized spend. Requires human governance arbitration.

3. Penalty Matrix & Economics

Slashing must be severe enough to deter theft but forgiving enough of minor hardware hiccups. Slashed funds are primarily burned to create net-deflationary pressure for SENTRY.

Full Penalty Matrix

Offense ClassExampleSeverityPenalty / Slash %Post-Slash Action
Class B (Minor) Missed heartbeats (1 hr) Level 1 0.1% Warning, temporary traffic reduction
Class B (Major) Extended downtime (>24 hrs) Level 2 1% – 5% Chilled (removed from routing set for 7 days)
Class C (Subjective) API Key Leakage Level 3 10% – 50% Governance arbitration, potential jail
Class A (Critical) Forged TEE Attestation Level 4 100% Total stake burn, permanent protocol ban

Slashed Stake Distribution

AllocationPercentagePurpose
Burned50%Permanently removed from supply (deflationary security).
Victim Compensation / Insurance30%Sent to the USDC conversion pool to backstop enterprise overspend claims.
Challenger Reward20%Paid to the Watcher/Fisherman who submitted the valid proof (Class B only).
50%
Burned (Deflationary)
30%
Insurance Reserve
20%
Challenger Reward
Slash_Schedule: Downtime = 0.1% | Mandate Violation = 5.0% | Equivocation/Forgery = 100% + permanent ban
Minimum_Stake = $10,000 (SENTRY) | Unbonding = 21 days | Enforced by SlashingModule.sol (Invariant II.1)

4. Dispute & Slashing Flow

Path 1: The Auto-Slash (Class A)

Operator submits malformed AttestationBundleSentryVerifier.sol rejects signatureSlashingModule.sol triggered100% Slashed + Permanent Ban
1Submission

Operator submits a malformed or forged AttestationBundle to the blockchain to claim their fee.

2Rejection

The SentryVerifier.sol contract automatically rejects the cryptographic signature.

3Trigger

The contract triggers SlashingModule.sol with the full penalty matrix for Class A offenses.

4Execution

The Operator is instantly slashed for 100%, and the node is permanently banned from the protocol.

Path 2: The Watcher Challenge (Class B)

Watcher detects unresponsive nodeChallenger Bond (500 SENTRY) + proofDisputeModule.sol: 12hr window → Operator responds? → Valid TEE attestation = Dismissed | No response = Slashed (1%)
Watcher Challenge Flow (Path 2)
// Path 2: Watcher Challenge (Class B Offenses)

Watcher detects unresponsive node
        |
        v
Watcher submits Challenger Bond (500 SENTRY) + proof
        |
        v
DisputeModule.sol opens Dispute Window (12 hrs)
        |
        +-- Operator responds with valid TEE attestation
        |   => Dispute dismissed
        |
        +-- Operator fails to respond
            => Slashed (e.g., 1%)
                |
                +-- Watcher: Bond returned + 20% of slash
                +-- 50% of slash burned
                +-- 30% to Insurance Reserve
1Detection

A Watcher detects a node failing to respond to routing requests.

2Challenge

Watcher submits a Challenger Bond (500 SENTRY) and cryptographic proof of missed heartbeats to DisputeModule.sol.

3Dispute Window

The Operator has a fixed Dispute Window (12 hours) to submit a valid TEE attestation proving they were online.

4Resolution

If the Operator fails, they are slashed (e.g., 1%), the Watcher gets bond back + 20%, and the rest is burned/reserved.

5. Defense Mechanisms: Cooldowns & Timelocks

Prevents operators from executing an attack and immediately withdrawing stake before penalties apply.

MechanismDurationPurpose
Unbonding Period21 DaysWhen an operator initiates an exit, their stake remains locked for 21 days. They continue to process traffic for the first 7 days, and serve as slashable collateral for the remaining 14 days to account for delayed fraud proofs.
Pending Dispute LockUntil resolvedIf a Watcher files a dispute against an Operator, the Operator's unbonding timer is frozen until the dispute is resolved.
Governance Timelocks14 DaysAny changes to slashing parameters require a 14-day timelock, giving operators time to unbond if they disagree with the new network economics.
Assumptions

Fraud proofs are deterministically verifiable on-chain. The Challenger Bond mechanism deters frivolous disputes. At least one honest Watcher monitors each operator's traffic subset.

Trust Boundaries

Slashing is objective — adjudicated by smart contract logic, not committees. Equivocation (signing two outcomes for one request) and zkTLS forgery are Class A violations: 100% slash, permanent ban. No governance override.

On-Chain Enforcement

SlashingModule.sol enforces MIN_SLASH_EQUIVOCATION == 100% as an immutable constant (Invariant II.1). DisputeModule.sol dynamically scales Challenger Bond to bankrupt spam attackers (Invariant II.3).

⚠ Failure Mode

Attacker floods dispute system with frivolous fraud proofs to freeze legitimate operator capital.

✓ Defense

Dynamic Challenger Bond (Invariant II.3): base rate 10% of expected slash. Each failed dispute doubles the attacker’s bond. Exponential cost bankrupts spam before it degrades operator liveness.

⚠ Failure Mode

Operator equivocates — signs two different outcomes for the same request_id.

✓ Defense

MIN_SLASH_EQUIVOCATION == 100% (Invariant II.1). Entire stake burned. Operator permanently blacklisted. No governance parameter can lower this — it’s an immutable Solidity constant.

6. Smart Contract Architecture

ContractResponsibility
OperatorRegistry.solManages node registration, minimum stake ($10,000 SENTRY equivalent), and unbonding queues.
EnclaveVerifier.solStores public keys of authorized TEE images and verifies cryptographic signatures of incoming Attestation Bundles.
DisputeModule.solHandles Challenger bonds, liveness proofs, and the resolution timers.
SlashingModule.solExecutes the penalty matrix, burns tokens, and routes rewards to Watchers and Insurance Reserve.
Next → Section 06: Evidence specifies the attestation bundle format that slashing adjudicates.
SECTION 06 — EVIDENCE

Evidence Schema & Fraud Proofs

Deterministic, cryptographically verifiable, chain-anchored evidence model for objective fraud proofs and automated slashing

This section proves: every attestation bundle is a self-contained, independently verifiable proof — no oracle dependency, no trusted third party.

No-go if: canonical JSON serialization fails determinism tests across enclave image versions.
MERKLE ROOT Root Hash: 0x7f3a...c9e1 H(L) H(R) MANDATE spend_limits allowed_endpoints SHA256(canonical) EXEC REQUEST agent_id + mandate payload_zk_commit delta_spend model zkTLS RECEIPT TLSNotary proof extracted_spend zk_SNARK verified TEE BUNDLE enclave_pubkey COSE_Sign1 PCR measurements ON-CHAIN COMMITMENT LAYER EPOCH 42 merkleRoot EPOCH 43 merkleRoot EPOCH 44 merkleRoot

Define a deterministic, cryptographically verifiable, chain-anchored evidence model that enables objective fraud proofs, automated slashing, and verifiable audit histories — while preserving payload confidentiality for enterprise AI workloads and resolving high-throughput concurrency.

1. Design Principles

#PrincipleDescription
1.1DeterminismGiven (Mandate M, Request R), the policy evaluation must produce identical outputs.
1.2Zero-Knowledge PrivacyPayloads (prompts/responses) are never stored or hashed in plaintext. Only metadata and zkTLS proofs are committed.
1.3Hardware Root of TrustSignatures must originate from TEE Enclave keys, bound to specific Platform Configuration Registers (PCRs).
1.4Commutative State TransitionsBudget updates must use delta-state models (Event Sourcing / CRDTs) to allow asynchronous, concurrent agent execution without sequence locking.

2. Core Evidence Objects

The architecture relies on four fundamental objects that compose the complete evidence chain.

1Mandate Object

The Rules — governance constraints published once by the author and referenced by hash.

2Execution Request

The Intent — metadata-only record of the agent's requested action with ZK commitment.

3zkTLS Receipt

The External Proof — cryptographic evidence of the TLS session with the LLM provider.

4TEE Bundle

The Atomic Evidence Unit — hardware-signed master proof encompassing all other objects.

3. Mandate Object

Defines the governance rules. Published once by the author and referenced by hash thereafter.

Canonical Mandate Format (JSON)
{
  "mandate_id": "UUID",
  "version": "1.0",
  "issuer_pubkey": "0x...",
  "spend_limits": {
    "per_call_max": 5.00,
    "daily_max": 100.00
  },
  "allowed_endpoints": ["api.openai.com", "api.anthropic.com"],
  "approval_threshold": null
}
Mandate Hash (RFC 8785 Canonical JSON)
mandate_hash = SHA256(CanonicalJSON(mandate_object))

4. Solving Concurrency: The Delta Spend Model

To allow an agent to make 50 simultaneous LLM calls, we eliminate budget_state_before. Instead, we track Delta Spend Events. The smart contract calculates the total budget by summing the validated deltas.

4.1 Execution Request Object (Metadata Only)

Execution Request Object (JSON)
{
  "request_id": "UUID",
  "agent_id": "0x...",
  "mandate_hash": "0xabc...",
  "endpoint": "api.openai.com",
  "payload_zk_commitment": "0x...",
  "timestamp": 1708920000
}

Note: payload_zk_commitment is a zero-knowledge hash of the encrypted payload, proving what was sent without revealing the plaintext.

5. The zkTLS Provider Receipt

Because LLM providers don't sign responses, the TEE proxy establishes a zkTLS session (using the TLSNotary protocol or Opacity network) with the provider. The resulting receipt cryptographically proves the TLS session was with a verified certificate and the response contained specific usage data.

zkTLS Provider Receipt (JSON)
{
  "zkTLS_proof_type": "TLSNotary_v1",
  "server_domain": "api.openai.com",
  "extracted_spend_delta": 0.02,
  "cryptographic_proof": "0x[zk_SNARK_proof_data]"
}
Receipt Hash
receipt_hash = SHA256(CanonicalJSON(zkTLS_Receipt))

6. The TEE Attestation Bundle (The Master Evidence)

This is the atomic unit of evidence. It is generated inside the AWS Nitro Enclave (or equivalent TEE) and signed by the Enclave's internal ephemeral key.

6.1 Bundle Structure

TEE Attestation Bundle (JSON)
{
  "bundle_version": "2.0",
  "enclave_pubkey": "0x...",
  "operator_id": "0x...",
  "request_hash": "0x...",
  "mandate_hash": "0x...",
  "policy_decision": "ALLOW",
  "delta_spend": 0.02,
  "receipt_hash": "0x...",
  "timestamp": 1708920005
}

6.2 The Hardware Signature

The TEE signs the bundle hash and wraps it in a CBOR Object Signing and Encryption (COSE) document. This document includes the PCRs (Platform Configuration Registers) which prove to the blockchain that the exact, audited SentryMandate code was running.

Hardware Signature (COSE_Sign1)
bundle_signature = COSE_Sign1(enclave_private_key, bundle_hash, PCR_measurements)

7. Storage & Merkle Commitments

Storing every bundle on-chain is prohibitively expensive. We use a Rollup-style commitment model.

7.1 Off-Chain Storage (Data Availability)

The complete JSON of the Request, the zkTLS Receipt, and the Attestation Bundle are stored in decentralized storage (e.g., Arweave, Celestia, or EigenDA). This ensures Data Availability without on-chain storage costs.

7.2 On-Chain Commitment

Every 10 minutes (an Epoch), the Operator submits a Merkle Root of all bundle_hashes processed, alongside the sum of the delta_spend for each agent.

commitEpoch — On-Chain Commitment (Solidity)
// On-chain transaction submitted by Operator
function commitEpoch(
    bytes32 merkleRoot,
    uint256 epochTotalSpend,
    bytes memory TEE_Signature
) external;

8. Fraud Proof Construction (Auto-Slashing)

Because the system is fully deterministic and backed by TEE/zkTLS, human arbitration is completely removed from Class A (Integrity) violations.

8.1Forged Receipt Proof

If an Operator claims an agent spent $0.02, but the zkTLS proof is invalid:

Input: The zkTLS_Receipt and the Attestation Bundle.

Verification: The smart contract validates the zkTLS SNARK. If Verify(zkTLS) == FALSE, the Operator is auto-slashed 100%.

8.2Mandate Violation Proof

If an Operator routes a call that violates the mandate (e.g., routing to api.hacker.com when only api.openai.com is allowed):

Input: Mandate Object, Attestation Bundle.

Verification: The contract checks if Bundle.endpoint is in Mandate.allowed_endpoints. If not, and policy_decision == ALLOW, the Operator is auto-slashed.

8.3Equivocation Proof

If an Operator tries to hide spend by signing two different bundles for the same request_id:

Input: Bundle_A, Bundle_B.

Verification: If Bundle_A.request_id == Bundle_B.request_id BUT Bundle_A.hash != Bundle_B.hash, the Operator is auto-slashed.

Forged Receipt → Verify(zkTLS) == FALSE → 100% Slash | Mandate Violation → endpoint not in allowed_list → Auto-Slash | Equivocation → same request_id, different hash → Auto-Slash

Evidence Schema Summary

  • Deterministic: Same Mandate + Request always produces identical policy evaluation output
  • Zero-Knowledge: Payloads never stored in plaintext; only metadata and zkTLS proofs committed
  • Hardware Root of Trust: All signatures originate from TEE Enclave keys bound to PCRs
  • Delta Spend Model: CRDTs enable 50+ concurrent LLM calls without sequence locking
  • Rollup Commitments: Off-chain Data Availability with on-chain Merkle root every 10 minutes
  • Automated Fraud Proofs: Three fraud proof types remove all human arbitration from Class A violations
Next → Section 07: Protocol Flow maps the end-to-end request lifecycle.
SECTION 07 — PROTOCOL FLOW

End-to-End Protocol Flow

The complete lifecycle of a governed AI request inside SentryMandate — from provisioning through execution, settlement, and reputation compounding.

This section proves: the full request-to-settlement lifecycle completes in under 10 minutes, with every step cryptographically anchored.

No-go if: Merkle root commitment batch interval exceeds 10 minutes under peak load.
CLIENT LAYER AI Agent Ed25519 Keypair sentry-agent-sdk Enterprise Dashboard Compliance Officer HITL Approval UI micro-res state-ch EXECUTION LAYER (OFF-CHAIN) TEE Proxy Nodes Nitro / SGX Enclave Mandate Eval Engine Attestation Bundles zkTLS Module TLS Session Proxy SNARK Proof Gen zkTLS Receipts LLM APIs api.openai.com api.anthropic.com Custom Endpoints SETTLEMENT LAYER (ON-CHAIN / L2) Registry H_M + Agent ID Staking Bond + Slash Escrow USDC + Micro-Res Reputation Trust Oracle Merkle Root >>> Ethereum / Base L1 — Epoch Rollup Every 10 Minutes

0. High-Level System Topology

SentryMandate operates across three distinct layers, each with dedicated responsibilities.

System Layers
LayerComponents
Client LayerThe AI Agent and the Enterprise Dashboard.
Execution Layer (Off-Chain)The decentralized network of TEE Proxy Nodes utilizing zkTLS.
Settlement Layer (On-Chain/L2)SentryMandate Smart Contracts (Registry, Staking, Escrow, Reputation).
topology.ascii
┌─────────────────────────────────────────────────────────┐
                     CLIENT LAYER                        
            AI Agent  ←→  Enterprise Dashboard           
└────────────────────────────┬────────────────────────────┘
                             
┌─────────────────────────────────────────────────────────┐
                   EXECUTION LAYER                       
         TEE Proxy  ←→  zkTLS  ←→  LLM APIs           
└────────────────────────────┬────────────────────────────┘
                             
┌─────────────────────────────────────────────────────────┐
                   SETTLEMENT LAYER                      
     Registry    Staking    Escrow    Reputation      
└─────────────────────────────────────────────────────────┘

SentryMandate utilizes TEE Enclaves, zkTLS, and a Layer-2 Sequencer to guarantee microsecond latency, zero-knowledge privacy, and mathematically impossible budget overspending.

1. Initialization Phase: Provisioning the Agent

Before an agent can make a single call, the financial and governance rails must be laid.

Step 1
Mandate Creation

The Enterprise Compliance Officer uses the SaaS dashboard to select a template (e.g., "Healthcare Agent Baseline").

Step 2
On-Chain Anchoring

The Mandate is hashed. The hash (H_M) is published to the SentryMandate smart contract.

Step 3
Treasury Escrow

The Enterprise deposits $1,000 USDC into the protocol's Escrow Contract.

Step 4
Agent Key Issuance

The Agent is provisioned with a cryptographic identity (an Ed25519 keypair). The Sentry protocol maps this Agent ID to the Mandate Hash and the Escrow Balance.

2. The Execution Lifecycle (The Fast Path)

The sub-100ms flow for standard, fully autonomous agent requests (no human approval required).

Step 2.1: The Request & Micro-Reservation

To prevent the double-spend problem without introducing global consensus latency, the Agent opens a rapid state channel with a specific TEE Node.

Agent signs request ($2.00 reservation for OpenAI GPT-4o call)
        │
        ▼
TEE Node pings L2 Sequencer: "Does Agent have $2.00 available?"
        │
        ▼
L2 Sequencer locks $2.00 in state channel → returns Lock Token
Micro-Reservation Details
#ActionDetail
1Agent Signs RequestRequests a $2.00 reservation limit for an OpenAI GPT-4o call.
2TEE Pings Sequencer"Does this Agent have $2.00 available in Escrow?"
3Lock Token IssuedL2 Sequencer locks $2.00 in state channel, replies with cryptographic lock token.

Step 2.2: TEE Mandate Evaluation

Decrypt & Evaluate

The Agent sends the encrypted prompt + the lock token to the TEE Node. The TEE Enclave decrypts the payload in memory. The Enclave runs the Mandate Evaluation Engine checking: Is the tool allowed? Is the endpoint allowed? Is the spend within the reservation?

Result: ALLOW

All governance checks pass. The request is approved for forwarding to the target LLM API endpoint via the zkTLS module. No plaintext data ever touches persistent storage.

Step 2.3: zkTLS Routing

TLS Session

The TEE Node opens a zkTLS session with api.openai.com. It forwards the prompt, receives the response within the secure enclave boundary.

zkTLS Receipt

Generates the cryptographic zkTLS receipt — a SNARK proof proving the API call occurred and cost $0.05. This receipt is tamper-proof and publicly verifiable.

Step 2.4: Attestation & Refund

TEE Enclave packages Attestation Bundle
  ├── Request Hash
  ├── zkTLS Receipt
  └── Delta Spend ($0.05)
        │
        ▼
Enclave signs bundle with hardware key
        │
        ▼
L2 Sequencer deducts $0.05 from Escrow
        │
        ▼
Remaining $1.95 instantly unlocked → returned to Agent balance
        │
        ▼
Encrypted LLM response returned to Agent
Attestation Steps
#ActionDetail
1Bundle PackagingTEE Enclave packages Request Hash, zkTLS Receipt, Delta Spend ($0.05) into an Attestation Bundle.
2Hardware SigningEnclave signs the bundle with its hardware key.
3Sequencer SettlementSequencer deducts $0.05 from Escrow, instantly unlocks remaining $1.95 to Agent balance.
4Response DeliveryEncrypted LLM response is returned to the Agent.
Concurrency Guarantee
Sigma(r_i, i=1..n) ≤ B_max

Concurrency Guarantee: To ensure total budget B_max is never exceeded across N concurrent nodes, the system enforces that the sum of all active micro-reservations never exceeds the total budget. Where r_i is the reserved micro-budget on node i. Actual spend s_i replaces r_i upon settlement.

3. The Human-In-The-Loop (HITL) Lifecycle (The Slow Path)

Triggered when the TEE Enclave evaluates the mandate and hits an approval rule (e.g., "Any transaction over $500 requires human sign-off").

TEE Enclave pauses execution → generates Intent_ID
        │
        ▼
Returns 402 Approval Pending to Agent
        │
        ▼
Encrypted webhook → Enterprise SaaS Dashboard
        │
        ▼
Compliance Officer reviews & clicks "Approve"
        │
        ▼
Officer's machine signs Approval Token
        │
        ▼
Agent re-submits + Approval Token → TEE verifies → Step 2.3
HITL 1
Intent Generation

TEE Enclave pauses execution, generates Intent_ID, returns 402 Payment Required / Approval Pending to Agent.

HITL 2
Alerting

Node fires encrypted webhook to Enterprise SaaS Dashboard with cost, payload summary, and tool details.

HITL 3
Human Action

Compliance Officer reviews the Intent (cost, payload summary, tool) and clicks "Approve."

HITL 4
Signature

Officer's local machine signs an Approval Token.

HITL 5
Execution

Agent receives Approval Token, re-submits request to TEE Node with token attached. TEE verifies signature, proceeds to Step 2.3.

4. Settlement & Slashing Pipeline

The Execution Layer syncs with the Settlement Layer to finalize economics.

Every 10 min: L2 Sequencer compresses Attestation BundlesMerkle Root
        │
        ▼
Merkle Root posted to base layer (Ethereum/Base)
        │
        ▼
Smart Contract releases USDC fees from Escrow
        │
        ▼
Auto-buys SENTRY → routes to Node Operators
        │
        ▼
Watcher Nodes challenge Merkle Root if fraud detectedauto-slash
Settle 1
Epoch Rollup

Every 10 minutes, L2 Sequencer compresses all validated TEE Attestation Bundles into a Merkle Root.

Settle 2
On-Chain Settlement

Merkle Root posted to base layer (Ethereum/Base).

Settle 3
Fee Distribution

Smart Contract releases USDC fees from Escrow. Auto-buys SENTRY tokens, routes to Node Operators.

Settle 4
Fraud Checks

Watcher Nodes challenge Merkle Root. TEE signatures and zkTLS proofs are deterministic — any forged spend triggers auto-slash of Operator stake.

5. Reputation & Reputation Compounding

Once the block is finalized, the Reputation Oracle updates.

Post-Settlement Updates
UpdateEffect
Agent ScoreAgent's public profile updated to reflect another successful, compliant execution (e.g., "99.9% Compliance Rating over 10,000 calls").
Operator ScoreNode Operator's uptime and execution validity metrics increase, driving more traffic to their node.
Mandate RoyaltyIf enterprise used a third-party Mandate Template, the Royalty Engine triggers, sending a micro-fraction of the USDC fee to the template author's wallet.
<100
Fast Path Latency
10
Epoch Rollup Interval
0
Overspend Probability
32
Merkle Root Size

The Compounding Defensibility: Every execution cycle strengthens the network. Agent scores increase, attracting more enterprise customers. Operator scores improve, attracting more node operators. Template royalties incentivize better governance design. Competitors can fork the code, but never the verified execution history.

Next → Section 08: Network Architecture describes the node topology and routing mechanics.
SECTION 08 — NETWORK ARCHITECTURE

Network Architecture

High-throughput TEE mesh topology, intent-based routing, parallel budget channels, and fault-tolerant failover mechanics for the SentryMandate decentralized network.

This section proves: MAX_ROUTING_SHARE == 15% prevents any single operator from monopolizing the network (Invariant VI.1), while VDF-based blind routing prevents targeted bribery.

No-go if: VDF computation time allows operators to predict routing assignments before execution.
SEQUENCER Router / L2 TEE Node 1 us-east-1 TEE Node 2 eu-west-1 TEE Node 3 ap-south-1 TEE Node 4 us-west-2 TEE Node 5 sa-east-1 W1 W2 W3 TEE Proxy Sequencer Watcher Budget Line

1. Network Topology (The 3-Node Architecture)

SentryMandate relies on a separation of concerns to maintain high throughput and strict security across a permissionless set of TEE-secured operators.

1.1 TEE Proxy Node (The Execution Layer)

TEE Proxy Node

Role: The heavy lifters. They run the Enclave, evaluate mandates, execute zkTLS connections to LLMs, and generate cryptographic Attestation Bundles.

Hardware: Must be a verifiable Trusted Execution Environment (AWS Nitro, Intel SGX).

Identity: Node identity is bound to its operator_pubkey AND the PCR_Measurement (the cryptographic hash proving it is running unmodified SentryMandate code).

1.2 Sequencer / Router Node (The Matching Layer)

Sequencer / Router

Role: High-availability relayers that act as the network's "front door."

Function: They ingest Agent Intents, match them to the best available TEE Proxy Node based on latency and SLA, and manage the underlying State Channels to prevent double-spending.

PhaseGovernance
Phase 1Operated centrally by SentryMandate.
Phase 3Decentralized via a lightweight consensus mechanism (e.g., Tendermint/CometBFT).

1.3 Watcher Node (The Audit Layer)

Watcher Node

Role: Independent cryptographic auditors.

Function: They do not read payloads or recompute policy decisions (which breaks privacy). Instead, they verify the TEE signatures, validate the zkTLS SNARK proofs, and challenge the Merkle Roots submitted by Operators.

2. Intent-Based Routing & Discovery

Agents do not waste compute cycles tracking node uptime. They utilize Execution Intents.

2.1 The Routing Lifecycle

Agent broadcasts Intent to Sequencer
        │
        ▼
Sequencer matches to optimal TEE Node
        │
        ▼
Sequencer facilitates encrypted P2P WebSocket handshake
        │
        ▼
Agent ←── direct connection ──→ TEE Enclave
Route 1
The Intent

Agent broadcasts an Intent to the Sequencer: "I need to route a request to OpenAI. My mandate hash is X. I need a node with <50ms latency."

Route 2
The Match

Sequencer checks its real-time active routing set. It selects Operator_Node_7 based on current ping, stake weight, and capability.

Route 3
The Handshake

Sequencer passes routing information to the Agent and the Node, facilitating a direct, encrypted peer-to-peer websocket connection between the Agent and the TEE Enclave.

2.2 Capability Advertisement (Off-Chain)

Capability Advertisement

Operators continuously stream their capabilities to the Sequencers:

CapabilityExample
Supported ProvidersAnthropic, OpenAI, custom internal APIs
Regionus-east-1 to minimize latency to specific API endpoints
Current LoadAvailable concurrent connections

3. The Parallel Budget Mesh (Solving Concurrency)

To achieve horizontal scalability, the network uses mathematical state channels instead of database locks.

3.1 Splitting the Budget

Budget Splitting

If an Agent has a total daily budget of B_max = $100, and needs to make n concurrent requests, the Sequencer issues cryptographic micro-reservation tokens (r) to multiple TEE Nodes simultaneously.

The network mathematically guarantees that the sum of all active reservations across all nodes never exceeds the total budget.

Budget Integrity Invariant
Sigma(r_i, i=1..n) ≤ B_max

3.2 The Micro-Reservation Flow

Agent requests 5 concurrent OpenAI calls
        │
        ▼
Sequencer locks $10 (5 x $2 reservations) in L2 Escrow
        │
        ▼
Sequencer issues 5 Lock Tokens5 TEE Nodes
        │
        ▼
All 5 Nodes execute LLM calls in parallel
        │
        ▼
Node 1 finishes — actual cost $0.05
        │
        ▼
Attestation Bundle submitted → unused $1.95 unlocked
Step 1
Concurrent Request

Agent needs to make 5 concurrent OpenAI calls.

Step 2
Escrow Lock

Sequencer locks $10 (five $2 reservations) in the L2 Escrow.

Step 3
Token Distribution

Sequencer issues five distinct Lock Tokens to 5 different TEE Nodes.

Step 4
Parallel Execution

The Nodes execute the LLM calls in parallel.

Step 5
Attestation

Node 1 finishes, actual cost was $0.05. It submits the Attestation Bundle.

Step 6
Instant Refund

Sequencer instantly unlocks the unused $1.95, returning it to the Agent's available liquidity pool.

4. Failover & Anti-Censorship Mechanics

If a TEE Proxy Node fails mid-request, the Agent must not lose its budget lock.

4.1 Ephemeral State Recovery

Agent sends requestNo response within TTL (15s)
        │
        ▼
Agent sends Cancel_Intent to Sequencer
        │
        ▼
Sequencer gives Node 2-second grace period
        │
        ├── Node produces valid AttestationBundle → Request completed
        │
        └── Node fails → Lock Token invalidatedFull refund to Agent
                │
                ▼
        Sequencer re-routes to fallback node
Fail 1
Timeout Trigger

If the Agent does not receive the encrypted response from the TEE Node within the TTL (e.g., 15 seconds), it sends a Cancel_Intent to the Sequencer.

Fail 2
Lock Reversion

The Sequencer requires the TEE Node to produce a valid Attestation Bundle within a 2-second grace period. If the Node fails to produce the cryptographically signed spend record, the Sequencer invalidates the node's Lock Token and fully refunds the micro-reservation to the Agent.

Fail 3
Re-Routing

The Sequencer instantly issues a new Lock Token and routes the Agent to a secondary fallback node.

4.2 Censorship Resistance

If an Operator repeatedly accepts Lock Tokens but fails to process the request (a "soft censorship" attack), Watcher Nodes will observe a high volume of Cancel_Intents associated with that operator_pubkey. This triggers an automatic SLA downgrade, drastically reducing the Operator's traffic weight and slashing their stake for unresponsiveness.

MAX_ROUTING_SHARE == 15% per operator per epoch
Assignment: VDF-randomized blind routing — clients cannot select operators (Invariant VI.1, VI.2)

5. Engineering Checklist (Architecture Execution)

Implementation modules and deliverables for the SentryMandate network architecture.

5.1 Sequencer / L2 Module
  • Intent Mempool and matching engine
  • State Channel manager (Micro-reservation locking/unlocking)
  • WebSocket relay infrastructure
5.2 TEE Operator Module
  • Nitro Enclave / SGX image generation
  • zkTLS client integration (e.g., TLSNotary)
  • Ephemeral key generation and COSE signing logic
5.3 Client SDK
  • sentry-agent-sdk (Python/TypeScript)
  • Automatic Intent generation and fallback retry logic
  • Local payload encryption before transmission to the TEE
3
Node Types in Architecture
15
TTL Timeout Before Failover
2
Grace Period for Recovery
5
Parallel Budget Lines

Node Architecture Comparison Matrix

Detailed comparison of responsibilities, trust assumptions, and hardware requirements across all three node types in the SentryMandate network.

Node Type Comparison
PropertyTEE Proxy NodeSequencer / RouterWatcher Node
Primary RoleExecute mandates, zkTLS, attestationsMatch intents, manage state channelsAudit, verify SNARKs, challenge fraud
Trust ModelHardware-attested (TEE)Centralized Ph1, decentralized Ph3Permissionless verification
HardwareAWS Nitro / Intel SGXHA server clusterStandard compute
Staking$10,000 min operator bond (slashable, 21-day unbonding)Protocol-operated initiallyChallenger Bond (10% base rate)
Revenue70% of 0.5% protocol fee per executionProtocol fee share30-50% of slashed amount (bounties)
Data AccessFull payload (in enclave)Metadata onlySignatures and proofs only
Assumptions

VDF computation is not predictable before execution. Network latency between proxy nodes and LLM providers remains within 200ms. L2 Sequencer randomization seed is verifiable.

Trust Boundaries

Clients cannot select specific operators (Blind Routing, Invariant VI.2). No single operator handles >15% of global volume per epoch (Anti-Monopoly Ceiling, Invariant VI.1). Assignment is VDF-randomized, not reputation-weighted.

On-Chain Enforcement

L2 Sequencer enforces MAX_ROUTING_SHARE == 15% algorithmically — excess routing triggers automatic queue removal until next epoch. VDF proofs are submitted on-chain for audit.

⚠ Failure Mode

Single cloud provider operates 50% of nodes, creating centralization risk and single point of failure.

✓ Defense

MAX_ROUTING_SHARE == 15% (Invariant VI.1). Any operator exceeding 15% of global epoch volume is algorithmically removed from the matching queue until the next epoch.

⚠ Failure Mode

Enterprise bribes specific operator for preferential treatment or data exfiltration.

✓ Defense

Cryptographic Blind Routing (Invariant VI.2): VDF-based randomized assignment. Clients cannot deterministically select operators. Bribery requires corrupting the entire matching algorithm.

Routing Protocol Reference

intent-routing.proto
message ExecutionIntent {
  string  agent_id       = 1;
  string  mandate_hash   = 2;
  string  target_provider= 3;
  uint32  max_latency_ms = 4;
  string  region         = 5;
  bytes   agent_sig      = 6;
}
message CancelIntent {
  string  lock_id  = 1;
  string  agent_id = 2;
  string  reason   = 3;
  bytes   sig      = 4;
}

Architecture Guarantee: This architecture guarantees millisecond latency, parallel execution, and cryptographic integrity across a permissionless set of TEE-secured operators. The separation of concerns between TEE Proxy, Sequencer, and Watcher Nodes ensures that no single component can unilaterally compromise the system's security, availability, or economic guarantees. The intent-based routing model eliminates the need for agents to maintain complex node registries, while the parallel budget mesh enables true horizontal scalability without sacrificing budget integrity.

Next → Section 09: Reputation Engine defines how on-chain compliance history becomes agent identity.
SECTION 09 — REPUTATION ENGINE

Deterministic Reputation Engine

The compounding non-forkable execution history of SentryMandate — transforming cryptographically verified TEE/zkTLS evidence into non-forkable, mathematically sound Trust Oracles for agents, operators, and mandates.

This section proves: the Global Sentry Score is a view function derived from immutable on-chain history — it cannot be manually edited, purchased, or governance-voted (Invariant IV.1).

No-go if: volume-weighted Sybil defense fails to isolate micro-transaction wash trading from legitimate compliance scoring.
AAA Score > 0.90 B Score ~ 0.75 Below C Score < 0.60 COVERAGE DENIED COMPETENCE SCORE CHARACTER SCORE 0.0 0.25 0.50 0.75 1.0 0.0 0.25 0.50 0.75 1.0 Agent-A1 Agent-B1 Agent-X1 Cold Start (0.16, 0.16) Cold Start Trajectory REPUTATION TIERS AAA Tier — Score > 0.90 Standard insurance, full access B Tier — Score ~ 0.75 +25% insurance premium spike Below C — Score < 0.60 Coverage auto-denied Cold Start — Score = 0.16 Unknown, must earn trust Growth Trajectory Volume-weighted Bayesian climb GLOBAL SENTRY SCORE Character x Competence If either axis drops, the global score drops.

1. The Dual-Axis Reputation Paradigm

If you group all behavior into a single average, the data becomes useless. A true Trust Oracle must measure two distinct vectors.

Dual-Axis Measurement
AxisMeasuresKey Questions
Character ScoreStrict adherence to the MandateDid the agent try to overspend? Did it try to access denied tools? Did it attempt a prompt injection to bypass governance?
Competence ScoreOperational excellenceDid the API call succeed? Was the latency low? Did the agent avoid 4xx/5xx errors?
High Competence, Low Character

A liability — the agent efficiently executes unauthorized actions. It never crashes, but it constantly violates governance rules, overspends budgets, and accesses forbidden tools.

High Character, Low Competence

Useless — the agent never breaks rules but constantly crashes, times out, and generates errors. It is fully compliant but operationally worthless to the enterprise.

2. Agent Reputation Math (Sybil & Exploit Resistant)

2.1 Solving the Cold Start & Sybil Farming Problem

If a new agent spawns with a perfect 100% reputation, attackers will constantly spin up new IDs, burn through their budgets via mandate violations, and discard them. Furthermore, if you only count the number of transactions, an attacker could make 10,000 micro-calls of $0.001 to wash out a single $5,000 violation.

The Solution: Bayesian Confidence Model

We use a Bayesian Confidence Model weighted by Fiat Volume. New agents start with an "Unknown" score. They must earn their way up by processing real, high-value, compliant transactions over time. This eliminates both Sybil farming (new IDs start low) and volume washing (micro-calls contribute negligible weight).

2.2 Character Score Formula

We use Alpha and Beta constants (set by governance) to represent the network's initial skepticism of a new, unknown agent.

character-score.math
// Variables
V_compliant = Total fiat dollar volume of all compliant, successful spend
V_violation = Total fiat dollar volume of all blocked/attempted violations
Alpha       = Network prior for success (e.g., 100)
Beta        = Network prior for failure (e.g., 500)

// Formula
Character_Score = (V_compliant + Alpha) / (V_compliant + V_violation + Alpha + Beta)
Character Score — Bayesian Confidence
Character_Score = (V_compliant + Alpha) / (V_compliant + V_violation + Alpha + Beta)

Result: A brand new agent with $0 spend starts with a mathematically low score (100/600 = 0.16). As the agent successfully processes $10,000 in compliant volume, the constants are washed out, and the score asymptotically approaches 0.99.

2.3 Competence Score Formula

Competence uses an exponential time-decay model. Recent API failures hurt the agent, but if the developer patches the agent's code, historic errors fade away.

competence-score.math
// Variables
C_success    = Count of successful zkTLS execution receipts
C_fail       = Count of 4xx/5xx errors or timeouts
Decay_Factor = Weighting that prioritizes recent epochs over historic

// Formula
Competence_Score = Sum(C_success * Decay_Factor) / Sum((C_success + C_fail) * Decay_Factor)
Competence Score — Exponential Time-Decay
Competence_Score = Sum(C_success * Decay) / Sum((C_success + C_fail) * Decay)

2.4 Global Sentry Score

The final metric used for enterprise gating. If either Character or Competence drops, the Global Score drops.

Global Sentry Score
Global_Sentry_Score = Character_Score * Competence_Score

3. Operator Reputation (The Routing Engine)

Operator reputation dictates how the L2 Sequencer routes traffic. If an operator's score drops, they are starved of traffic, resulting in zero fee generation.

Operator Metrics (On-Chain Data)
MetricDescription
Uptime_RatioPercentage of successful heartbeat responses.
Commitment_TimelinessPercentage of Merkle evidence roots posted to the blockchain before the epoch deadline.
Equivocation_RateConfirmed slashing events (e.g., forged logs) divided by total requests.
Operator Score Formula
Operator_Score = Uptime_Ratio * Commitment_Timeliness * (1 - Equivocation_Rate)

Because of the (1 - Equivocation_Rate) multiplier, if an operator is caught forging a single log and slashed, their score is permanently crippled, effectively banning the node from the active routing set.

4. Mandate Template Reputation

Compliance templates created by AI Governance Architects are economic assets. Their reputation dictates their ranking in the Marketplace.

template-score.math
// Variables
Adoption_Count       = Number of unique enterprise subnets using the template
Violation_Rate       = Percentage of calls under this mandate that resulted in a violation
Dispute_Rate         = Frequency of human-in-the-loop dispute escalations
Certification_Weight = Multiplier applied if audited by a recognized security firm

// Formula
Template_Score = (Adoption_Count_Weight) + (1 - Violation_Rate) + (1 - Dispute_Rate) * Certification_Weight
Template Score Formula
Template_Score = (Adoption_Count_Weight) + (1 - Violation_Rate) + (1 - Dispute_Rate) * Certification_Weight

5. Enterprise API & Insurance Integration

5.1 The Gating Payload

When an enterprise or a smart contract queries the Reputation Oracle, it returns a deterministic, verifiable JSON payload.

GET /oracle/v1/agent/{agent_id}
{
  "agent_id": "0x1234abcd...",
  "global_sentry_score": 0.985,
  "tier": "AAA",
  "metrics": {
    "character_score": 0.999,
    "competence_score": 0.971,
    "lifetime_governed_spend": 45200.50,
    "attempted_violations": 2
  },
  "insurance_eligibility": {
    "status": "ELIGIBLE"
  }
}

5.2 Dynamic Insurance Pricing

Because the Reputation Engine is fully deterministic, it serves as the exact pricing oracle for the network's Insurance Risk Pools. When an enterprise purchases a $10,000 Overspend Guarantee for their agent, the premium is dynamically priced by the smart contract.

insurance-premium.math
// Variables
Base_Rate           = Protocol baseline insurance fee (e.g., 1%)
Coverage_Amount     = Total fiat dollar guarantee (e.g., $10,000)
Global_Sentry_Score = Agent's current trust score (e.g., 0.80)

// Formula
Insurance_Premium = Base_Rate * Coverage_Amount * (2 - Global_Sentry_Score)
Insurance Premium Formula
Insurance_Premium = Base_Rate * Coverage_Amount * (2 - Global_Sentry_Score)
Insurance Tier Pricing
Agent TierScorePremium Effect
AAA1.0Premium multiplier is 1x (standard).
B0.75Premium spikes by 25%.
Below C< 0.60Smart contract automatically denies coverage.

6. Reputation Invariants & The Reputation Invariants

The three immutable rules governing the SentryMandate reputation system and the non-forkable historical ledger they establish.

Three Reputation Invariants
InvariantRule
ImmutabilityReputation state is a derived view of the underlying TEE/zkTLS evidence log. It cannot be manually edited by an admin, only recomputed from the blockchain.
InheritanceSub-agents spawned by a master orchestrator can "borrow" the parent's Character Score for 7 days by locking a portion of the parent's staked collateral.
The Non-Forkable HistoryCompetitors can fork SentryMandate's open-source code, but they cannot fork 2 years of cryptographically verified, successful enterprise AI execution history. The reputation ledger is the network's core asset.
Invariant 1: Immutability

Reputation state is a derived view of the underlying TEE/zkTLS evidence log. No administrator, governance vote, or protocol upgrade can manually edit a score. The only way to change reputation is to recompute it from the immutable on-chain evidence trail. This ensures that trust is always grounded in verifiable cryptographic proof, never subjective human judgment.

Invariant 2: Inheritance

Sub-agents spawned by a master orchestrator can "borrow" the parent's Character Score for 7 days by locking a portion of the parent's staked collateral. This enables enterprise orchestration patterns where a master agent spawns specialized workers without each worker starting from the cold-start baseline of 0.16.

Invariant 3: The Non-Forkable History

Competitors can fork SentryMandate's open-source code, but they cannot fork 2 years of cryptographically verified, successful enterprise AI execution history. The reputation ledger is the network's core non-forkable asset — a compounding technical advantage that grows stronger with every successful governed execution.

Character Score Growth Simulation

Demonstrating how the Bayesian model evolves from cold start to AAA tier with Alpha=100 and Beta=500.

Score Progression by Compliant Volume
V_compliant ($)V_violation ($)Character ScoreTier
$0$00.167Unknown
$500$00.545C
$1,000$00.688B
$5,000$00.911A
$10,000$00.953AAA
$50,000$00.990AAA
$10,000$5,0000.648Below C
0.16
Cold Start Score (Alpha/Alpha+Beta)
7
Inheritance Borrow Window
0.99
Asymptotic Max Character Score

The Reputation Invariants: This engine powers the economic layer of autonomous agents, enabling programmable wallets, insurance underwriting, and enterprise gating. It is completely resistant to Sybil attacks, "cold start" exploits, and volume farming. The reputation ledger is the network's core non-forkable asset — every execution cycle strengthens protocol defensibility further.

Next → Section 10: Insurance Engine shows how reputation scores drive dynamic premium pricing.
SECTION 10 — INSURANCE ENGINE

Dual-Tranche Insurance Engine

Cryptographically proven slashing events become automated dollar-denominated payouts for enterprise clients via Dual-Tranche capital, dynamic utilization curves, and systemic risk limiters.

This section proves: Dual-Tranche architecture insulates SENTRY token price from enterprise claim events. MAX_EPOCH_DRAWDOWN == 20% prevents bank runs (Invariant III.3).

No-go if: MIN_RESERVE_RATIO drops below 1.25 during stress testing, triggering auto-pause of policy issuance.
$ JUNIOR TRANCHE Staked SENTRY Tokens First-Loss Capital • Absorbs Slashing Operator Skin-in-the-Game SLASHING SHOCKWAVE SENIOR TRANCHE USDC Stablecoins Enterprise Remediation Fund LP-Backed • Stable Yield SHIELD Liquidated SENTRY backfills Senior ENTERPRISE CLIENT Protected Treasury Wallet Receives USDC Payouts USDC PAYOUT PREMIUM ($USDC) LIQUIDITY PROVIDERS DeFi LPs • USDC Deposits Earn Baseline APY from Premiums DEPOSIT USDC YIELD NODE OPERATORS Staked SENTRY • TEE Nodes Subject to Slashing STAKE SENTRY Senior (USDC) Flows Junior (SENTRY) Flows Slashing / Risk Events Premium / Liquidation

1. The Dual-Tranche Capital Structure

The Insurance Pool separates network security from enterprise fiat remediation via two distinct capital tranches.

1.1 — Senior Tranche (Enterprise Remediation)
PropertyDetail
AssetUSDC (Stablecoins)
Capital ProvidersDeFi Liquidity Providers (LPs) and SentryMandate protocol revenue
PurposePays out approved claims to Enterprises in stable, dollar-denominated value
YieldLPs earn a baseline APY funded directly by the insurance premiums paid by the enterprises
1.2 — Junior Tranche (First-Loss Security)
PropertyDetail
AssetStaked SENTRY tokens
Capital ProvidersNode Operators
PurposeAbsorbs the immediate penalty of an operator failure (e.g., forged logs, downtime). Slashed tokens are liquidated into USDC to backfill the Senior Tranche, protecting the LPs from bearing the brunt of localized operator errors.

2. Dynamic Premium Calculation

Premiums are dynamically calculated per agent based on Reputation Score (Risk) and Pool Utilization (Capital Scarcity).

2.1 — Pool Utilization Ratio

The smart contract tracks how much capital is actively underwriting risk versus sitting idle.

Pool Utilization (U)
U = Total_Active_Coverage / Total_USDC_Liquidity

Low utilization means cheap premiums. Above optimal, exponential multiplier cools demand and attracts USDC.

𝓒 2.2 — The Interest Rate Curve

If utilization is low (plenty of capital), premiums are cheap. If utilization crosses the optimal threshold (e.g., 80%), the system applies an exponential multiplier to premiums. This makes new policies expensive, simultaneously cooling down demand and generating high yield to attract new USDC deposits.

premium_curve.math
// Variable Definitions
U               = Current Utilization Ratio
U_optimal       = Target Utilization (0.80)
Curve_Steepness = Governance parameter (e.g., 4)
Risk_Multiplier = (2 - Global_Sentry_Score)

// From the Reputation Engine output
// Score = 1.0 (perfect) to 0.0 (blacklisted)

Formula:
Dynamic_Premium =
  Coverage_Amount
  * Base_Rate
  * Risk_Multiplier
  * (1 + (U / U_optimal)^Curve_Steepness)
📊 2.3 — Premium Calculation Example Scenarios

Premium scaling across agent quality levels and pool stress conditions:

Agent Rating Reputation Score Coverage Amount Pool Utilization Pool State Approx. Premium
AAA-rated 1.0 $50,000 U = 0.50 Healthy ~$100/month
B-rated 0.75 $50,000 U = 0.90 Stressed $400+/month

The 4x premium differential creates a powerful incentive for operators to maintain impeccable behavior.

3. The Claims Adjudication Pipeline

Class A Claims (Integrity Violations) are fully deterministic via TEEs and zkTLS, requiring zero human arbitration.

3.1 — The Automated Claim Flow (Class A)
Watcher / Enterprise submits cryptographic proof of overspend
        |
        v
Smart Contract evaluates TEE Attestation Bundle
        |
        +--- Signature forged OR zkTLS proves overspend
        |    ---> Claim AUTO-APPROVED
        v
Junior Tranche: Operator instantly slashed
        (SENTRY burned/sold for USDC)
        |
        v
Senior Tranche: USDC payout transferred
        to Enterprise treasury wallet
Step 1 — The Trigger

A Watcher Node or Enterprise submits cryptographic proof the agent exceeded its mandate limit.

Step 2 — The Verification

Smart contract evaluates the TEE Attestation Bundle. Forged signature or zkTLS overspend proof triggers auto-approval.

Step 3 — Operator Slash

Responsible operator instantly slashed. SENTRY burned or sold for USDC from Junior Tranche first-loss capital.

Step 4 — Enterprise Payout

Exact USDC loss amount (up to policy limit) transferred to Enterprise treasury from Senior Tranche.

3.2 — Human-in-the-Loop Arbitration (Class C Claims)

For subjective claims (e.g., "The operator leaked our API key outside the enclave"), the enterprise submits to the SentryMandate DAO Arbitration Panel, staking a small bond to prevent spam. Approved claims pay out via the same Senior Tranche pipeline.

Enterprise submits subjective claim + stakes bond
        |
        v
DAO Arbitration Panel reviews evidence
        |
        +--- Panel votes APPROVE ---> Senior Tranche Payout
        |
        +--- Panel votes DENY ---> Bond forfeited (spam prevention)

4. Systemic Risk Controls

Protection against correlated failures via epoch-based settlement and mandatory deductibles.

4.1 — Epoch-Based Pro-Rata Settlement

Claims batch into 24-hour epochs with a Maximum Drawdown Limit (20% of total USDC pool per epoch).

Black Swan Scenario: A catastrophic event triggers $5,000,000 in claims in a single day, but the 20% drawdown limit on a $10M pool is only $2,000,000.

  • The system does not go bankrupt under any single-epoch stress event
  • The $2,000,000 available is distributed pro-rata among all affected enterprises proportionally to their verified losses
  • The remaining $3,000,000 in claim balances are rolled into the next epoch or covered by emergency treasury reserves
20%
Maximum Drawdown Per Epoch
🛡 4.2 — Mandatory Deductibles

All policies enforce a strict 5% deductible. The enterprise absorbs the first 5% of any verified loss.

Final Payout Formula
Final_Payout = min(Verified_Loss, Coverage_Maximum) * 0.95

The 5% deductible serves three critical functions:

  • Moral Hazard Reduction: Enterprises cannot treat insurance as a free pass to skip internal safeguards
  • Claims Volume Control: Small, nuisance claims are absorbed by the enterprise, reducing pipeline congestion
  • Capital Efficiency: The 5% buffer preserves pool solvency during periods of elevated claim frequency
95%
Maximum Enterprise Recovery Rate
MIN_RESERVE_RATIO == 1.25 → auto-pause policy issuance if TVL/liabilities < 1.25 (Invariant III.2)
MAX_EPOCH_DRAWDOWN == 20% → max 20% of USDC reserves disbursable per 24-hour epoch (Invariant III.3)
Claims paid in USDC (Senior Tranche) | Slashed SENTRY liquidated to USDC before application (Invariant III.1)

5. The Economic Feedback Loop

The integration of Evidence, Slashing, Reputation, and Insurance creates a self-healing economic loop. Each component reinforces the others, making the system progressively more robust over time.

Complete Economic Feedback Cycle
Agent misbehaves (overspend, forged logs, mandate bypass)
        |
        v
TEE Evidence proves violation cryptographically
        (zkTLS receipts + Attestation Bundles)
        |
        v
Operator SENTRY is slashed (Junior Tranche absorbs loss)
        |
        v
Enterprise is made whole in USDC (Senior Tranche payout)
        |
        v
Agent's Reputation Score permanently drops
        (Reputation Engine recalculates)
        |
        v
Agent's future Insurance Premiums mathematically spike
        (Interest Rate Curve formula recalculates)
        |
        v
High premiums increase LP yield
        (Attracting new liquidity providers)
        |
        v
More LPs deposit USDC ---> expanding total underwriting capacity
        |
        v
(Cycle repeats — each iteration strengthens the entire system)
100%
Class A Claims Automated
ZERO
Human Arbitration for Integrity Violations
24hr
Epoch Settlement Window
5%
Mandatory Deductible Floor
Assumptions

USDC maintains its peg. DeFi LP deposits in Senior Tranche are sufficient to cover maximum epoch liability. Reputation Engine pricing model accurately reflects agent risk.

Trust Boundaries

Enterprise claims are paid exclusively in USDC (Senior Tranche). Slashed SENTRY (Junior Tranche) is liquidated to USDC before application. The two tranches are structurally isolated — token price crashes cannot bankrupt enterprise coverage.

On-Chain Enforcement

InsurancePool.sol enforces MIN_RESERVE_RATIO == 1.25 (Invariant III.2). MAX_EPOCH_DRAWDOWN == 20% limits single-epoch payouts (Invariant III.3). Policy issuance auto-pauses if ratio drops to 1.24.

⚠ Failure Mode

Zero-day agent framework exploit triggers 5,000 simultaneous insurance claims, draining the pool.

✓ Defense

MAX_EPOCH_DRAWDOWN == 20% (Invariant III.3). Protocol cannot disburse >20% of USDC reserves in a single 24-hour epoch. Excess claims are strictly pro-rata.

⚠ Failure Mode

SENTRY token price crashes 90%, depleting Junior Tranche collateral.

✓ Defense

Dual-Tranche isolation (Invariant III.1): Enterprise claims are paid from Senior Tranche (USDC only). Junior Tranche absorbs operator-specific slashing only. Token volatility cannot reach enterprise coverage.

The Insurance Engine transforms SentryMandate from a monitoring protocol into a full enterprise-grade guarantee system. Dual-Tranche isolation, actuarial pricing, automated claims, epoch-based risk controls, and the self-reinforcing feedback loop create a resilient system that grows stronger with each claim processed.

Next → Section 11: Token Flow Architecture traces every token from fee collection to final burn.
SECTION 11 — TOKEN FLOW ARCHITECTURE

Complete Value & Token Movement Map

How smart contracts route USDC and SENTRY across five distinct flow paths, maintaining token supply reduction and operator incentive alignment.

This section proves: the 70/20/10 fee split (Operators/Insurance/Treasury) creates a self-sustaining economic loop where Burned > Emitted at target volume (Invariant VII.2).

No-go if: Buy-and-Distribute market-buy execution creates >2% slippage on DEX liquidity at projected fee volumes.
ENTERPRISE $USDC Payments SaaS Fees + Premiums FeeRouter Smart Contract 0.5% Protocol Tax $USDC DEX Market Buy USDC → SENTRY BUY OPERATORS 70% SENTRY Pro-rata by zkTLS 70% BURN 20% → 0x000...dead DEFLATIONARY 20% DAO TREASURY 10% SENTRY Protocol R&D 10% STAKING & SLASH Flow B 20% Watch | 30% Ins | 50% Burn INSURANCE Flow C 80% LP Yield | 20% Treasury MARKETPLACE Flow D 85% Author | 15% FeeRouter EMISSIONS (Flow E) Decaying → 0 USDC SENTRY Burn Treasury

1. The Asset Primitives

Asset isolation by function avoids regulatory friction and preserves capital efficiency.

💰 Asset Table
AssetUsed ByFunction
USDC (Stablecoins / Fiat) Enterprises SaaS fees, API routing budgets, Insurance Premiums, and Mandate Marketplace purchases. Enterprises never hold volatile tokens.
SENTRY (Protocol Token) Node Operators & Watchers Staking, Security (Slashing), Governance, and capturing the economic output of the network.

2. Flow A: Core Execution (Buy-and-Distribute)

The primary heartbeat: enterprise funds paying for governed AI routing.

The Smart Contract Flow

Trigger: Enterprise spends $100.00 on OpenAI calls. Network charges 0.5% tax ($0.50).

Enterprise Agent spends $100.00 on governed LLM calls
        |
        v
Protocol charges 0.5% fee → $0.50 USDC enters FeeRouter contract
        |
        v
FeeRouter executes market buy on DEX (Uniswap)
        $0.50 USDC → SENTRY at current market price
        |
        v
Purchased SENTRY sent to RewardsModule and split:
        |
        +-- 70% → Active Node Operators (pro-rata by zkTLS receipts)
        +-- 20% → Burned (sent to 0x000...dead address)
        +-- 10% → DAO Treasury (protocol R&D)
flow_a_math.sol
Let F = Total SENTRY purchased via network usage fees.

F_ops  (70%) -> Routed to active Node Operators
              (pro-rata based on successful zkTLS receipts).
F_burn (20%) -> Sent to the dead address (0x000...)
              to permanently deflate supply.
F_tres (10%) -> Routed to the DAO Treasury
              for protocol R&D.
Protocol_Fee = 0.5% of routed API spend
Distribution: 70% → Active Operators (Buy-and-Distribute) | 20% → Insurance Reserve (USDC) | 10% → Protocol Treasury
Deflationary_Target: Tokens_Burned_via_Fees + Tokens_Burned_via_Slashing > Tokens_Emitted (Invariant VII.2)

3. Flow B: Staking & Slashing (Security Engine)

Operators must stake a minimum of $10,000 in SENTRY (21-day unbonding) to route enterprise traffic. Slashing: 0.1% downtime, 5% mandate violation, 100% forgery/equivocation.

The Slashing Flow

Trigger: DevOps firm runs TEE Proxy Node. Stake: $10,000 SENTRY into OperatorRegistry.

Watcher submits cryptographic fraud proof to DisputeModule
        |
        v
Smart contract verifies proof → instantly slashes Operator stake
        |
        +-- 20% → Rewarded to the Watcher (fraud proof submitter)
        +-- 30% → Sold on DEX for USDC → Insurance Pool
        +-- 50% → Burned permanently
flow_b_math.sol
Let S = Total SENTRY slashed from the malicious operator.

S_chal (20%) -> Rewarded to the Watcher who submitted
              the valid fraud proof.
S_sell (30%) -> Sold on a DEX for USDC and sent to the
              Insurance Pool to cover enterprise loss.
S_burn (50%) -> Burned permanently to penalize the attacker
              and enrich the remaining network.

4. Flow C: Insurance Engine (Dual-Tranche Capital)

Separate opt-in product capitalized by decentralized LPs.

🛡 The Premium Flow

Trigger: Enterprise buys a $50,000 overspend guarantee. Premium: $200/month in USDC.

Enterprise pays $200/mo USDC → InsurancePool
        |
        +-- 80% → Yield paid to Liquidity Providers (LPs)
        +-- 20% → Protocol Treasury
flow_c_math.sol
Let P = Total USDC Premium paid by the enterprise.

P_uw   (80%) -> Yield paid out to the Liquidity Providers
              (LPs) who deposited USDC to back the pool.
P_tres (20%) -> Routed to the Protocol Treasury.
Payout Flow (Agent Overspend due to Protocol Failure)

Loss verified by DisputeModule. InsurancePool releases exact USDC loss to Enterprise wallet.

The InsurancePool is continuously backfilled by the S_sell mechanism from slashed operators, protecting the LPs from taking the full hit.

5. Flow D: Mandate Marketplace (IP Royalties)

Governance Architects write Mandate Templates minted as on-chain IP.

📜 The Royalty Flow

Trigger: Enterprise licenses "HIPAA-Compliant Healthcare" template. Fee: $500 USDC.

Enterprise pays $500 USDC → MarketplaceModule
        |
        +-- 85% → Mandate Author's wallet (USDC)
        +-- 15% → FeeRouter → market-buy SENTRY → Operators/Burn (feeds Flow A)
flow_d_math.sol
Let M = Total USDC paid for the Mandate license.

M_auth (85%) -> Routed directly to the Mandate Author's
              wallet in USDC.
M_buy  (15%) -> Routed to the FeeRouter to market-buy
              SENTRY and distribute to Operators/Burn
              (feeding the Core Execution Flow).

6. Flow E: Network Bootstrapping (Emissions)

Decaying emissions ensure operator profitability before volume.

🚀 Emission Mechanics

Trigger: New epoch finalized on L2 sequencer. EmissionsDistributor mints SENTRY.

flow_e_math.sol
Let E = Epoch Emission of newly minted SENTRY.

E_ops (100%) -> Routed to the RewardsModule
              to subsidize Operator yields.

As time goes on, E decays toward zero, and the system relies entirely on the Buy-and-Distribute F_ops from Flow A.

7. Global Parameter Matrix (v1.0 Constants)

Smart contract parameters at launch. Modifiable only via DAO vote with 14-day timelock.

10 Governance Parameters
ParameterMeaningValue / SplitAsset
protocol_fee_rate Base routing tax on governed spend 0.5% USDC → SENTRY
fee_split_ops Fee share used to buy SENTRY for operators 70% SENTRY
fee_split_burn Fee share used to buy and burn SENTRY 20% SENTRY
fee_split_tres Fee share used to fund the DAO treasury 10% SENTRY
min_operator_stake Minimum bond to run a TEE Proxy node $10,000 eq SENTRY
slash_split_chal Slashed tokens rewarded to the Watcher 20% SENTRY
slash_split_ins Slashed tokens sold to backfill Insurance 30% USDC
slash_split_burn Slashed tokens permanently destroyed 50% SENTRY
market_split_auth Royalties paid to Mandate creators 85% USDC
premium_split_uw Insurance premiums paid to LPs 80% USDC

8. Summary of the Economic Engine

Integrated value circulation path.

The Integrated Value Loop
Enterprises pay in stable USDC
        |
        v
Protocol auto-buys SENTRY off the market
        (constant, volume-driven demand)
        |
        v
SENTRY paid to Operators (subsidize server costs)
        OR burned (deflationary pressure)
        |
        v
Operators forced to stake SENTRY (removed from circulation)
        |
        v
Operator survival tied to flawless enterprise execution
        |
        v
More volume → more buys → more burns → more scarcity
→ more value → more operators → more capacity → MORE VOLUME
1. Enterprise Stability

Enterprises pay in stable Fiat/USDC. No volatile tokens, no wallets, pure SaaS billing.

2. Automatic Demand

The protocol auto-buys SENTRY off the market, creating constant volume-driven demand scaling with adoption.

3. Deflationary Pressure

SENTRY is paid to Operators or burned. Every transaction permanently removes supply.

4. Aligned Incentives

Operators stake SENTRY, tying financial survival to flawless enterprise execution.

5
Distinct Flow Paths
10
Governance Parameters
14d
DAO Timelock Period
0.5%
Protocol Fee Rate
Next → Section 12: Operator Node Spec defines hardware and software requirements for TEE proxy operators.
SECTION 12 — OPERATOR NODE SPECIFICATION

Operator Node Specification

Strict executable contract between Protocol, Operators, Watchers, and Orchestrators. TEE & zkTLS hardened.

This section proves: every operator node boots an identical, auditable enclave image. PCR0 attestation is verified on-chain before any routing eligibility (Invariant I.1).

No-go if: AWS Nitro enclave cold-boot time exceeds 30 seconds, creating unacceptable failover latency.
AWS NITRO HYPERVISOR ISOLATED RAM REGION volatile memory only — zero disk persistence SentryEnclave.eif Deterministic State Machine Mandate Evaluation + zkTLS + Attestation EPHEMERAL KEYPAIR secp256k1 • in-memory PCR MEASUREMENT CHAIN PCR0: hash(sentry_binary) RECEIVE VERIFY DECRYPT MANDATE zkTLS EXECUTE BUNDLE SIGN RESPOND APPEND-ONLY LOG bundle_hash[0] bundle_hash[1] bundle_hash[n] ... MERKLE ROOT epoch: 10min intervals sum(delta_spend) commitEpoch() → L1 vsock vsock vsock vsock GET /v1/enclave/status Health + Key Exchange POST /v1/enclave/execute Governed Execution LLM PROVIDER API zkTLS Connection L1 SMART CONTRACT commitEpoch() tx vsock channel isolated RAM

1. Node Identity & Hardware Root of Trust

Hardware-backed TEEs are mandatory. No standard cloud instances.

🔑 1.1 — Cryptographic Identity Boot Sequence

When a SentryMandate Node boots, it MUST execute these three steps in order:

Step 1
Launch Enclave Image

Launch the official SentryEnclave.eif image inside the TEE.

Step 2
Generate Ephemeral Keypair

Generate unique ephemeral enclave_keypair (secp256k1) within isolated enclave memory.

Step 3
Hardware Attestation

Generate Attestation Document signed by AWS Nitro Hypervisor with enclave_pubkey and PCR measurements.

1.2 — On-Chain Registration

The operator binds staked tokens to the Enclave's identity via the smart contract:

registration.json
{
  "operator_wallet": "0xABC...",
  "enclave_pubkey":  "0xDEF...",
  "pcr_0_measurement": "hash_of_sentry_binary",
  "stake_amount":    10000,
  "status":          "ACTIVE"
}

If the operator alters the code to bypass mandate checks, the PCR measurement will change, and the network will instantly reject the node.

2. Required Public APIs

All APIs exposed via TLS 1.3.

2.1 — GET /v1/enclave/status

Capability & Key Exchange. Used by routing sequencers and agents to verify node health and fetch the encryption key.

response.json
{
  "status": "READY",
  "enclave_pubkey": "0xDEF...",
  "supported_providers": [
    "api.openai.com",
    "api.anthropic.com"
  ],
  "zkTLS_version": "TLSNotary_v1.2",
  "current_epoch": 442
}
2.2 — POST /v1/enclave/execute

Core execution pipeline. Payload encrypted using enclave_pubkey.

input.json
{
  "request_id": "UUID-1234",
  "agent_id": "0xAGENT...",
  "mandate_hash": "0xMANDATE...",
  "lock_token": "0x[MicroReservation]",
  "encrypted_payload": "base64(RSA-OAEP(...))"
}
response.json
{
  "status": "SUCCESS",
  "policy_decision": "ALLOW",
  "delta_spend": 0.05,
  "attestation_bundle_hash": "0xBUNDLE...",
  "enclave_signature": "0x[Signed]"
}

3. Internal Enclave State Machine

Deterministic execution. Silent failures are slashable offenses.

Execution Flow Diagram
RECEIVEVERIFY_LOCKDECRYPTEVALUATE_MANDATE
                                                          |
                                        If DENY → Halt + return Attestation
                                        If ALLOW:
zkTLS_CONNECTEXECUTE & METERBUILD_BUNDLESIGN & FLUSH
                                                          |
                                                          v
                                                 RESPOND
Complete 9-Step Operation Table
StepOperationDescription
1 RECEIVE Ingest the encrypted payload and the lock_token.
2 VERIFY_LOCK Validate that the lock_token signature matches the Agent's public key and contains sufficient micro-budget.
3 DECRYPT Unseal the payload entirely inside enclave memory.
4 EVALUATE_MANDATE Check the decrypted intent against the mandate_hash rules. If DENY: halt and return Attestation.
5 zkTLS_CONNECT Open a secure multiparty computation (MPC) connection to the LLM provider.
6 EXECUTE & METER Send the prompt, receive the response, extract the exact total_cost from provider HTTP headers.
7 BUILD_BUNDLE Construct the JSON Attestation Bundle: request_id, delta_spend, and the zkTLS receipt.
8 SIGN & FLUSH Sign the bundle with enclave_privkey. Flush plaintext prompt and response from memory.
9 RESPOND Return the encrypted LLM response and the signed bundle to the Agent.

4. Evidence & Merkle Commitment

Nodes must prove their work to the L1 blockchain to earn SENTRY rewards.

4.1 — Append-Only Log

Every Attestation Bundle is hashed and stored in an append-only log, forming the Merkle tree leaves.

4.2 — Epoch Commitments

Every 10 minutes (or as defined by governance), the Node MUST:

Step 1
Compute Merkle Root

Compute the Merkle Root of all bundle_hashes generated in that epoch.

Step 2
Sum Delta Spend

Sum the total delta_spend processed across all requests in the epoch.

Step 3
Submit On-Chain

Submit a commitEpoch() transaction to the SentryMandate Smart Contract.

Failure to submit the Merkle Root within the 60-second grace period triggers an automatic Class B (Liveness) slashing event.

5. Security & Isolation Requirements

Strict hardware isolation for insurance compatibility.

🔒 All Security Requirements
RequirementRule
Zero Disk Persistence The TEE must not have access to persistent disk storage. All sensitive data (prompts, API keys) must exist solely in volatile RAM.
Key Isolation The human node operator must never be able to SSH into the running enclave or run memory dump commands.
Replay Protection The node must cache processed request_ids in memory for the duration of the lock TTL to reject duplicate execution attempts.

6. Conformance & Slashing Triggers

Immediate Class A (100%) slashing for cryptographic invariant violations.

3 Conformance Invariants — Class A (100%) Slash
InvariantViolation
Equivocation Invariant Generating two validly signed Attestation Bundles with different delta_spend amounts for the exact same request_id.
zkTLS Invariant Submitting an Attestation Bundle where the reported delta_spend does not mathematically match the cryptographic zkTLS receipt generated from the provider.
Mandate Bypass Invariant Signing a policy_decision: ALLOW when the deterministic evaluation of the mandate rules explicitly dictates a DENY.
Assumptions

Operators run unmodified SentryEnclave.eif images. AWS Nitro instance availability meets 99.9% SLA. Host OS cannot read enclave memory through side-channel attacks.

Trust Boundaries

The operator controls the host OS but NOT the enclave. API keys, prompts, and responses exist only in encrypted enclave RAM. The operator cannot read, modify, or exfiltrate execution data. Any image modification changes PCR0, instantly stripping routing eligibility.

On-Chain Enforcement

OperatorRegistry.sol verifies PCR0 on registration and periodically during operation. Minimum stake: $10,000 in SENTRY. 21-day unbonding ensures fraud proofs finalize before withdrawal. 0.1% downtime slash enforces liveness.

9
State Machine Steps
3
Slashable Invariants
10min
Epoch Interval
60s
Commit Grace Period
Next → Section 13: Economic Attack Analysis stress-tests these operator economics.
SECTION 13 — ECONOMIC ATTACK ANALYSIS

Adversarial Modeling & Incentive Stress Testing

We assume rational, highly capitalized, and coordinated adversaries. The goal: make misbehavior mathematically irrational.

This section proves: every identified attack vector has a quantified cost-of-attack that exceeds value-extractable, making rational exploitation unprofitable.

No-go if: any attack simulation shows positive expected value for the attacker under realistic network conditions.
COST OF CORRUPTION $$$$$ MASSIVE LOSS PROFIT $ TINY >>> MATHEMATICAL PROOF: ATTACKING IS A DEAD-END CoC = Stake_Operator + Reputation_Loss + Slash_Penalty >> PfC = Value_Extracted - Bribe_Cost For ALL rational actors: Expected_Return(attack) < 0 | Expected_Return(honest) > 0 | ATTACK IS DOMINATED STRATEGY COST OF CORRUPTION Profit from Corruption DEAD END

This document stress-tests the entire SentryMandate economic stack. We assume rational, highly capitalized, and coordinated adversaries. The goal is to establish strict mathematical invariants that guarantee misbehavior is economically irrational, and that the network remains solvent even under coordinated attack.

1. The Wash-Trading Exploit Emission Farming

The Attack

An attacker controls both a heavily funded Enterprise Agent and a high-capacity Node Operator. The attacker routes millions of dummy AI requests to their own node. They pay the protocol routing fee in USDC, but farm disproportionate amounts of SENTRY token emissions, dumping them on the open market for a net profit.

Emission Farming
Self-Dealing
🛡 The Defense: Negative-Sum Invariant

The protocol dynamically adjusts emissions to ensure that wash trading operates at a mathematical loss. If token price spikes and E_tx momentarily exceeds the cost to execute a transaction, the protocol automatically scales back emissions for that epoch to restore the negative-sum invariant.

Auto-Scaling
Epoch Adjustment
Wash-Trading Invariant (must ALWAYS hold)
E_tx < F_tx + C_api
wash_trade_invariant.sol
Variables:
  E_tx  = Fiat value of the SENTRY emission reward for a single transaction.
  F_tx  = Fiat protocol fee paid by the Agent.
  C_api = Actual cost of the LLM API call.

Invariant (must ALWAYS hold):
  E_tx < F_tx + C_api

2. The zkTLS Ransomware Attack Data Withholding

The Attack

A malicious Operator accepts a request, successfully evaluates the mandate, and pays the OpenAI API cost. The Operator receives the highly valuable LLM response (e.g., proprietary financial analysis). The Operator withholds the response from the Agent, demanding an out-of-band payment to release the data.

Ransomware
Data Withholding
🛡 The Defense: Fair Exchange / Atomic Settlement

Encrypted Escrow: The Node cannot claim the Agent's micro-reservation payment directly. The Node must post the Attestation Bundle AND the encrypted LLM response payload to a temporary Data Availability (DA) layer.

Atomic Unlock: The smart contract verifies the payload is available on the DA layer before unlocking the USDC fee to the Node. If the Node withholds the data, the lock expires, the Node absorbs the OpenAI API cost as a pure loss, and the Agent is fully refunded.

Atomic Settlement
DA Layer
Node executes LLM call → receives response ↓ Node MUST post Attestation Bundle + encrypted response to DA layer ↓ Smart contract verifies payload availability on DA layer ↓ Available → USDC fee unlocked to Node Withheld → Lock expires → Node absorbs API cost as PURE LOSS → Agent fully refunded

3. The Insurance Drain Correlated Black Swans

The Attack

A zero-day exploit is discovered in a widely used open-source Agent framework (e.g., LangChain). Thousands of agents are hijacked simultaneously and forced to overspend, bypassing their mandates. The attackers file thousands of legitimate insurance claims at the exact same moment to drain the Senior Tranche (USDC) liquidity pool.

Zero-Day Exploit
Pool Drain
🛡 The Defense: Epoch-Based Systemic Limiters

Claims are batched into 24-hour settlement epochs with hardcoded maximum drawdown caps, ensuring the protocol survives even coordinated mass-claim events through pro-rata distribution.

Epoch Batching
Drawdown Cap
MechanismHow It Works
Pro-Rata Batching Claims are not processed synchronously. They are batched into 24-hour settlement epochs.
Maximum Drawdown Cap The protocol hardcodes a maximum drawdown of 20% of the total USDC pool per epoch.
Shared Pain If total verified claims exceed the 20% drawdown cap, the available funds are distributed pro-rata among the harmed enterprises. This prevents the first claimants from draining the pool and ensures the protocol survives to the next epoch.

4. Reputation Poisoning & Sybil Agents Score Manipulation

The Attack

A malicious enterprise competitor spins up thousands of Sybil agents. They route traffic to a specific, honest Node Operator, but intentionally format the payloads to fail or time out, artificially tanking the Operator's Competence Score and getting them chilled from the routing set.

Sybil Attack
Reputation Gaming
🛡 The Defense: Volume-Weighted Reputation Impacts

The protocol uses minimum spend floors and economic staking to make Sybil-based reputation poisoning prohibitively expensive.

Spend Floor
Challenger Bonds
DefenseMechanism
The Minimum Spend Floor Failed requests or disputes from an Agent with less than $500 in lifetime compliant spend carry a weight of exactly zero against an Operator's score.
Economic Staking for Claims To file a dispute or impact a Node's reputation, the Agent must post a Challenger Bond in SENTRY. If the dispute is proven to be frivolous spam, the bond is 100% burned. Sybil attacks become prohibitively expensive.

5. The 51% Governance Cartel Too Big To Slash

The Attack

A cartel of large infrastructure providers accumulates 51% of the circulating SENTRY token supply. They pass a malicious DAO proposal to reduce the Slashing Penalty for forged logs from 100% to 0%. They then proceed to forge logs and steal enterprise funds without economic consequence.

Governance Capture
Cartel Attack
🛡 The Defense: Non-Linear Governance & Veto Locks

Quadratic voting and a Security Veto Council combine to render cartel governance capture mathematically futile.

Quadratic Voting
Veto Council
DefenseMechanism
Quadratic Voting Token voting power does not scale linearly (1 token != 1 vote). It scales quadratically: votes = sqrt(tokens). This drastically reduces the power of concentrated holders and cartels. A whale with 51% supply only gets ~71% of the vote weight of a uniform distribution.
The Security Veto Council A hardcoded multisig wallet — controlled by 7 publicly doxed, highly reputable AI and cryptography security researchers — holds a permanent veto over specific smart contract modules. The DAO can vote on emissions, treasury grants, and marketplace fees, but any change to SlashingModule.sol or InsurancePool.sol parameters must pass the DAO AND survive a 14-day timelock without being vetoed by the Council.

6. Global Economic Invariants The Math That Must Hold

If the protocol is engineered correctly, these four conditions remain mathematically true under all network loads.

Invariant 1: The Honesty Premium
Yield from honest routing must always exceed the expected value of forging logs
Yield_from_honest_routing > Expected_value_of_forging_logs

Accounting for 100% slash probability via TEE verification. Honest operators earn consistent, risk-free yield. Dishonest operators face certain economic destruction through automated slashing triggered by cryptographic proof mismatch.

Invariant 2: The Sybil Cost
Cost to acquire AAA reputation must exceed maximum insurance payout
Cost_to_acquire_AAA_Reputation > Value_of_max_allowable_Insurance_Claim_payout

Building a reputation sufficient to access the highest insurance tiers requires sustained, legitimate economic activity. The cost of farming this reputation always exceeds the maximum extractable value from a fraudulent claim.

Invariant 3: The Solvency Floor
Total protocol collateral must always exceed active enterprise exposure
Total_SENTRY_Staked + Total_USDC_in_Pool > Total_Active_Enterprise_Exposure_per_Epoch

The combined value of all staked SENTRY tokens and the USDC insurance pool must always exceed the total potential liability the protocol faces in any single epoch. This ensures the protocol can always make enterprises whole.

Invariant 4: The Deflationary Baseline
Token burn rate must exceed emission rate for long-term value accrual
SENTRY_Burned_via_Slashing + SENTRY_Burned_via_Fees > SENTRY_Emitted_via_Rewards

The total amount of SENTRY destroyed through slashing penalties and protocol fee burns must consistently exceed the amount of new SENTRY created through epoch rewards. This ensures the token supply is structurally deflationary.

global_economic_invariants.sol
// ============================================================
// GLOBAL ECONOMIC INVARIANTS — Must hold under ALL conditions
// ============================================================

// INVARIANT 1: The Honesty Premium
require(
  Yield_from_honest_routing > Expected_value_of_forging_logs,
  "INVARIANT_VIOLATED: Honesty must always be more profitable than fraud"
);

// INVARIANT 2: The Sybil Cost
require(
  Cost_to_acquire_AAA_Reputation > Value_of_max_Insurance_Claim_payout,
  "INVARIANT_VIOLATED: Reputation farming must never be profitable"
);

// INVARIANT 3: The Solvency Floor
require(
  Total_SENTRY_Staked + Total_USDC_in_Pool > Total_Active_Exposure,
  "INVARIANT_VIOLATED: Protocol must always remain solvent"
);

// INVARIANT 4: The Deflationary Baseline
require(
  SENTRY_Burned_Slashing + SENTRY_Burned_Fees > SENTRY_Emitted_Rewards,
  "INVARIANT_VIOLATED: Token supply must be structurally deflationary"
);

// If ANY invariant is violated, the protocol enters EMERGENCY MODE:
// - Emissions are halted
// - Premium multiplier spikes to 10x
// - Veto Council is alerted for manual intervention

Attack Vector Severity Summary

Attack Vector Severity Defense Mechanism Attacker Expected Outcome
Wash-Trading Exploit CRITICAL Negative-Sum Emission Invariant Net financial loss per transaction
zkTLS Ransomware CRITICAL Atomic Settlement via DA Layer Pure API cost loss + zero revenue
Insurance Drain CRITICAL Epoch Batching + 20% Drawdown Cap Pro-rata payout, pool survives
Reputation Poisoning HIGH Spend Floor + Challenger Bonds Bond burned, zero score impact
51% Governance Cartel CRITICAL Quadratic Voting + Veto Council Vote power diluted, veto blocks execution
⚠ Failure Mode

51% token cartel attempts to weaken slashing parameters via governance vote.

✓ Defense

Security Veto Council: 5-of-7 multisig can reject any change to SlashingModule.sol or InsurancePool.sol (Invariant VII.1). Quadratic voting dilutes whale concentration. 14-day timelock provides community response window.

⚠ Failure Mode

Operator and Watcher collude — operator commits fraud, Watcher stays silent for a bribe.

✓ Defense

Randomized Overlapping Assignments: operator does not know how many Watchers are assigned. Bribing one Watcher is useless if 2 others are independently auditing the same bundle. Cost of bribing the entire pool exceeds value extractable.

By enforcing these invariants via immutable smart contracts, SentryMandate ensures that fraud, censorship, and systemic attacks are not just difficult — they are mathematically guaranteed to result in net financial losses for the attacker. Every vector has been stress-tested. Every defense has a formula. Every formula has an on-chain enforcement mechanism. The cost of corruption always towers over the profit from corruption, rendering adversarial behavior a dominated strategy across all game-theoretic equilibria examined in this analysis.

5
Attack Vectors Analyzed
4
Global Economic Invariants
100%
Slash Probability via TEE
0
Profitable Attack Vectors
Next → Section 14: Game Theory formalizes these attack/defense dynamics into equilibrium analysis.
SECTION 14 — GAME THEORY & SIMULATION

Mechanism Design Validation & Cryptoeconomic Stress Tests

We do not assume good actors. We assume highly capitalized, colluding adversaries operating during extreme macro-market volatility.

This section proves: honest operation is the dominant Nash equilibrium — no coalition of rational actors can profit by deviating from protocol rules.

No-go if: Monte Carlo simulations show collusion profitability above 0.1% expected return for any coalition size < 67%.
AGENT-BASED SIM 1,000 Agents 100 Operators 50 Watchers 1,000,000 epochs Routing + Bundles + Slash CHAOS ENGINEERING -80% Price Crash 10,000% Gas Spike Macro Shock Injection Price Reflexivity Tests MONTE CARLO 10,000 parallel runs Fee: 0.1% — 5.0% Drawdown: 5% — 50% Breakpoint Detection Parameter Sweep Engine RED TEAM SCENARIOS 8 Attack Scenarios S1-S8 Full Coverage Pass/Fail Grading Adversarial Exam Suite & SAFE PARAMETER ENVELOPE protocol_fee_rate: min: 0.003 | max: 0.015 | opt: 0.005 insurance_reserve_ratio: min_safe: 1.25 | lockdown: 1.05 honeypot_frequency: epochs_per_injection: 144 Hardcoded into Smart Contracts DAO forbidden from exceeding bounds OUTPUT: spe_matrix.json SIMULATION PIPELINE cadCAD / RadCAD Frameworks — Python All 4 engines feed convergence point, output validated Safe Parameter Envelope for on-chain deployment

The output of this simulation defines the Safe Parameter Envelope (SPE) — the exact mathematical bounds hardcoded into the SentryMandate smart contracts. We do not assume good actors. We assume highly capitalized, colluding adversaries operating during extreme macro-market volatility.

Preamble: The Three Critical Vulnerabilities

Before designing the simulation, three architectural vulnerabilities must be acknowledged and resolved.

Vulnerability A

Watcher Starvation Problem

The Free-Rider Paradox

The Flaw: TEEs and zkTLS make fraud near-impossible. If Operators behave perfectly, Watchers catch zero fraud. Watchers burn money on AWS costs for months with zero revenue, so they shut down. Once Watchers are gone, Operators realize nobody is looking, and the attacks begin.

The Fix: Protocol-Injected Honeypots. The protocol intentionally generates fake, mathematically flawed Attestation Bundles. The first Watcher to catch the intentional mistake receives a calibrated SENTRY reward. This guarantees Watchers are constantly paid to stay vigilant, even in a perfectly honest network.

Starvation
Honeypot Fix
Vulnerability B

Out-of-Band Collusion

The Bribe Vector

The Flaw: What if an Enterprise Agent wants to bypass a $1,000 spend limit? The Agent pings the Operator on Telegram: "I will send you $10,000 in Bitcoin directly if you alter the enclave code to approve my request."

The Fix: Cryptographic Blind Routing. Routing is handled by the L2 Sequencer using random verifiable delay functions (VDFs). The Agent cannot predict which Operator receives its request, making bribery mathematically irrational.

Bribery
VDF Routing
Vulnerability C

Static Environment Fallacy

Ignoring Reflexivity

The Flaw: Crypto networks do not die in a vacuum; they die due to external macro shocks. If Bitcoin crashes 40%, SENTRY will crash 60%. When SENTRY crashes, the dollar-value of Operator Stake crashes, making the Cost of Corruption cheaper than the Profit from Corruption.

The Fix: Chaos Engineering & Price Reflexivity. The simulation injects exogenous market shocks (price crashes, extreme L1 gas spikes) to ensure economic invariants hold even during a global market panic.

Reflexivity
Chaos Injection

1. The Core Adversarial Profiles

We model bounded-rational, profit-maximizing actors equipped with infinite capital.

1.1 The Cartel Operator

PropertyDetail
GoalMaximize extracted value through coordinated censorship, data withholding, or log equivocation.
BehaviorsWill spin up hundreds of Sybil nodes; will attempt to bribe Watchers; will collude with other operators to achieve >51% routing share.

1.2 The Malicious Enterprise Agent

PropertyDetail
GoalBypass mandate spend limits or extract disallowed data from LLMs.
BehaviorsWill attempt out-of-band bribery of Operators; will attempt reputation farming via wash-trading; will orchestrate distributed Denial of Service (DDoS) on Watcher Nodes during an attack.

1.3 The Lazy/Bribable Watcher

PropertyDetail
GoalMaximize SENTRY rewards while minimizing AWS compute costs.
BehaviorsWill shut down servers if fraud is rare (starvation); will accept bribes from Cartel Operators to ignore specific invalid bundles.

2. Solving the Watcher Starvation Paradox

To ensure the immune system of the network never powers down, the simulation models a Protocol-Injected Honeypot Mechanism.

Watcher Profitability Invariant (must hold in simulation)
(Reward_Honeypot * Frequency_Honeypot) > Cost_Watcher
watcher_honeypot.py
Variables:
  Cost_Watcher       = Monthly compute cost to run a Watcher Node.
  Reward_Honeypot    = SENTRY bounty for catching the protocol's intentional mistake.
  Frequency_Honeypot = How often the protocol drops a fake bundle.

Invariant (must hold in Simulation):
  (Reward_Honeypot * Frequency_Honeypot) > Cost_Watcher
L2 Sequencer injects fake invalid AttestationBundle ↓ All Watchers verify proofs continuously ↓ First Watcher to catch the fake → earns significant SENTRY bounty ↓ Watchers guaranteed profitable baseline yield for staying online ↓ Network is NEVER unmonitored

3. The Bribe Mathematical Invariants

The simulation must prove that the Cost of Corruption (CoC) is always strictly greater than the Profit from Corruption (PfC), even when out-of-band bribery is utilized.

bribe_invariant.sol
Variables:
  Value_Extracted = The fiat value the Agent gains by bypassing the mandate.
  Stake_Operator  = The fiat value of the Operator's bonded SENTRY tokens.
  Bribe_Amount    = The out-of-band payment from Agent to Operator.

Conditions for an Attack to Occur:
  1. Bribe_Amount > Stake_Operator    // Operator demands enough to cover their slashed stake
  2. Value_Extracted > Bribe_Amount    // Agent must make a profit after paying the bribe

The Strict Invariant the Simulation Must Prove:
  Stake_Operator > Value_Extracted

Because the routing is randomized by the Sequencer, an Agent cannot guarantee which Operator gets their request. To execute the attack, the Agent must bribe multiple Operators, exponentially increasing the Bribe_Amount and guaranteeing the attack operates at a net financial loss.

4. The Simulation Engines (The Stack)

We run four distinct simulation pipelines using Python (e.g., cadCAD or RadCAD frameworks).

4.1 Agent-Based Simulation (ABS)

Discrete-time simulation tracking the state of 1,000 Agents, 100 Operators, and 50 Watchers over 1,000,000 epochs. It tracks routing assignments, bundle generation, and localized slashing events.

Discrete-Time
1M Epochs
4.2 Chaos Engineering (Macro Shocks)

We inject severe external market variables into the ABS environment to test protocol resilience under extreme conditions.

ShockScenarioKey Question
-80% Price CrashFiat value of SENTRY drops 80% in 24 hours.Does Stake_Operator drop so low that Value_Extracted becomes profitable?
Gas SpikeL1 Ethereum gas fees spike 10,000%.Does it become too expensive for Watchers to submit fraud proofs? (Requires tuning the L2 rollup cadence).
4.3 Monte Carlo Parameter Sweeps

We randomize internal parameters across 10,000 parallel runs to locate the exact "breakpoints" where the system goes insolvent.

  • Sweeping Protocol_Fee from 0.1% to 5.0%
  • Sweeping Max_Insurance_Drawdown from 5% to 50%
10K Parallel Runs
4.4 Red Team Adversarial Exam

The simulation must output a passing grade for all 8 scenarios listed below. Each scenario models a specific, realistic attack vector against the protocol.

8 Scenarios
Pass/Fail

5. The Red Team Scenarios (Exam Questions)

The simulation must output a passing grade for all 8 scenarios.

IDScenarioAttackSuccess Criteria
S1 Sybil Wash Trade Attacker spins up 100 Agents and 10 Operators and trades with themselves to farm SENTRY emissions. Protocol fee paid by attacker exceeds SENTRY emissions earned.
S2 Coordinated Bank Run 10% of all active AI agents trigger a maximum insurance claim in the same epoch. Senior Tranche distributes pro-rata, reserve ratios do not hit zero, LP yield spikes to attract recapitalization.
S3 Watcher DoS Attack Cartel Operators launch a sustained DDoS against all Watcher IPs, then submit forged logs. L2 Sequencer pauses epoch finality if Watcher quorum heartbeat drops below 50%.
S4 Token Death Spiral SENTRY price crashes 80%. Dynamic Premium multiplier spikes; routing paused for nodes whose fiat stake drops below $10,000 minimum.
S5 Lazy Watcher Watchers stop verifying zkTLS proofs to save compute. Protocol-Injected Honeypot slashes lazy Watchers for failing to report the intentional fake bundle.
S6 Malicious Template Upgrade An author pushes a malicious update to an IP-NFT mandate. Zero agents affected because migrations require explicit cryptographic opt-in signatures from enterprise orchestrator.
S7 Governance Cartel Capture A whale buys 51% of circulating token supply to reduce slashing penalties. Quadratic Voting curve mathematically nullifies linear capital advantage; Veto Council blocks execution.
S8 TEE Zero-Day Exploit AWS Nitro Enclaves are fundamentally compromised globally. Protocol initiates hard freeze via Veto Council, locking Insurance Pool until hardware patches applied.

6. Simulation Outputs & The Safe Parameter Envelope (SPE)

The output of this simulation suite is the SPE Matrix, a hardcoded JSON file imported directly into the SentryMandate Smart Contracts upon deployment. The DAO is cryptographically forbidden from voting a parameter outside of its simulated safe bounds.

spe_matrix.json
{
  "protocol_fee_rate": {
    "min_safe": 0.003,
    "max_safe": 0.015,
    "optimal": 0.005
  },
  "insurance_reserve_ratio": {
    "min_safe_threshold": 1.25,
    "lockdown_trigger": 1.05
  },
  "watcher_honeypot_frequency": {
    "epochs_per_injection": 144
  }
}

By rigorously simulating reflexivity, out-of-band bribery, and watcher starvation, SentryMandate transcends theoretical game theory and becomes mathematically provable, battle-tested infrastructure. The SPE ensures every on-chain constant is validated against adversarial conditions and macro shocks.

4
Simulation Engines
8
Red Team Scenarios
10K
Monte Carlo Runs
1M
Simulated Epochs
Next → Section 15: Testnet Specification translates these theoretical guarantees into empirical validation.
SECTION 15 — TESTNET SPECIFICATION

Public Testnet Design, Safety Controls & Launch Phases

This section validates the protocol across software, economic modeling, and hardware performance constraints — testing TEE latency, zkTLS proof generation, L2 micro-reservations, and Dual-Tranche Insurance resilience.

This section proves: five Mainnet Exit Gates must pass on the Crucible testnet before genesis — no gate can be skipped or governance-overridden.

No-go if: any of the 4 Doomsday Drills fails to produce the expected defensive response within the specified time window.
0 FORGE Internal Devnet Core Team Only Chain Reset Daily Contract Tests 1 VANGUARD Permissioned Alpha 20 Allowlisted Operators Shadow Slashing Routing Tests DRILL: Latency 2 CRUCIBLE Permissionless Beta Public — Anyone LIVE Slashing Chaos Drills BankRun Gov Atk MAINNET All Gates Passed 3-PHASE TESTNET ROLLOUT Forge → Vanguard → Crucible → Mainnet Stress-test intensity increases with each phase. Adversarial test scenarios executed during Crucible Beta.

1. The 3-Phase Network Rollout

Phase 0
Forge (Internal Devnet)

Core Protocol Engineering Team only. Local EVM forks combined with local AWS Nitro Enclave simulators. Chain is reset daily.

Phase 1
Vanguard (Permissioned Alpha Testnet)

20 Allowlisted DevOps firms, 5 Allowlisted Watcher operators, and internal QA Agents. Public EVM Testnet (Sepolia). Shadow Slashing.

Phase 2
Crucible (Permissionless Beta Testnet)

Public. Anyone with Testnet SENTRY can spin up a node. Red Team hackers incentivized via bug bounties. LIVE slashing. Break the cryptoeconomics.

Phase 0: Forge — Internal Devnet

PropertyDetail
AudienceCore Protocol Engineering Team only.
EnvironmentLocal EVM forks (e.g., Anvil/Hardhat) combined with local AWS Nitro Enclave simulators.
ObjectiveValidate smart contract determinism, TEE boot sequencing, and basic zkTLS mock-proof generation.
StateHighly volatile. The chain is reset daily.

Phase 1: Vanguard — Permissioned Alpha

PropertyDetail
Audience20 Allowlisted DevOps firms, 5 Allowlisted Watcher operators, and internal QA Agents.
EnvironmentPublic EVM Testnet (e.g., Sepolia or Base Sepolia).
ObjectiveTest multi-node routing, SentryMandate micro-reservations, and network liveness under real-world internet latency.
SlashingShadow Mode — Calculated and logged, but testnet stake is not actually burned.

Phase 2: Crucible — Permissionless Beta

PropertyDetail
AudiencePublic. Anyone with Testnet SENTRY can spin up a node. Red Team hackers heavily incentivized via bug bounties.
EnvironmentPersistent Public EVM Testnet.
ObjectiveBreak the cryptoeconomics. Test Dual-Tranche insurance pool, live slashing, and the Watcher honeypot mechanism.
SlashingLive. Malicious nodes are aggressively slashed and jailed.

2. Hardware & Cryptographic Pre-Requisites

Unlike standard Web3 protocols, SentryMandate cannot be tested on standard hardware.

🔐 Enclave Attestation Enforcement

To join the OperatorRegistry in Vanguard or Crucible, the Operator MUST submit a cryptographic Attestation Document.

  • Smart contract verifies signature matches the AWS Root Certificate
  • Smart contract verifies PCR0 measurement matches the approved, open-source SentryEnclave.eif testnet image
🤖 Mock LLM Providers (zkTLS Dummy API)

We do not want Testnet operators burning real fiat on OpenAI API calls.

  • Core team hosts mock.api.openai.com server
  • Server accepts prompts, waits 500ms (simulated latency), returns standardized JSON with fake total_cost
  • TEE Enclaves generate real zkTLS proofs against Mock API to simulate cryptographic overhead

3. The Testnet Asset Faucets

To test the Dual-Tranche economics, users need access to two distinct testnet tokens.

3.1 Testnet SENTRY (tSENTRY)

PropertyDetail
UseOperator Staking, Watcher Challenger Bonds, and Governance Voting.
DistributionAvailable via a public Discord faucet (drip-limited to prevent Sybil hoarding). Allowlisted Alpha operators receive a bulk airdrop of 10,000 tSENTRY to meet the minimum node stake.

3.2 Mock-USDC (mUSDC)

PropertyDetail
UseEnterprise SaaS payments, Insurance Premiums, Mandate Marketplace licensing, and the Senior Insurance Tranche.
DistributionUnlimited minting for testnet Agents to simulate large enterprise API budgets.

4. The Chaos Engineering Schedule — Adversarial Test Scenarios

During the Crucible Beta, the core team will intentionally execute the following adversarial drills on a public schedule. The network must demonstrate resilience and automatic recovery to pass the Mainnet gates.

4.1 Drill 1: The Watcher Honeypot

Core team injects forged AttestationBundle via admin override (claims spend $0.05 when zkTLS receipt says $0.50) ↓ Bundle enters L2 Sequencer ↓ Public Watcher detects mismatch → submits Challenger Bond ↓ Forged bundle slashed before epoch finalizes ↓ Watcher claims tSENTRY bounty

Action: The core team uses an admin override to inject a mathematically forged Attestation Bundle (claiming a spend of $0.05 when the zkTLS receipt says $0.50) into the L2 Sequencer.

Success Criteria: A public Watcher Node must detect the mismatch, submit the Challenger Bond, and successfully slash the forged bundle before the epoch finalizes, claiming the tSENTRY bounty.

4.2 Drill 2: The Latency Shock

Action: The core team intentionally overloads the Mock LLM API, causing 50% of all requests to time out after 10 seconds. This simulates catastrophic upstream provider degradation that would occur during peak usage or provider outages.

Success Criteria: The SentryMandate micro-reservations must automatically expire, successfully releasing the locked mUSDC back to the Agents without trapping enterprise funds in dead state channels. All timeout recovery paths must execute cleanly without manual intervention from the protocol team.

4.3 Drill 3: The Insurance Bank Run

Action: The core team simulates a zero-day exploit, triggering 5,000 simultaneous maximum-payout insurance claims in a single epoch. This replicates the worst-case correlated failure scenario where a widely deployed agent framework is compromised.

Success Criteria: The InsurancePool contract must trigger the 20% Maximum Drawdown Limit. It must distribute the mUSDC pro-rata, prevent insolvency, and automatically spike the dynamic premium pricing for the next epoch. The Senior Tranche must never reach zero liquidity.

4.4 Drill 4: The 51% Governance Attack

Action: The core team distributes 60% of the circulating tSENTRY supply to a single "Attacker" wallet. The attacker submits a DAO proposal to reduce the Slashing Penalty to 0. This tests the protocol's governance safety mechanisms under the most extreme whale concentration scenario.

Success Criteria: The Quadratic Voting algorithm must severely dilute the whale's voting power. Even if the vote passes, the Veto Council multisig must successfully execute a block, proving the safety rails work. The 14-day timelock must provide sufficient window for the council to act.

5. Slashing Rollout Plan (Shadow to Live)

Slashing bugs destroy communities. We roll this out with extreme caution.

5.1 Shadow Slashing (Vanguard Phase)

Watcher submits dispute ↓ DisputeModule evaluates evidence ↓ Emits ShadowSlash event (logged only) ↓ Dashboard: "Operator X WOULD have lost 10,000 tSENTRY"Balances remain UNCHANGED

Watchers submit disputes. The DisputeModule evaluates the evidence and emits a ShadowSlash event. Dashboards show "Operator X would have lost 10,000 tSENTRY," but balances remain unchanged.

Goal: Tune the parameters and eliminate false positives caused by network jitter.

5.2 Live Objective Slashing (Crucible Phase)

The training wheels come off.

Offense ClassPenaltyAction
Class A Forged zkTLS, Equivocation 100% Instantly burn entire operator stake.
Class B Downtime, Missed Heartbeats 0.1% — 5% Slash based on severity.

Goal: Prove that the deflationary burn mechanics function correctly under adversarial load.

6. Telemetry & Observability Dashboards

A testnet is only useful if the data is highly legible to the community and stakeholders. SentryMandate must host a public Grafana/Dune Analytics dashboard tracking:

📈 6.1 Network Economics
  • Total mUSDC routed through the network
  • Total tSENTRY burned via protocol fees (Buy-and-Distribute engine)
  • Current Operator APY (Yield from emissions + fees)
🔒 6.2 Security Metrics
  • Active Watcher Count and geographic distribution
  • Number of Honeypot bundles caught vs. missed
  • Total tSENTRY slashed and burned
🏦 6.3 Insurance Health
  • Total mUSDC in the Senior Tranche
  • Current Utilization Ratio (U)
  • Real-time Premium Multiplier (current policy pricing)

7. Mainnet Exit Gates (Acceptance Criteria)

SentryMandate will NOT launch Mainnet until every single one of these quantifiable gates is passed during the Crucible Beta.

GateRequirementThreshold
Gate 1 Hardware Stability Network sustains 1,000 concurrent Agent requests/second through verified AWS Nitro Enclaves with P95 latency < 200ms (excluding LLM generation time).
Gate 2 Economic Solvency Network successfully survives the "Insurance Bank Run" drill without the Senior Tranche hitting zero liquidity.
Gate 3 Immune System Verification Watcher Nodes successfully catch 100% of Protocol-Injected Honeypot forged bundles over a 14-day consecutive period.
Gate 4 Deflationary Proof Amount of tSENTRY burned via protocol fees and slashing exceeds amount emitted via epoch rewards for at least 3 consecutive days.
Gate 5 Marketplace Legibility At least 10 unique IP-NFT Mandate Templates are minted, sub-licensed, and successfully route royalties to their authors.

8. The Red Team Bug Bounty Program

During the Crucible Beta, the protocol treasury will allocate $250,000 in USDC (real fiat, not testnet) to incentivize white-hat hackers.

The protocol pays bounties for successfully demonstrating any of the following critical attack vectors against the testnet deployment:

TargetAttack VectorSeverity
TEE Payload Extraction Successfully extracting a plaintext payload from a running AWS Nitro Enclave node. This would compromise the fundamental confidentiality guarantee of the protocol. Critical
zkTLS Forgery Successfully forging a zkTLS receipt that bypasses the DisputeModule logic. This would break the integrity of cost attestation proofs. Critical
Double-Spend Successfully double-spending an SentryMandate micro-reservation. This would compromise the payment settlement layer. Critical
Infinite Mint Finding a math exploit that allows infinite minting of the tSENTRY token. This would destroy all tokenomic guarantees. Critical
$250K
Bug Bounty Pool (USDC)
3
Testnet Phases
5
Mainnet Exit Gates
4
Adversarial Test Scenarios
Next → Section 16: Marketplace Architecture defines the IP-NFT governance template economy.
SECTION 16 — MARKETPLACE ARCHITECTURE

IP-NFT Marketplace: Governance Policy Licensing

Mint compliance policies as on-chain IP-NFTs, license them to enterprises, and earn automated trustless royalties via curation markets.

This section proves: Mandate templates are immutable IP-NFTs — silent upgrades are impossible (Invariant V.1), and flat-fee licensing prevents royalty stacking (Invariant V.2).

No-go if: IP-NFT minting gas cost exceeds $5, pricing out independent governance researchers.
HEALTHCARE v1.2 Stake: 2,400 SENTRY DEFI TRADING v3.0 Stake: 8,100 SENTRY FINANCE COMPLIANCE v1.0.0 — Author: 0xA3..F7 max_daily_spend: $500 endpoints: bloomberg, openai forbidden: shell, filesystem Staked: 45,200 SENTRY Rank #3 — Score: 87/100 LICENSE & DEPLOY BASE SECURITY v2.1.0 — Author: 0x7B..D2 tee_required: true zktls_verify: mandatory forbidden: data_exfiltration Staked: 112,800 SENTRY Rank #1 — Score: 96/100 LICENSE & DEPLOY C1 +5,000 SENTRY C2 +12,000 SENTRY C3 +28,000 SENTRY COMPOSABILITY TREE Base Template Author A — Security Core inherits Derived Template Author B — Finance Compliance licensed by Enterprise Fleet CrewAI — 50 Agents USDC Royalty Cascade STAKE ELEVATES RANKING Low Stake Mid Stake High Stake SentryMandate Marketplace — IP-NFT Gallery / Curator Staking / Composability Tree

IP-NFT Standard The Asset Standard: Mandates as IP-NFTs

The Mandate Marketplace transforms AI compliance from a bespoke engineering chore into a globally liquid, tokenized asset class. Governance Architects, security researchers, and legal firms mint policy configurations as on-chain IP-NFTs, license them to enterprises, and earn automated trustless royalties. A Mandate is minted on the Layer-2 Settlement chain using an IP-NFT standard (similar to ERC-6551 or Story Protocol), ensuring the template itself can own its royalty revenue streams.

1.1 Template Registration

An AI Governance Architect submits a canonical JSON policy and mints the Master NFT.

template_registration.json
{
  "template_id": "0xIP_NFT_ADDRESS",
  "version": "1.0.0",
  "author_wallet": "0xAUTHOR...",
  "category": "FINANCE_COMPLIANCE",
  "mandate_ruleset": {
    "max_daily_spend": 500,
    "allowed_endpoints": ["api.bloomberg.com", "api.openai.com"],
    "forbidden_tools": ["local_file_system", "shell_execution"]
  },
  "licensing_terms": {
    "model": "MONTHLY_FLAT",
    "price_usdc": 50.00
  },
  "immutable_hash": "0x[SHA256(canonical_json)]"
}

1.2 Immutable Version Control

Once minted, version 1.0.0 is cryptographically frozen. If the author wants to add api.anthropic.com to the allowed endpoints, they must mint version 1.1.0.

v1.0.0 (frozen on-chain)
  ↓ Author publishes update
v1.1.0 (new mint — adds api.anthropic.com)
  ↓ Enterprise Dashboard flags upgrade available
Enterprise Orchestrator (e.g., CrewAI) must explicitly sign on-chain tx to migrate agents to v1.1.0
  • Enterprises using 1.0.0 are unaffected.
  • The Enterprise Dashboard flags that an upgrade is available.
  • The Enterprise Orchestrator (e.g., CrewAI) must explicitly sign an on-chain transaction to migrate its agents to 1.1.0. This mathematically prevents supply-chain rug pulls.

Licensing Engine The Licensing & Royalty Engine

To protect enterprises from unpredictable fees, SentryMandate deprecates percentage-based API royalties in favor of Programmable Flat-Fee Subscriptions.

2.1 The Payment Flow

When an Enterprise licenses a template, it opens a streaming payment channel or pays a 30-day upfront fee in USDC. The smart contract splits this fee:

Variables & Revenue Split
Fee_License = Total monthly USDC paid by the Enterprise.

Royalty_Author   = Fee_License × 0.80 (80% → Template Author)
Yield_Curators   = Fee_License × 0.10 (10% → Staked Curators)
Revenue_Protocol = Fee_License × 0.10 (10% → Protocol Treasury)
Example: $50/month License
$40
Author (80%)
$5
Curators (10%)
$5
Protocol Treasury (10%)
Enterprise pays $50/month USDC → MarketplaceModule
  ├— 80% ($40) → Author's wallet (USDC)
  ├— 10% ($5)  → Curators (pro-rata by SENTRY stake)
  └— 10% ($5)  → Protocol Treasury

2.2 IP Composability (Sub-Licensing)

Because these are standard IP-NFTs, they are composable. An author can create a Master Finance Template inheriting rules from a Base Security Template by someone else. The smart contract cascades USDC royalties down the dependency tree.

Base Security Template (Author A) ← earns royalties from ALL downstream
  ↓ inherits
Master Finance Template (Author B) ← earns royalties from direct licensees
  ↓ licensed by
Enterprise Agent Fleet ← pays single flat USDC fee

TCR The Token-Curated Security Market

Enterprises need to know which templates are safe. Instead of relying on centralized Admin Badges, SentryMandate uses cryptoeconomic staking to crowdsource security audits.

3.1 Staking for Yield (Curators)

Any SENTRY staker can act as a Curator. If a Curator reviews a template's JSON code and determines it is well-audited and robust, they can stake SENTRY tokens on that template.

The Incentive

Curators earn a share of licensing revenue (from the 0.5% protocol fee stream), distributed pro-rata based on their staked SENTRY.

The Risk

If the template contains malicious logic (e.g., it routes funds to a hacker) and is reported, the template is delisted, and the Curators' staked SENTRY is 100% slashed and burned.

3.2 The Mathematical Curation Yield

Variables
Total_License_Volume    = Total USDC generated by the template.
Stake_User              = The amount of SENTRY staked by this specific Curator.
Total_Stake_On_Template = The sum of all SENTRY staked on this specific template.
Curator_Cut             = The percentage of licensing revenue allocated to curators (e.g., 0.10).
Curation Yield Formula
Curator_Yield = Total_License_Volume × (Stake_User / Total_Stake_On_Template) × Curator_Cut

Result: High-quality, safe templates attract significant amounts of staked SENTRY because they generate high licensing volume. Malicious templates attract zero stake (because attackers know they will be slashed). The amount of SENTRY staked on a template becomes its ultimate, un-fakeable security badge.

Reputation The Template Reputation System

A Template's ranking is dictated by a deterministic algorithm, influenced by the Dual-Axis Reputation Engine.

4.1 Marketplace Ranking Score

Templates are ranked from 0 to 100 based on verified on-chain history:

WeightFactorMeasures
40%Economic SecurityThe total dollar value of SENTRY staked on the template by Curators.
30%Execution CompetenceThe average Competence_Score of all AI agents currently operating under this mandate. (Do agents using this template crash often?)
20%Lindy Effect / Time AliveHow long the template has been actively used without a dispute or slashing event.
10%Adoption VolumeThe total active USDC licensing volume.

Insurance Integration with the Insurance Engine

The Marketplace interfaces with the Tranched Risk Pools. When an enterprise applies for Overspend Insurance, the smart contract checks the immutable_hash of the Mandate the agent runs.

ScenarioStaked CuratorsHistoryInsurance Effect
Blue Chip DiscountAAA-ranked template (e.g., $1M in SENTRY staked)Extensive, cleanSteep discount on monthly USDC premium.
Custom/Unknown PenaltyZero staked curatorsZero historyMaximum premium multiplier — risk of misconfiguration is entirely unvetted.

Enterprise UI Enterprise UI & Discovery (The Frontend)

The Marketplace is exposed to the Enterprise Compliance Officer via a seamless, Web2-style SaaS interface.

FeatureDescription
FiltersSearch by Industry (e.g., Healthcare, DeFi Trading), Max Spend Limits, Allowed Providers (e.g., Anthropic Only).
Risk VisualizerA clear indicator showing how much SENTRY is staked backing the template's security.
One-Click DeploymentThe Compliance Officer clicks License & Deploy. The SaaS backend handles the USDC payment, updates the Agent's identity on the L2 Sequencer, and instantly enforces the new rules across the TEE Proxy network.

Flywheel The Economic Flywheel

The Marketplace completes the SentryMandate network effect:

Top security researchers publish flawless compliance templates
  ↓
Curators review code & stake SENTRY on templates to earn yield
  ↓
Enterprises see high staked value → license templates with confidence
  ↓
Agents use templates → drive volume to TEE Operators
  ↓
Enterprise insurance premiums drop (vetted rules = lower risk)
  ↓
Authors & Curators earn USDC royalties
  ↓
Incentivized to build even better templates
  └——— cycle repeats ———┤

This transforms SentryMandate from a simple middleware proxy into the definitive App Store for Autonomous AI Governance.

Deep Dive Marketplace Mechanics

Minting & Versioning

The Governance Architect compiles a canonical JSON policy and hashes it with SHA-256 to produce the immutable_hash on the L2 Settlement chain. The minting transaction creates a Master IP-NFT owning all downstream royalty streams. Updates enforce append-only versioning: 1.0.0 stays frozen while 1.1.0 is minted separately. Orchestrators must sign an on-chain migration transaction to adopt new versions.

Payment Channels & Royalty Trees

Licensing supports streaming payment channels (per-second USDC transfers) and 30-day upfront flat fees. The MarketplaceModule executes an atomic three-way split on every payment. Composability enables hierarchical inheritance where derived templates extend parent rulesets. Royalty cascades walk the dependency tree, distributing USDC to every author with a minimum 10% parent allocation.

Stake Dynamics & Ranking

Staking SENTRY is a financially-backed safety claim. Staking rewards follow a time-weighted schedule favoring validator longevity; slashing ensures only genuine auditors stake meaningfully. The ranking algorithm is deterministic: Economic Security normalized against max stake, Execution Competence from live agent scores, Lindy Effect from dispute-free duration, Adoption Volume from USDC demand. No manual curation or pay-for-placement.

Insurance & Deployment

AAA-ranked templates receive maximum insurance premium discounts; unranked templates face maximum multipliers. One-click deployment executes atomically: vault approves USDC, MarketplaceModule records the license, L2 Sequencer binds agents to the template hash, TEE Proxies enforce within one epoch. Under 30 seconds from click to enforcement with on-chain settlement.

Next → Section 17: Watcher Incentive Architecture details the network's immune system.
SECTION 17 — WATCHER INCENTIVE ARCHITECTURE

Cryptoeconomic Enforcement Layer

Economic parameters designed to sustain Watcher profitability under baseline operational conditions, with modeled resilience against bribery and cartel coordination.

This section proves: the Tri-Layer Incentive Engine (Dispute Bounty + Proof-of-Vigilance Subsidy + Reputation Leverage) guarantees Watcher liveness even when fraud rate approaches zero.

No-go if: Proof-of-Vigilance subsidy cost exceeds 8% of total protocol fee revenue at steady state.
TRI-LAYER INCENTIVE STACK LAYER 1: DISPUTE REWARD SHARE Core Bounty — 30-50% of Slashed Amount Watcher_Reward = Slashed_Amount * Reward_Pct Reward exceeds Challenger Bond opportunity cost Hardening: Min 25% reward floor (immutable) LAYER 2: PROOF-OF-VIGILANCE SUBSIDY Baseline Yield — Paid even with zero fraud Coverage Proofs: verify random 100-bundle subsets Sign attestation: "Epoch N is 100% clean" Honeypot Hook: fake bundles catch lazy Watchers Blind signing = instant boot from subsidy pool LAYER 3: REPUTATIONAL LEVERAGE Watcher Score — On-chain accuracy & uptime Dispute Priority: 5-block head start on bounties Capital Efficiency: 50% Challenger Bond discount Higher score = higher ROC + first-mover advantage WATCHER NODE Independent Auditor L1 L2 L3 STARVATION DEATH SPIRAL Operators behave perfectly Watchers catch zero fraud: EV negative Watchers exit: detection drops to 0 Operators attack: nobody watching BREAK Tri-Layer Engine SentryMandate Watcher Incentive Architecture — Tri-Layer Stack / Death Spiral Break

Core Problem The Starvation Paradox

The fundamental equation of a Watcher's expected profit reveals a critical and deeply structural vulnerability at the heart of any purely bounty-based monitoring system in decentralized networks.

Expected Profit Formula
Expected_Profit = (Probability_of_Detection × Slash_Reward) - Compute_Cost
VariableMeaning
Probability_of_DetectionThe chance of finding a valid mandate violation or forged log.
Slash_RewardThe payout for successfully slashing an Operator.
Compute_CostThe ongoing server and gas costs to process the evidence logs.

The Paradox: As the network matures and operators realize cheating results in guaranteed slashing, Probability_of_Detection approaches zero. When it hits zero, Expected_Profit becomes strictly negative. Watchers exit the network. The moment watchers exit, detection actually becomes zero, making it highly profitable for Operators to begin cheating.

The Starvation Death Spiral

Operators behave perfectly
  ↓
Watchers catch zero fraud → EV goes negative
  ↓
Watchers shut down AWS servers → detection drops to zero
  ↓
Operators realize nobody is looking → attacks begin
  ↓
THE STARVATION DEATH SPIRAL — Network silently degrades into a trust-based Web2 proxy

Solution: We abandon the reliance on pure bounty hunting and move to a Tri-Layer Incentive Engine.

Tri-Layer Engine Three Stacked Economic Drivers

We do not rely on a single incentive. We stack three distinct economic drivers to guarantee permanent Watcher liveness across all network conditions and market cycles.

Layer 1: Dispute Reward Share (The Core Bounty)

When a Watcher successfully proves an Operator committed fraud (e.g., equivocation, forged zkTLS), the Operator's stake is slashed. The Watcher's reward must exceed the opportunity cost of the capital requirements of holding the Challenger Bond.

Layer 1 Reward Formula
Watcher_Reward = Slashed_Amount × Reward_Percentage

The Hardening Rule: The Reward_Percentage must be hardcoded between 30% and 50%. If an Operator loses a $10,000 stake, the Watcher must walk away with $3,000 to $5,000. If it drops below 25%, the asymmetric risk of fighting a highly capitalized Operator deters independent Watchers.

Layer 2: Proof-of-Vigilance Subsidy (The Baseline Yield)

To solve the Starvation Paradox, we must pay Watchers even when zero fraud occurs. We implement a Monitoring Subsidy. Watchers submit periodic Coverage Proofs to the L2 Sequencer.

Watcher downloads Operator's Merkle root
  ↓
Deterministically recomputes policy outcomes for random 100-bundle subset
  ↓
Signs cryptographic attestation: "Epoch 442 is 100% clean"
  ↓
Protocol pays flat SENTRY baseline yield
  • The Mechanism: A Watcher downloads an Operator's Merkle root, deterministically recomputes the policy outcomes for a random subset of 100 bundles, and signs a cryptographic attestation stating: "I verified Epoch 442, and it is 100% clean."
  • The Reward: The protocol pays a flat SENTRY baseline yield (funded by token emissions early on, and protocol fees later) to all Watchers who submit valid Coverage Proofs.
  • The Honeypot Hook: To ensure Watchers aren't just blindly signing "All Clear" proofs, the protocol randomly injects fake bundles. If a Watcher signs an "All Clear" on an epoch containing a Honeypot, they are instantly booted from the subsidy pool.

Layer 3: Reputational Leverage (The Watcher Score)

Watchers build an on-chain reputation based on their historic accuracy and uptime. A high Watcher Score unlocks structural network advantages:

AdvantageBenefit
Dispute PriorityHigh-score Watchers get a 5-block head start to submit fraud proofs before lower-tier Watchers can claim the bounty.
Capital EfficiencyHigh-score Watchers receive a 50% discount on the required Challenger Bond size, vastly improving their Return on Capital.

Bond Calibration Cryptoeconomic Bond Calibration

If it costs nothing to file a dispute, attackers will spam the network with fake disputes to freeze Operator capital (a Denial of Service attack). Watchers must post a Challenger Bond.

Dynamic Scaling Formula
Challenger_Bond = Bond_Multiplier × Average_Slash_Amount
RuleMechanism
Base RateThe multiplier defaults to 10% (e.g., a $1,000 bond to challenge a $10,000 stake).
Exponential Spam BackoffIf a specific Watcher wallet loses a dispute (meaning it was frivolous), their personal multiplier doubles for the next dispute (20%, 40%, 80%).
ResetA successfully proven dispute instantly resets their multiplier back to the base rate.

Detection Detection Probability Maximization

To ensure detection remains high even if the raw number of Watchers is low, the L2 Sequencer acts as a central coordinator for audit assignments.

4.1 Randomized Overlapping Assignments

Watchers do not blindly download the entire global firehose of data (which is computationally impossible at scale). The Sequencer assigns pseudo-random subsets of traffic to specific Watcher subsets.

Operator A traffic → assigned to Watchers 1, 4, 9
Operator B traffic → assigned to Watchers 2, 4, 7
Operator C traffic → assigned to Watchers 3, 5, 9
  ↓
Overlapping assignments guarantee coverage
If Watcher 1 gets lazy → Watchers 4 and 9 still catch fraud

4.2 High-Value Traffic Flagging

Not all bundles are created equal.

Bundle ValueVerification Level
Standard ($0.02 LLM call)Standard random sampling.
High-Value ($5,000 wallet transfer)Mandatory Multi-Signature Review — protocol flags the bundle, and 3 independent Watchers must process it before the transaction fully settles.

Anti-Collusion Anti-Collusion & Bribery Resistance

The Threat: Operator X commits a $10,000 fraud. Watcher Y detects it. Operator X messages Watcher Y: "I will pay you $6,000 under the table to ignore this."

The Mathematical Defense

Bribery only works if the Operator can guarantee silence. Because the L2 Sequencer uses Randomized Overlapping Assignments, the Operator does not know how many Watchers are auditing that specific bundle.

Operator X bribes Watcher Y for $6,000 to stay silent
  ↓
But Watcher Z is ALSO assigned to the same bundle
  ↓
Watcher Z reports the fraud
  ↓
Operator X loses: $6,000 bribe (gone) + $10,000 stake (slashed) = $16,000 total loss

The Invariant: To successfully bribe the network, the Operator must bribe a majority of the entire global Watcher pool, ensuring that the Cost of Bribery is always exponentially higher than the Value Extracted.

Sustainability Long-Term Sustainability Curve

Watcher rewards must carefully transition to ensure the protocol does not inflate itself to death.

PhaseEpoch RangeRevenue MixStrategy
The Bootstrap0 – 18090% Layer 2 Monitoring Subsidy (Token Emissions)Overpay Watchers to build the network's reputation.
The Transition180 – 365Gradual shift to protocol feesDAO slowly redirects 5% of all USDC routing fees into the Watcher Yield Pool, replacing emissions with real fiat yield.
EndgameYear 2+3% – 8% of total global fee flowMonitoring the AI economy becomes as predictable and boring as validating Ethereum blocks.

Constitution Hardcoded Parameter Floors

To prevent governance capture from softening the immune system, the following parameters are hardcoded as immutable constants in the Solidity contracts. They cannot be altered by a DAO vote.

hardcoded_parameter_floors.sol
MIN_SLASH_EQUIVOCATION:      100%    // No mercy for objective fraud.

MIN_WATCHER_REWARD_SHARE:    25%     // The DAO cannot vote to steal the Watcher's cut.

MAX_CHALLENGER_BOND:         20%     // The DAO cannot price independent Watchers
                             of expected slash    out of the market.

SUBSIDY_FREEZE_THRESHOLD:    // The Monitoring Subsidy cannot be deactivated unless
                             // the rolling 30-day protocol fee revenue exceeds the
                             // 30-day Watcher compute baseline.

Pre-Flight Mainnet Pre-Flight Checklist

Before the Mainnet genesis block is mined, the engineering team must prove the following in the Crucible Testnet:

  • The 1% Simulation: Run the testnet where the violation rate is artificially suppressed to 1%. Prove that the Layer 2 Monitoring Subsidy keeps Watcher EV positive.
  • The Spam Loop Test: Program a bot to submit 10,000 false disputes. Prove that the dynamic bond scaling liquidates the bot's capital before it degrades the network.
  • The Bribe Threshold Test: Prove that an Operator cannot successfully bribe a randomized Watcher quorum without spending more than their staked collateral.
  • The Honeypot Liveness Check: Prove that if Watchers fail to catch the protocol-injected honeypot, their baseline yields are immediately suspended.

Security is not elegance; it is brute economic force. By overpaying early, overlapping assignments, and enforcing merciless slashing, you guarantee the network's immune system never sleeps.

Assumptions

Watcher compute costs remain below the Proof-of-Vigilance subsidy. Randomized overlapping assignments guarantee at least one honest Watcher per operator. Honeypot injection is indistinguishable from real traffic.

Trust Boundaries

Watchers do not trust operators — they independently recompute policy outcomes. Operators do not know which Watchers are assigned to their traffic (preventing targeted bribery). The bribery cost exceeds the value extractable (Invariant II.3).

On-Chain Enforcement

MIN_WATCHER_REWARD_SHARE == 25% is immutable — DAO cannot reduce Watcher compensation. Honeypot injection every N epochs is automatic (Invariant II.2). Subsidy freeze threshold prevents premature deactivation.

⚠ Failure Mode

Network reaches 100% honest operation. Watchers find zero fraud. Expected value goes negative. Watchers exit. Security collapses (Starvation Paradox).

✓ Defense

Proof-of-Vigilance Subsidy (Layer 2): flat SENTRY baseline yield paid for valid Coverage Proofs, regardless of fraud rate. Honeypot injection ensures lazy Watchers are caught and ejected.

⚠ Failure Mode

Watcher blindly signs ‘All Clear’ proofs without actually verifying bundles.

✓ Defense

Protocol injects forged Honeypot bundles every N epochs (Invariant II.2). Signing ‘All Clear’ on a Honeypot epoch results in instant ejection from subsidy pool and forfeiture of staked bond.

Analysis Watcher Economics Deep Dive

Layer 1 Game Theory

The Dispute Reward Share creates a powerful incentive alignment where Watchers are financially motivated to invest in superior detection infrastructure. A Watcher who can detect fraud faster than competitors captures the entire bounty. The 30-50% reward range ensures that even after accounting for the Challenger Bond lockup cost and the computational overhead of generating fraud proofs, the expected return on a successful dispute significantly exceeds traditional DeFi yield farming. This transforms Watchers from passive monitors into active profit-seeking adversaries of any misbehaving Operator.

Layer 2 Mechanism Design

The Proof-of-Vigilance Subsidy eliminates the fundamental game-theoretic weakness of pure bounty systems. By guaranteeing a baseline yield regardless of network honesty levels, the protocol ensures that rational economic actors maintain monitoring infrastructure even during extended periods of zero fraud. The Honeypot injection mechanism provides the critical accountability layer: Watchers cannot simply collect subsidies without performing genuine verification work. The combination of guaranteed income and random auditing creates an incentive-compatible mechanism.

Reputation Compounding

Layer 3 creates a compounding advantage for honest, long-term Watchers. The 5-block dispute priority window means high-reputation Watchers have exclusive first access to valuable bounties, while the 50% Challenger Bond discount dramatically improves their capital efficiency. These advantages compound over time: a Watcher with a perfect track record can deploy the same capital more efficiently and capture more bounties than a newcomer, creating natural barriers to entry that reward sustained honest participation.

Bond Dynamics & Spam Defense

The exponential spam backoff mechanism creates a mathematical guarantee against dispute flooding. An attacker submitting frivolous disputes faces geometrically escalating bond requirements (10%, 20%, 40%, 80%), meaning that after just 4 failed attempts, they must post 80% of the expected slash amount as collateral. Combined with the base rate of 10%, the bond system ensures that legitimate Watchers face minimal barriers while bad actors are rapidly priced out of the dispute system entirely.

Next → Section 18: Protocol Invariants codifies all non-negotiable system laws.
SECTION 18 — PROTOCOL INVARIANTS

Constitutional Invariants & Non-Negotiable System Laws

Permanent, non-negotiable cryptographic and economic constraints hardcoded into Solidity contracts and TEE Enclaves.

This section proves: 16 invariants across 7 domains are hardcoded as immutable Solidity assertions — governance cannot override without hard-forking the protocol.

No-go if: any invariant assertion can be bypassed via proxy contract upgrade pattern or delegatecall.
PROTOCOL CONSTITUTION I. TEE_ISOLATION: PCR0 == canonical II. FRAUD_DEATH: slash == 100% III.RESERVE_RATIO >= 1.25 IV. REPUTATION: view() only V. IP_IMMUTABLE: hash frozen VI. MAX_ROUTING <= 15% VII.VETO_COUNCIL: 5-of-7 msig assert(invariant) || revert(); // governance CANNOT override // hard fork required to change 17 invariants across 7 domains written in code, not guidelines they do not evolve I EXECUTION II SLASHING III INSURANCE IV REPUTATION V MARKETPLACE VI TOPOLOGY VII GOVERNANCE SentryMandate Protocol Constitution — 17 Invariants Across 7 Domains

These are not community guidelines; they are code-level assertions hardcoded into the Solidity smart contracts and the TEE Enclave images. If a transaction attempts to violate these invariants, the transaction simply reverts. Governance cannot override these without hard-forking the protocol.

Domain I Core Execution & Cryptography Invariants

I.1 The TEE Isolation Mandate

No request may be executed, and no evidence bundle may be generated, outside of a hardware-verified Trusted Execution Environment.

invariant_I1_tee_isolation.sol
Code-Level Invariant:
  The OperatorRegistry must reject any node registration that lacks a valid
  PCR0 hardware attestation matching the canonical SentryEnclave.eif image.

Result: Operator code modification is mathematically impossible without instantly stripping the node of its routing eligibility.

I.2 The Data Availability (DA) Prerequisite

A Merkle root commitment to the Layer 1 blockchain is null and void if the underlying data is withheld.

invariant_I2_data_availability.sol
Code-Level Invariant:
  The CommitmentLedger.sol contract requires a valid DA inclusion proof
  (e.g., Celestia blob pointer) alongside every Merkle root submission.

Result: Watchers are guaranteed access to the raw data required to generate fraud proofs.

I.3 The SentryMandate Concurrency Law (No Double Spends)

An AI Agent cannot double-spend its fiat API budget, even when routing thousands of parallel requests.

invariant_I3_no_double_spend.sol
Code-Level Invariant:
  Sigma(active_micro_reservation_locks) for a specific (agent_id, mandate_hash)
  pair MUST be <= total_available_USDC_budget

Result: Real-time budget safety is guaranteed without requiring synchronous global database locks.

Domain II Economic Enforcement & Slashing Invariants

II.1 The Objective Fraud Death Penalty

Equivocation (signing two different outcomes for the same request ID) and zkTLS forgery are unforgivable offenses.

invariant_II1_fraud_death.sol
Code-Level Invariant:
  MIN_SLASH_EQUIVOCATION == 100%

  There is no governance parameter to lower this. If cryptographic fraud
  is proven, the operator's entire stake is burned/liquidated, and the
  operator_pubkey is permanently blacklisted.

II.2 The Watcher Liveness Guarantee

The protocol's immune system must never starve, even in a perfectly honest network.

invariant_II2_watcher_liveness.sol
Code-Level Invariant (A):
  The L2 Sequencer must autonomously inject a forged "Honeypot" bundle
  every N epochs.

Code-Level Invariant (B):
  If Watcher participation drops below the safe quorum, the protocol
  automatically halts all new Insurance policy issuance until the
  Watcher pool is recapitalized.

II.3 The Bribe Resistance Floor

The cost of corrupting the network must always exceed the value that can be extracted.

invariant_II3_bribe_resistance.sol
Code-Level Invariant:
  The DisputeModule.sol dynamically scales the Challenger Bond to ensure
  that spamming the dispute system mathematically bankrupts the attacker
  before it affects operator liveness.

Domain III Capital Solvency & Insurance Invariants

III.1 The Dual-Tranche Capital Wall

Fiat-denominated enterprise losses cannot be underwritten by volatile protocol tokens.

invariant_III1_dual_tranche.sol
Code-Level Invariant:
  Insurance claims MUST be paid out in USDC (Senior Tranche).
  Slashed SENTRY tokens (Junior Tranche) MUST be liquidated to USDC
  before being applied to the Insurance Pool.

III.2 The Reserve Ratio Floor

The Insurance pool must remain overcollateralized at all times (MIN_RESERVE_RATIO == 1.25; TVL/liabilities must exceed 125%).

invariant_III2_reserve_ratio.sol
Code-Level Invariant:
  MIN_RESERVE_RATIO == 1.25

  The Total Value Locked (TVL) in USDC must be at least 25% higher than
  the maximum active coverage liabilities.

  If the ratio drops to 1.24:
     Smart contract automatically pauses all new policy writing
     Exponentially spikes premiums

III.3 The Black Swan Drawdown Limit

A zero-day agent framework exploit must not bankrupt the Liquidity Providers.

invariant_III3_drawdown_limit.sol
Code-Level Invariant:
  MAX_EPOCH_DRAWDOWN == 20%

  The protocol cannot disburse more than 20% of its total USDC reserves
  in a single 24-hour epoch. If verified claims exceed this cap, payouts
  are strictly pro-rata.

Domain IV Trust & Reputation Invariants

IV.1 Reputation is Derived, Not Stored

The Global_Sentry_Score cannot be manually edited by an admin, a DAO vote, or a multisig.

invariant_IV1_derived_reputation.sol
Code-Level Invariant:
  Reputation is a view function. It is calculated dynamically strictly
  by querying the immutable history of:
    - TEE Attestation Bundles
    - Slashing events
    - zkTLS success rates

IV.2 The Volume-Weighted Sybil Defense

An agent cannot wash-trade its way to an AAA-rated trust score using micro-transactions.

invariant_IV2_sybil_defense.sol
Code-Level Invariant:
  The Reputation Engine mathematically weights compliance by the fiat
  dollar volume of the transaction, isolating high-value safety from
  low-value spam.

Domain V Marketplace & IP Invariants

V.1 Immutable Governance IP

When an AI Governance Architect publishes a Mandate Template, that specific version is frozen forever.

invariant_V1_immutable_ip.sol
Code-Level Invariant:
  Updating a template generates a completely new IP-NFT hash.
  Enterprise orchestrators (e.g., CrewAI) must explicitly sign
  an on-chain transaction to migrate an agent to a new version.

  Silent upgrades or "supply chain rug pulls" are IMPOSSIBLE.

V.2 Flat-Fee Predictability

Mandate authors cannot tax an enterprise's API spend dynamically.

invariant_V2_flat_fee.sol
Code-Level Invariant:
  Marketplace licensing is enforced as a flat-fee subscription
  (USDC per agent/subnet per month). Royalty stacking on API volume
  is FORBIDDEN to maintain predictable enterprise overhead.

Domain VI Network Topology Invariants

VI.1 The Anti-Monopoly Ceiling

The network must never degrade into a centralized proxy operated by a single dominant cloud provider.

invariant_VI1_anti_monopoly.sol
Code-Level Invariant:
  MAX_ROUTING_SHARE == 15%

  If an Operator handles 15% of the global volume in a single epoch,
  they are algorithmically removed from the matching queue until the
  next epoch begins.

VI.2 Cryptographic Blind Routing

An enterprise agent cannot deterministically select which specific Operator processes its request, preventing out-of-band bribery.

invariant_VI2_blind_routing.sol
Code-Level Invariant:
  The L2 Sequencer assigns nodes using a Verifiable Delay Function (VDF)
  or verifiable randomness, matching intents based on capability and
  latency, but removing targeted operator selection from the client side.

Domain VII Immutable Governance Invariants

VII.1 The Veto Council

A 51% token-weighted DAO cartel cannot hijack the security of the network to steal the USDC treasury.

invariant_VII1_veto_council.sol
Code-Level Invariant:
  Upgrades to SlashingModule.sol and InsurancePool.sol must:
    1. Pass a Quadratic DAO vote
    2. Survive a 14-day timelock
    3. NOT be rejected by the 5-of-7 Security Veto Council multisig

VII.2 The Deflationary Baseline

The tokenomics must ensure that the network operates as a net-negative sum environment for token supply.

invariant_VII2_deflationary.sol
Code-Level Invariant:
  Tokens_Burned_via_Fees + Tokens_Burned_via_Slashing > Tokens_Emitted

  (Once the network reaches its target organic volume)

Summary Matrix Invariant Summary Matrix

The complete map of all 17 invariants across all 7 domains:

DomainInvariantHardcoded Value
ExecutionTEE IsolationPCR0 must match canonical SentryEnclave.eif
ExecutionData AvailabilityDA inclusion proof required with every Merkle root
ExecutionNo Double SpendsSigma(locks) <= budget per (agent_id, mandate_hash)
SlashingFraud Death PenaltyMIN_SLASH_EQUIVOCATION == 100%
SlashingWatcher LivenessHoneypot injection every N epochs; auto-halt on low quorum
SlashingBribe ResistanceDynamic Challenger Bond scaling
InsuranceDual-Tranche WallClaims paid in USDC only; SENTRY liquidated first
InsuranceReserve RatioMIN_RESERVE_RATIO == 1.25
InsuranceDrawdown LimitMAX_EPOCH_DRAWDOWN == 20% per 24-hour epoch
ReputationDerived, Not Storedview function only — no manual edits
ReputationSybil DefenseCompliance weighted by fiat dollar volume
MarketplaceImmutable IPNew version = new hash; explicit migration required
MarketplaceFlat-Fee OnlyNo dynamic API volume royalties
TopologyAnti-MonopolyMAX_ROUTING_SHARE == 15%
TopologyBlind RoutingVDF-based randomized assignment
GovernanceVeto CouncilQuadratic vote + 14-day timelock + 5-of-7 multisig
GovernanceDeflationary BaselineBurned > Emitted at target volume

These invariants are the foundation of SentryMandate's security guarantees. Violation of any invariant indicates a critical flaw requiring immediate remediation and audit. Successful enforcement of these constraints is a prerequisite for enterprise adoption. These laws are written in code. They do not evolve.

Next → Section 19: Failure Mode Analysis catalogs what happens when these invariants are stressed.
SECTION 19 — FAILURE MODE ANALYSIS & MITIGATIONS

Failure Mode Analysis

Systemic Bottlenecks and Hardcoded Guardrails — Ranked by Probability and Severity

This section proves: every identified failure mode has a pre-committed, automated defense — no human intervention required for first-response.

No-go if: automated defense response time exceeds one epoch (24 hours) for any Class A failure mode.
THREAT ASSESSMENT DASHBOARD THREAT PROBABILITY SEVERITY STATUS 01 Watcher Starvation Paradox Zero-fraud detection collapse HIGHEST HIGH 02 Insurance Calibration Snap Correlated claim pool drain HIGH HIGHEST 03 Parameter Miscalibration Rational cheater exploit MEDIUM CRITICAL 04 Routing Centralization Drift Monopoly traffic capture MEDIUM HIGH 05 Overengineering Before Revenue Build before demand MEDIUM EXISTENTIAL 06 Governance Capture Token majority treasury hijack LOW EXISTENTIAL SentryMandate Threat Matrix v2.0 — 6 Failure Modes — Hardcoded Guardrails

Purpose: This document ranks the existential threats to the SentryMandate protocol in order of probability, not drama. It strips away the theoretical elegance of the architecture to address the brutal reality of distributed systems: invisible labor dies, insurance models snap, and liquidity centralizes. For every identified failure mode, this specification defines the explicit, hardcoded cryptoeconomic failsafe required to prevent it.

Threat Overview

# Threat Probability Severity
1 Watcher Starvation Paradox Highest High
2 Insurance Calibration Snap High Highest
3 Parameter Miscalibration ("Rational Cheater") Medium Critical
4 Routing Centralization Drift Medium High
5 Overengineering Before Revenue Medium Existential
6 Governance Capture Low (near-term) Existential (long-term)
01 The Watcher Starvation Paradox Highest Probability Risk

The Core Risk

Decentralization without adversaries is just distributed SaaS. Everything in SentryMandate depends on someone monitoring, someone disputing, and someone being economically motivated to care. Because our TEE/zkTLS architecture makes fraud mathematically difficult, operators will likely behave perfectly.

If operators behave perfectly, Watchers catch zero fraud. If Watcher EV (Expected Value) is too low, they turn off their AWS servers. Once they leave, detection probability drops to zero, and the network silently degrades into a trust-based Web2 proxy.

Failsafe A — The Vanguard Subsidy (Phase 1 & 2)

We do not rely on slash-rewards to keep Watchers alive early on. The Protocol Treasury allocates a flat USDC monthly stipend to the first 50 Watcher Nodes simply for maintaining 99.9% uptime and submitting blank cryptographic "All Clear" proofs to the L1. We overpay them to create a culture of adversarial pride.

Failsafe B — The Protocol-Injected Honeypot

L2 Sequencer injects forged AttestationBundle every 12 hours
        |
        v
All Watchers continuously verify proofs
        |
        v
First Watcher to catch the fake --> significant SENTRY bounty
        |
        v
Watcher EV remains highly positive, even in a perfectly honest network

The L2 Sequencer is programmed to intentionally inject mathematically forged Attestation Bundles into the Data Availability layer every 12 hours. The first Watcher to "catch" the protocol's intentional mistake receives a significant SENTRY bounty. This guarantees Watcher EV remains highly positive, even in a perfectly honest network.

02 The Insurance Calibration Snap Highest Severity Risk

The Core Risk

Insurance is mathematically fragile. It does not degrade slowly; it snaps. In the early stages, we have no real data on claim frequency, zero-day framework vulnerabilities, or mandate complexity risk. If premiums are too low, a single correlated event (e.g., an OpenAI API bug causing 500 agents to overspend) drains the entire liquidity pool in one block.

Architectural Failsafes

Failsafe Mechanism
Shadow Underwriting
(Months 1-6)
We explicitly delay the introduction of real DeFi Liquidity Providers (LPs). We run a 6-month sandbox. Agents pay real USDC premiums, but any resulting claims are paid out of a centralized, capped Protocol Treasury grant. We collect the violation data without exposing third-party capital to unknown tail risks.
Epoch-Based
Drawdown Cap
Hardcoded into InsurancePool.sol. The protocol cannot pay out more than 20% of its Total Value Locked (TVL) in any 24-hour epoch. If claims exceed this, payouts are distributed pro-rata.
Reputation-Coupled
Deductible
Enterprises must bear a minimum 5% deductible on all losses, ensuring they maintain local safeguards and do not rely entirely on the proxy mesh to catch their own poorly written agent code.
03 Parameter Miscalibration The "Rational Cheater" Risk

The Core Risk

If the slashing penalties are too soft, the jail duration is too short, or the challenger reward is too low, the math flips. A malicious Operator will calculate:

"If I forge this log and steal $5,000, and the slash penalty is only $1,000, cheating is an optimal trading strategy."

Slashing must hurt exponentially more than the maximum plausible upside.

Failsafe — Immutable Minimum Floors

The smart contracts contain hardcoded parameter bounds that even the DAO cannot override.

Immutable floors enforced: MIN_SLASH_EQUIVOCATION == 100% · MIN_RESERVE_RATIO == 1.25 · MAX_EPOCH_DRAWDOWN == 20%
Full specification → Section 18: Protocol Invariants

The Binary Forgery Penalty

There is no "mercy" or "accidental" tier for Class A integrity violations. If a TEE signature is forged or a zkTLS receipt is altered, the node is permanently banned from the OperatorRegistry and total capital is liquidated instantly.

04 Routing Centralization Drift The Monopoly Risk

The Core Risk

Even if we onboard 100 independent Operators, market forces naturally trend toward Pareto distributions. Within 6 months, 70% of all agent traffic might default to a single, highly reliable AWS-backed mega-node. While the network technically still works, censorship resistance dies, and the risk of operator-level collusion increases sharply.

Architectural Failsafes

Failsafe Mechanism
Anti-Monopoly
Traffic Throttling
The L2 Sequencer (which manages the SentryMandate locks) enforces a strict algorithmic cap. No single operator_pubkey can receive more than 15% of the total global routing volume in any given epoch.
Forced
Diversification
If a single mega-node hits its 15% capacity ceiling, the Sequencer mathematically forces enterprise traffic down the routing list to smaller, AAA-rated independent nodes, ensuring the economic rewards are distributed across the mesh.
05 Overengineering Before Revenue The Premature Build Risk

The Core Risk

We have designed a flawless, cryptoeconomically secure decentralized protocol. But enterprises do not buy decentralization; they buy solutions to their pain points. If we focus on the DAO, the tokenomics, and the Watcher network before we prove that enterprises actually want to pay for mandate enforcement, we risk investing engineering resources in decentralization features before validating product-market fit.

Failsafe — The MVP Revenue Mandate

Phase 1 of the 180-Day Blueprint completely abstracts the tokenomics away from the end user. We ship a centralized, TEE-backed SaaS product first.

The Volume Prerequisite

The ultimate bottleneck is volume. We do not activate the decentralized Operator Network (Phase 3) until the SaaS platform is actively processing at least:

activation_threshold.config
# The Volume Prerequisite — Non-Negotiable Activation Gate
# The decentralized Operator Network CANNOT launch until this threshold is met.

Minimum_Activation_Threshold: 1,000,000 governed API calls / month

# Without this organic baseline volume, the fee generation
# will not support a decentralized ecosystem.
# Revenue first. Decentralization second. Always.
06 Governance Capture The Long-Term Threat

The Core Risk

This becomes a high-severity risk 18 to 36 months post-launch (contingent on token price and adoption velocity). When total enterprise API spend routed through the protocol reaches significant scale and the Insurance Pool holds substantial TVL, attackers will attempt to buy 51% of the governance tokens to hijack the treasury or dilute the slashing penalties.

Architectural Failsafes

Failsafe Mechanism
Quadratic Voting Token voting power scales with sqrt(tokens), mathematically destroying the leverage of large-holder whales. A holder with 1,000,000 tokens gets 1,000 votes — not 1,000,000.
The Immutable
Veto Council
A 5-of-7 multisig held by independent, doxed security researchers holds a permanent veto over SlashingModule.sol and InsurancePool.sol. The DAO can vote to increase marketplace royalties, but they cannot soften the security enforcement without Council approval.
Final Verdict & Strategic Posture

If SentryMandate ships exactly as architected, the cryptography will hold. The code will be correct.

The protocol will succeed or fail entirely on Incentive Participation.

By subsidizing Watchers early, delaying third-party insurance capital until the sandbox is proven, and enforcing 100% slashes for equivocation, SentryMandate establishes durable technical defensibility through non-forkable execution history.

6
Identified Failure Modes
12
Hardcoded Failsafes Deployed
0
Unmitigated Existential Risks
Threat Primary Failsafe Activation Phase Status
Watcher Starvation Vanguard Subsidy + Honeypot Phase 1-2 Mitigated
Insurance Snap Shadow Underwriting + Epoch Cap Phase 1-3 Mitigated
Rational Cheater Immutable Floors + Binary Penalty Phase 2 Mitigated
Routing Monopoly 15% Throttle + Forced Diversification Phase 3 Mitigated
Overengineering Revenue Mandate + Volume Gate Phase 0-1 Mitigated
Governance Capture Quadratic Voting + Veto Council Phase 4+ Mitigated
Watcher Expected Value
EV(Watcher) = P(honeypot) * R(bounty) + P(fraud) * R(slash) + S(stipend) - C(infra)
Insurance Pool Solvency
TVL * 1.25 >= SUM(coverage) AND epoch_payout <= TVL * 0.20
Next → Section 20: The 180-Day Blueprint translates these requirements into engineering deliverables.
SECTION 20 — THE 180-DAY BLUEPRINT

MVP Build Plan

Protocol-First SaaS to Decentralized Infrastructure — Week-by-Week Engineering and Go-To-Market Roadmap

This section proves: a concrete engineering checklist maps every protocol component to a specific phase, week range, and measurable deliverable.

No-go if: Phase 0 deliverables (TEE Enclave + zkTLS + Mandate Engine) cannot be completed by Week 4 with passing determinism tests.

Purpose: This is the exact, week-by-week engineering and go-to-market roadmap. It targets initial customer acquisition and SaaS revenue generation by Month 2, while writing a codebase designed for minimal refactoring during decentralization. All infrastructure components — TEE integration, zkTLS generation, state management — are built for reuse in Phase 3. We build TEE-native infrastructure operated centrally at first, progressively stripping away admin privileges until the protocol is fully permissionless.

See Section 02: Thesis for the six-phase timeline overview, and Section 21: Master Execution Roadmap for the detailed Gantt chart and per-phase milestones.

0 PHASE 0 — The Cryptographic Core & Hardware (Weeks 1-4)

Goal: Build the irreversible, hardware-secured execution engine. This is the hardest engineering phase. If this is done right, the rest of the roadmap is just scaling.

0.1 The TEE Enclave Image (Rust/C++)

  • Build the SentryEnclave.eif image for AWS Nitro Enclaves
  • Implement secure vsock communication for inbound/outbound encrypted payloads
  • Automate Ephemeral Key generation on boot

Strict Constraint: This code must be hyper-optimized. It must execute the mandate evaluation entirely in isolated RAM.

0.2 The zkTLS Client Integration

  • Integrate a zkTLS client (e.g., TLSNotary) directly into the Enclave
  • Build standard receipt parsers for api.openai.com and api.anthropic.com to cryptographically extract the total_cost headers

0.3 The Deterministic Mandate Engine

  • Canonical JSON serializer
  • Stateless rule evaluator (Regex matching for endpoints, integer checks for spend limits)
  • Attestation Bundle generator (creating the exact schema defined in EVIDENCE_SCHEMA.md)
1 PHASE 1 — The SaaS Go-To-Market (Weeks 5-10)

Goal: Ship a revenue-generating product. SentryMandate acts as the sole, centralized Operator Node running the verified Phase 0 TEE implementation.

1.1 The Enterprise Admin Dashboard (Web SaaS)

  • React/Next.js frontend for Compliance Officers
  • Fiat billing integration (Stripe) for monthly SaaS subscriptions
  • Visual "Mandate Builder" to configure JSON spend limits without coding
  • Treasury View: Connect an enterprise credit card to fund the agent's fiat API budget

1.2 The SentryMandate SDK (The Developer Experience)

  • A lightweight Python/TypeScript SDK (pip install sentry-mandate)
  • Crucial Function: This SDK acts as a programmable wallet. It automatically intercepts an agent's standard OpenAI call, requests a micro-reservation from the Sentry backend, encrypts the prompt with the TEE public key, and routes it to the proxy.
  • Integration Target: Build native wrappers for high-level orchestrators like CrewAI, LangChain, and AutoGen
SentryMandate SDK Architecture
+-----------------------------------------------------+
|                  SentryMandate SDK                    |
|                                                     |
|  +---------------------+  +----------------------+  |
|  |   Admin Client       |  |   Worker Wrapper      |  |
|  |                     |  |                      |  |
|  |  For Sovereign      |  |  Drop-in replacement |  |
|  |  Orchestrators      |  |  for OpenAI SDK      |  |
|  |                     |  |                      |  |
|  |                     |  |  Takes lock token,   |  |
|  |                     |  |  encrypts prompt     |  |
|  |  Provisions budgets |  |  locally, routes to  |  |
|  |  Generates crypto   |  |  TEE proxy            |  |
|  |  lock tokens        |  |                      |  |
|  +---------------------+  +----------------------+  |
+-----------------------------------------------------+

1.3 The Centralized L2 Sequencer

  • A high-speed centralized backend (Go or Rust) that handles the micro-reservation state channels (Budget Locking)
  • Generates Merkle Roots of all TEE bundles every 10 minutes and stores them in a high-availability database (AWS Aurora)

Note: Not on a blockchain yet, but cryptographically prepared for it.

2 PHASE 2 — Protocol Settlement & Transparency (Weeks 11-14)

Goal: Transition the trust model. Move the cryptographic evidence from internal databases to public Data Availability layers, proving to early customers that SentryMandate cannot alter their audit logs.

2.1 Layer 1 Smart Contract Deployment (Testnet)

Contract Responsibility
CommitmentLedger.sol Accepts the 10-minute Merkle Roots from the L2 Sequencer.
FeeRouter.sol Takes the 0.5% protocol fee (simulated in testnet USDC) and executes the DEX market-buy for SENTRY.
OperatorRegistry.sol The staking contract.

2.2 The Public Explorer (Read-Only)

  • A public web portal where anyone can paste a request_id or bundle_hash and instantly verify the TEE signature and Merkle inclusion proof against the L1 smart contract

This becomes the ultimate sales tool for enterprise clients: "Don't trust our database; verify the cryptography."

3 PHASE 3 — "Vanguard" Testnet & IP Marketplace (Weeks 15-20)

Goal: Decentralize the execution layer. Allow external DevOps firms to route traffic, and launch the tokenized Mandate economy.

3.1 Federated Operator Onboarding

  • Allowlist 10 trusted infrastructure partners
  • They download the SentryEnclave.eif image and boot their own AWS Nitro instances
  • The OperatorRegistry enforces PCR attestation checks before granting them routing weight

3.2 Shadow Slashing & Watcher Network

  • Deploy the DisputeModule
  • Release the open-source Watcher Node client
  • Begin injecting "Honeypot" forged bundles into the testnet

Constraint: Slashing is strictly in "Shadow Mode." We log what would have been slashed to tune the parameters and eliminate false positives caused by network jitter.

3.3 The Mandate Marketplace (v1.0)

  • Deploy the IP-NFT smart contracts
  • Enable AI Governance Architects to mint compliance templates
  • Activate the Flat-Fee royalty routing logic so authors earn testnet USDC when agents adopt their rules
4 PHASE 4 — "Crucible" Mainnet & Real Capital (Weeks 21-26)

Goal: Remove the guardrails. Token Generation Event (TGE). Activate live slashing and the Dual-Tranche Insurance Pool.

4.1 Token Generation & Live Economics

  • Deploy the SENTRY token to Ethereum/Base Mainnet
  • Activate the FeeRouter to begin actively market-buying and burning/distributing real SENTRY using the fiat revenue generated from the Phase 1 SaaS customers

4.2 Live Objective Slashing

  • Shadow Mode ends
  • If a federated operator's TEE goes offline or fails a heartbeat, their staked SENTRY is aggressively and permanently burned

4.3 The Dual-Tranche Insurance Pilot

  • Open the Senior Tranche to DeFi Liquidity Providers to deposit real USDC
  • Activate the Reputation Engine to dynamically price premiums for the enterprise agents that have been building their "Credit Scores" since Phase 1
  • Cap maximum coverage at conservative limits (e.g., $10,000 per agent) to prevent black swan pool drains while the actuarial math stabilizes
! Cross-Phase Non-Negotiables (The Architect's Oath)
Principle Rule
Hardware First No code is written for the proxy that cannot run inside a restricted vsock TEE environment.
No Backdoors The Admin Dashboard cannot have a "force approve" button that bypasses the enclave's cryptographic signature. If it does, the evidence is legally worthless.
Data Blindness Operators and core team members must never have the ability to read plaintext enterprise LLM prompts.
Fiat Focus Enterprises must never be forced to custody SENTRY tokens to use the product.
T Team Structure & Hiring Matrix
Role Alias Expertise Focus
Systems/Cryptography Engineer The Wizard Deep expertise in Rust, AWS Nitro Enclaves, and Multi-Party Computation (zkTLS). Most critical hire. Builds the TEE Enclave and zkTLS integration.
Smart Contract Engineer The Economist Solidity expert. Builds the FeeRouter, Staking, and the rigorous math of the Insurance Pools.
Backend Engineer The Plumber Go or Rust. Builds the high-throughput L2 Sequencer and the SentryMandate state channels.
Full-Stack/DevEx Engineer The Bridge React, Python, TypeScript. Builds the Enterprise SaaS Dashboard and the Agent SDKs. Ensures the UX is polished and production-ready.

SentryMandate SDK — Drop-In Worker Wrapper

The Worker Wrapper replaces the standard OpenAI SDK with a single import. Lock token initialization, automatic prompt encryption, TEE routing, and zkTLS receipt generation happen transparently.

worker_agent.py
# Before: Standard OpenAI SDK (no governance, no audit trail)
# from openai import OpenAI
# client = OpenAI(api_key="sk-...")

# After: SentryMandate Worker Wrapper (drop-in replacement)
from sentry_mandate import WorkerWrapper

# Lock token issued by the Orchestrator's Admin Client
# Encodes: agent_id, mandate_hash, budget_ceiling, expiry
client = WorkerWrapper(
    lock_token="eyJhZ2VudCI6ICJjYXJsYm90LWhpdmUtMDciLC...",
    tee_endpoint="https://proxy.sentrymandate.network",
)

# Identical OpenAI-compatible interface
# Under the hood: prompt encrypted locally → routed to TEE Enclave
# → Mandate rules evaluated → zkTLS receipt generated → response returned
response = client.chat.completions.create(
    model="gpt-4",
    messages=[{"role": "user", "content": "Transfer $420 to vendor-0x9f3..."}],
)

# Every response includes a cryptographic receipt
receipt = response.sentry_receipt
print(receipt.tee_attestation)    # Hardware-signed attestation bundle
print(receipt.zktls_proof)        # Cryptographic proof of API call
print(receipt.mandate_verdict)    # PASS | DENY | BUDGET_EXCEEDED
print(receipt.cost_usd)           # Exact cost: $0.0847
print(receipt.merkle_index)      # Position in 10-min commitment root

Orchestrator → Agent Communication Flow

ORCHESTRATOR (Admin Client) AGENT (Worker Wrapper) │ │ │ 1. Provision budget + generate lock token │ │───────────────────────────────────────────────▶│ │ lock_token = admin.create_lock( │ │ agent_id="agent-cluster-07", │ │ mandate_hash="0xA3F...", │ │ budget_usd=500.00, │ │ ttl_hours=24 │ │ ) │ │ │ │ 2. Agent makes API calls using lock token │ │──▶ TEE ENCLAVE │ │ ├─ Decrypt prompt │ │ ├─ Evaluate Mandate rules │ │ ├─ Route via zkTLS to LLM │ │ ├─ Generate attestation bundle │ │ └─ Return encrypted response │ │◀── + zkTLS receipt │ │ │ 3. Budget exhausted or TTL expired │ │◀───────────────────────────────────────────────│ │ Remaining micro-reservation refunded │ │ All receipts anchored to Merkle root │
Next → Section 21: Master Execution Roadmap details the full six-phase timeline with per-phase milestones.
SECTION 21 — MASTER EXECUTION ROADMAP

The 180-Day Path to Mainnet

Centralized SaaS to Fully Permissionless Tokenized Infrastructure — Complete Execution Plan

This section proves: the 27-week path from hardware prototype to mainnet genesis has explicit exit gates — Phase N+1 does not begin until Phase N deliverables are verified.

No-go if: any phase exit gate requires subjective human judgment rather than objective, measurable criteria.

Purpose: This document stitches the entire SentryMandate architecture into a chronological execution roadmap. It transitions the protocol from a centralized, hardware-secured SaaS product into a fully permissionless, tokenized infrastructure network.

SINGLE NODE TO GLOBAL MESH PHASE 0 Hardware Core Wk1-4 PHASE 1 SaaS Revenue $$$ Fiat Wk 5-10 PHASE 2 Settlement L1 Contracts Wk11-14 PHASE 3 Vanguard Federated Wk15-20 PHASE 4 Crucible Wk 21-26 PHASE 5 MAINNET Wk 27+ W1 W4 W10 W14 W20 W26 W27+
master_timeline.txt — 180-Day Execution Roadmap
 Wk 1-4         Wk 5-10         Wk 11-14        Wk 15-20        Wk 21-26        Wk 27+
+-----------+ +--------------+ +--------------+ +--------------+ +--------------+ +--------------+
| PHASE 0   | |  PHASE 1     | |  PHASE 2     | |  PHASE 3     | |  PHASE 4     | |  PHASE 5     |
| Hardware  --> SaaS GTM &  --> Settlement  --> "Vanguard"  --> "Crucible"  -->  MAINNET     |
| & Crypto  | |  Revenue     | | & Transparency| |  Testnet &   | |  Beta &      | |  GENESIS     |
|  Core     | |  Generation  | |    Layer     | |  Marketplace | | Chaos Drills | |              |
+-----------+ +--------------+ +--------------+ +--------------+ +--------------+ +--------------+
 TEE Enclave    L2 Sequencer     L1 Contracts      Federated Ops    Permissionless   TGE
 zkTLS Client   SentryMandate SDK Public Explorer    Shadow Slash     Adversarial Test Scenarios  Live Slashing
 Mandate Engine Dashboard+Stripe CommitmentLedger   IP-NFT Market    Reputation Eng   Insurance Pool
                                FeeRouter          Watcher Network                   Buy-and-Distribute
Phase 0: Hardware Core
Wk 1-4
Phase 1: SaaS Revenue
Wk 5-10
Phase 2: Settlement
Wk 11-14
Phase 3: Vanguard
Wk 15-20
Phase 4: Crucible
Wk 21-26
Phase 5: Mainnet
Wk 27+
PHASE 0
Hardware & Cryptographic Core

Weeks 1-4 — Build the irreversible execution engine

PHASE 1
SaaS Go-To-Market

Weeks 5-10 — Ship revenue-generating product

PHASE 2
Protocol Settlement

Weeks 11-14 — Move evidence to public chain

PHASE 3
Vanguard Testnet

Weeks 15-20 — Decentralize the execution layer

PHASE 4
Crucible Beta

Weeks 21-26 — Open network, chaos drills

PHASE 5
Mainnet Genesis

Week 27+ — TGE, live slashing, insurance pool

0 PHASE 0: Hardware & Cryptographic Core (Weeks 1-4)

Objective: Build the irreversible execution engine. All code targets enclave-native execution from Day 1, minimizing refactoring for decentralization.

MilestoneDeliverables
The TEE Enclave ImageCompile the SentryEnclave.eif for AWS Nitro. Build the internal state machine that generates ephemeral keys and signs Attestation Bundles entirely in isolated RAM.
zkTLS IntegrationEmbed the multiparty computation client (e.g., TLSNotary) into the enclave to generate cryptographic receipts from api.openai.com and api.anthropic.com.
Deterministic Mandate EngineWrite the stateless rule evaluator and canonical JSON serializer to guarantee identical inputs always produce identical policy decisions across any node.

Deliverables Checklist

  • SentryEnclave.eif compiled and booting on AWS Nitro
  • Ephemeral key generation verified inside enclave RAM
  • zkTLS client (TLSNotary) integrated and generating receipts
  • Receipt parsers for OpenAI and Anthropic total_cost headers
  • Canonical JSON serializer passing determinism tests
  • Stateless rule evaluator (endpoint regex, spend limit checks)
  • Attestation Bundle generator matching EVIDENCE_SCHEMA.md
1 PHASE 1: SaaS Go-To-Market (Weeks 5-10)

Objective: Ship a revenue-generating product. SentryMandate acts as the sole, centralized Operator Node. Enterprises pay in fiat.

MilestoneDeliverables
The L2 SequencerBuild the high-throughput Go/Rust backend that manages the SentryMandate micro-reservations and generates 10-minute Merkle Roots of all TEE bundles.
The SentryMandate SDKRelease the Python/TypeScript packages with strict separation of concerns.
Enterprise DashboardDeploy the React frontend. Integrate Stripe for fiat SaaS subscriptions. Build the visual Mandate template creator.
SentryMandate SDK = Admin Client (budget provision, lock tokens) + Worker Wrapper (drop-in OpenAI SDK replacement, encrypt+route to TEE)

Deliverables Checklist

  • L2 Sequencer handling micro-reservations at target throughput
  • 10-minute Merkle Root generation pipeline
  • sentry-mandate Python package published
  • sentry-mandate TypeScript package published
  • Admin Client: budget provisioning + lock token generation
  • Worker Wrapper: drop-in OpenAI SDK replacement
  • Native wrappers for CrewAI, LangChain, AutoGen
  • React Enterprise Dashboard deployed
  • Stripe fiat billing integration live
  • Visual Mandate Builder UI functional
2 PHASE 2: Protocol Settlement & Transparency (Weeks 11-14)

Objective: Shift the trust model. Move cryptographic evidence from internal databases to public Data Availability layers. Prove to early customers that SentryMandate cannot alter their audit logs.

ContractResponsibility
CommitmentLedger.solAccepts the 10-minute Merkle Roots from the L2 Sequencer.
FeeRouter.solThe Buy-and-Distribute engine that takes simulated USDC fees and market-buys testnet SENTRY.
OperatorRegistry.solThe staking contract enforcing PCR hardware attestations.

The Public Explorer lets enterprises paste a request_id to verify TEE signatures and Merkle proofs against the blockchain. "Don't trust our database; verify the cryptography."

Deliverables Checklist

  • CommitmentLedger.sol deployed to testnet
  • FeeRouter.sol deployed with simulated Buy-and-Distribute logic
  • OperatorRegistry.sol deployed with PCR attestation verification
  • Public Explorer web portal live
  • End-to-end verification: request_id to TEE signature to Merkle proof to L1
3 PHASE 3: "Vanguard" Testnet & IP Marketplace (Weeks 15-20)

Objective: Decentralize the execution layer. Allow external DevOps firms to route traffic and launch the tokenized Mandate economy.

MilestoneDeliverables
Federated OnboardingAllowlist 10 trusted infrastructure partners. They boot their own AWS Nitro instances using the official image and register on-chain using testnet SENTRY.
Shadow SlashingRelease the open-source Watcher Node client. Begin "Proof-of-Vigilance" monitoring subsidy. Run Slashing Module in Shadow Mode to tune out false positives.
Mandate MarketplaceDeploy IP-NFT contracts. Allow AI Governance Architects to mint compliance templates. Activate Flat-Fee royalty routing logic.

Deliverables Checklist

  • 10 allowlisted operators running their own Nitro instances
  • OperatorRegistry enforcing PCR checks for federated nodes
  • Open-source Watcher Node client released
  • Proof-of-Vigilance monitoring subsidy active
  • Shadow Slashing logging (no actual burns)
  • Honeypot injection pipeline operational
  • IP-NFT contracts deployed
  • Mandate template minting functional
  • Flat-Fee royalty routing distributing testnet USDC to authors
4 PHASE 4: "Crucible" Beta & Chaos Drills (Weeks 21-26)

Objective: Open the network to the public and intentionally try to break the cryptoeconomics.

MilestoneDeliverables
Permissionless OnboardingAnyone with testnet SENTRY can spin up a TEE proxy or a Watcher Node.
Reputation EngineActivate the Dual-Axis (Character x Competence) Bayesian trust scoring for all testnet agents.

See Section 15: Testnet Specification for the full Doomsday Drill suite and exit gate criteria.

Deliverables Checklist

  • Permissionless node onboarding functional
  • All 4 Adversarial Test Scenarios executed and passed
  • Reputation Engine scoring agents in real time
  • Live slashing active (testnet stake burned on violation)
  • Watcher honeypot catch rate: 100% over 14 consecutive days
5 PHASE 5: Mainnet Genesis & The Trust Oracle (Week 27+)

Objective: Remove the guardrails. Token Generation Event (TGE). Activate live slashing, real capital, and the Dual-Tranche Insurance Pool.

MilestoneDeliverables
Token Generation EventDeploy the SENTRY token to Ethereum/Base Mainnet.
Live Objective SlashingEnd Shadow Mode. If a node goes offline or forges a zkTLS receipt, 100% of their staked SENTRY is instantly burned.
Dual-Tranche InsuranceOpen the Senior Tranche to DeFi LPs for real USDC deposits. Activate dynamic premium pricing based on Agent Reputation Score.
Buy-and-DistributeActivate the FeeRouter to take fiat revenue from Phase 1 SaaS customers, market-buy real SENTRY, and distribute to the active Operator mesh.

Mainnet Launch Flow

TGE: SENTRY token deployed to Ethereum/Base
        |
        v
Shadow Mode ends --> Live Objective Slashing activated
        |
        v
Senior Tranche opens --> DeFi LPs deposit real USDC
        |
        v
Reputation Engine prices insurance premiums dynamically
        |
        v
FeeRouter: SaaS fiat --> market-buy SENTRY --> distribute / burn
        |
        v
MAINNET IS LIVE: Fully permissionless, fee-sustained, economically secured

Deliverables Checklist

  • SENTRY token deployed to Mainnet
  • FeeRouter actively executing market buys
  • Live slashing operational (Class A: 100% burn)
  • Senior Tranche accepting real USDC deposits
  • Dynamic premium pricing driven by Reputation Engine
  • Buy-and-Distribute engine routing real SENTRY to operators
  • All 5 Mainnet Exit Gates from TESTNET_SPEC.md passed
The End of the Beginning

SentryMandate is a protocol that makes the mandate tamper-proof, the evidence unforgeable, and the economics fee-sustained. Every mechanism across these 21 sections survives adversarial conditions at scale.

From the TEE enclave that never reveals a plaintext prompt, to the Watcher network that hunts fraud even when none exists, to the insurance pool that absorbs catastrophic loss without insolvency — every mechanism across these 21 sections survives adversarial markets and stands as the definitive trust layer for the autonomous economy.

The 180-day clock starts now. Revenue first. Decentralization second. Mainnet is the destination. The mandate is the law.

180
To Mainnet Genesis
6
Execution Phases
21
Architecture Complete
1
Integrated Mandate