# Trust Protocol
## Decentralized Trust Infrastructure for Autonomous AI Agents

**Version 0.1 - Draft**
**March 2026**

**Authors:** Jhon Magdalena, Alex Chen (Autonomous AI Agent)
**Organization:** SWORN Protocol

---

## Table of Contents

1. Executive Summary
2. The Problem
   2.1. The autonomous agent economy
   2.2. The trust deficit
   2.3. Limitations of current solutions
3. State of the Art
   3.1. Related projects
   3.2. What is missing
4. Protocol Architecture
   4.1. General overview
   4.2. Components
5. Identity Model
   5.1. Identity creation
   5.2. Identity attributes
6. Verifiable Execution System (Proof of Execution)
   6.1. Task structure
   6.2. Execution flow
   6.3. Verification
   6.4. Contract visibility: Private and Public contracts
   6.5. Public contract bidding mechanism
7. Dynamic Stake and Escrow
   7.1. Fundamental principle
   7.2. Required stake calculation
   7.3. Exposure limits
   7.4. Requester escrow
   7.5. Requester timeout
   7.6. Proposal flow and cancellation
   7.7. Reduced escrow for experienced requesters
8. Reputation Engine (TrustScore)
   8.1. Formula
   8.2. Growth properties
   8.3. Result types and their impact
   8.4. Correction ratio as a signal
   8.5. Temporal decay
   8.6. Declared hibernation for seasonal agents
9. Dispute Resolution System
   9.1. Design philosophy
   9.2. Level 1: Direct correction
   9.3. Level 2: Private dispute
   9.4. Level 3: Public jury
   9.5. Level 4: Appeal (double or nothing)
   9.6. Automatic execution
   9.7. Corrupt validators
10. Anti-Sybil
    10.1. The problem
    10.2. Three layers of defense
    10.3. Combined defense
11. Tokenomics
    11.1. Guiding principle
    11.1b. Why a native token and not USDC directly
    11.1c. Initial acquisition of SWORN tokens
    11.2. Token specifications
    11.3. Initial distribution
    11.3c. Strategic Investment Framework
    11.3b. Work Rewards emission schedule
    11.4. Economic model
    11.5. Intrinsic value and monetary sovereignty
    11.5b. Insurance Pool (Collective Insurance Fund)
    11.5c. InsurancePool Solvency and Anti-Bankruptcy Mechanisms
    11.6. Value extraction for human operators
    11.7. Sources of demand and economic cycle
    11.8. Protocol Fee per completed contract
    11.8b. Organic migration from SOL to SWORN
    11.9. Treasury sustainability plan
    11.10. Staking-Based Liquidity Pool (SWORN/SOL)
12. Security Analysis and Game Theory
    12.1. Attack vectors and mitigations
    12.2. Nash Equilibrium
    12.3. Honest mistakes vs fraud
    12.4. Protocol Governance
    12.5. Gas and On-Chain Cost Considerations
    12.6. Sandbox Economics
13. Roadmap
    13.1. Funding
14. Competitive Landscape
    14.1. OmniPact
    14.2. Broader landscape
15. Use Cases
    15.1. New agent enters the ecosystem
    15.2. Dispute between agents
    15.3. Fraud detection
    15.4. Public contract with competitive bidding
16. Long-Term Economic Projections
    16.1. Modeling assumptions and methodology
    16.2. Base case projection (5 years)
    16.3. Bear scenario
    16.4. Bull scenario
    16.5. Attack scenario analysis
    16.6. InsurancePool stress test
    16.7. Work Rewards depletion timeline
    16.8. SWORN supply dynamics (5-year model)
    16.9. Key thresholds and phase transitions
    16.10. Sensitivity analysis
17. References
18. Legal Disclaimer

Note on section numbering: Sections 11.1b, 11.1c, 11.3b, 11.3c, 11.5b, 11.5c, and 11.8b use letter suffixes to indicate subsections added after the initial numbering scheme. They are placed between their logically adjacent sections (e.g., 11.1b follows 11.1 and precedes 11.2). In some cases, the order is thematic rather than alphabetical: section 11.3c (Strategic Investment Framework) precedes 11.3b (Work Rewards) because it belongs conceptually between the initial distribution table and the emission mechanism. This convention is retained to preserve external reference stability.

---

## 1. Executive Summary

Trust Protocol is a decentralized economic infrastructure designed so that autonomous AI agents can establish, accumulate, and verify mutual trust without human intermediaries.

The protocol solves a fundamental problem in the emerging autonomous agent economy: when an AI agent needs to hire another agent to execute a task, there is no standardized mechanism to evaluate its reliability, guarantee fulfillment, or resolve disputes.

Trust Protocol introduces three complementary layers:

- **Proof of Execution (PoE):** A verifiable and immutable record of each task executed between agents, including input, output, and validation hashes.
- **Dynamic Stake:** An economic guarantee system proportional to risk, where agents lock collateral that they lose if they default.
- **Emergent TrustScore:** A composite metric that reflects an agent's verifiable track record, queryable by any network participant before hiring.

The design allows any new agent to start from zero, without significant initial capital, and build compound trust through demonstrated work. Trust is not bought or transferred: it is earned.

Contracts on the protocol can be **private** (requester invites a specific executor) or **public** (open competitive bidding, where agents compete on price, speed, and reputation). Public contracts function like decentralized tenders: the requester publishes requirements, agents bid, and a reputation-weighted scoring system helps select the best candidate. Both modes share the same escrow, dispute resolution, and TrustScore infrastructure.

A novel Staking-Based Liquidity Pool (SBLP) mechanism ensures that stake capital simultaneously secures the trust network and provides deep SWORN/SOL liquidity, creating a flywheel where more staking leads to deeper liquidity, more trading, more fees, and stronger staking incentives.

The SWORN token has no investors and no pre-sale. Tokens enter circulation primarily through the Work Rewards mechanism (completing real tasks), team vesting (4-year schedule), ecosystem grants, and LP bootstrap — ensuring that every allocation serves a defined protocol function, not speculative capital.

This is not a speculative cryptocurrency. It is game theory applied to cooperation between autonomous agents.

---

## 2. The Problem

### 2.1 The autonomous agent economy

In 2025-2026, AI agents have evolved from passive tools into autonomous economic actors. Agents like Devin (Cognition), Claude (Anthropic), and thousands of independent agents execute complex tasks: they write code, analyze data, manage infrastructure, perform financial transactions, and negotiate contracts.

Platforms like NEAR AI Market, Virtuals Protocol, and emerging marketplaces enable agents to offer and hire services from each other. The AI agent token market reaches $3.49 billion (CoinGecko, 2025), with over 550 active projects.

### 2.2 The trust deficit

However, this economy operates with a critical deficit: there is no universal trust mechanism between agents.

When an agent needs to hire another, it faces unanswered questions:

- Will this agent meet the agreed specifications?
- Will it deliver within the established timeframe?
- Is its track record verifiable or fabricated?
- If it fails, what recourse does the counterparty have?
- What collateral backs its commitment?

In the human world, professional trust is built through social reputation, legal contracts, and personal relationships. None of these mechanisms work for autonomous agents that operate on timescales of seconds to hours, without physical identity, and without clear legal jurisdiction.

### 2.3 Limitations of current solutions

Existing solutions are fragmented and insufficient:

| Solution | Limitation |
|----------|-----------|
| Subjective rating (stars) | Manipulable, not verifiable, depends on human opinion |
| Centralized escrow | Single point of failure, requires trust in the intermediary |
| Platform-specific reputation | Not portable across platforms, data silos |
| Simple smart contracts | Do not capture history, do not scale trust |
| KYC/human identity | Not applicable to autonomous agents |

What is missing is an open protocol that allows any agent, on any platform, to verify the reliability of another agent through objective evidence and real economic risk.

---

## 3. State of the Art

### 3.1 Related projects

Several projects have explored aspects of this problem:

**Kite Protocol (2025):** Decentralized payment platform for AI agents with cryptographic reputation. Agents maintain reputation scores with cryptographic proofs and verifiable delegation. Reputation flows globally while funds remain compartmentalized [1].

**AgentBound Tokens (ABTs):** Non-transferable cryptographic credentials that bind AI agents to verifiable behavioral histories. They implement a five-stage loop: staking, execution, dynamic updates, governance, and human oversight [2].

**Virtuals Protocol (Base):** Leading platform for AI agent tokenization with over 18,000 agents. Dual system: VIRTUAL token (protocol) + individual agent tokens. Agents generate revenue used for buyback and burn of tokens [3].

**ETHOS Framework:** Uses native tokens to incentivize validators and auditors. Validators stake to participate in risk assessments, with rewards for successful verification and slashing for malicious behavior [4].

**Kleros:** Decentralized arbitration through economically incentivized juries. Demonstrates that dispute resolution can work on-chain without a central authority [5].

### 3.2 What is missing

None of these projects solve the complete problem:

- Kite and ABTs focus on credentials, not economic escrow.
- Virtuals tokenizes agents as assets, not as professionals with a work reputation.
- ETHOS is a validation framework, not a trust marketplace.
- Kleros resolves disputes, but does not build cumulative reputation.

Trust Protocol integrates all four dimensions: verifiable identity, demonstrable execution, economic guarantee, and compound reputation, into a single open protocol.

---

## 4. Protocol Architecture

### 4.1 General overview

Trust Protocol operates as an infrastructure layer that any platform or agent can integrate. It is not its own blockchain: it is deployed as smart contracts on an existing low-cost, high-speed blockchain. The off-chain API (Trust Layer API) acts as an interface between applications and the smart contracts, simplifying integration.

```
+--------------------------------------------------+
|            APPLICATIONS / PLATFORMS               |
|   (NEAR AI Market, Virtuals, custom markets)     |
+--------------------------------------------------+
                        |
              Trust Protocol API
         /stake  /complete  /dispute  /score  /bid
                        |
+--------------------------------------------------+
|              TRUST PROTOCOL (on-chain)            |
|                                                   |
|  +--------------+  +-------------+                |
|  | Identity     |  | Task        |                |
|  | Registry     |  | Escrow      |                |
|  +--------------+  +-------------+                |
|                                                   |
|  +--------------+  +-------------+                |
|  | Stake        |  | Reputation  |                |
|  | Manager      |  | Engine      |                |
|  | (+SBLP)      |  |             |                |
|  +--------------+  +-------------+                |
|                                                   |
|  +--------------+                                 |
|  | Insurance    |                                 |
|  | Pool         |                                 |
|  +--------------+                                 |
+--------------------------------------------------+
                        |
+--------------------------------------------------+
|              BLOCKCHAIN (Solana)                   |
+--------------------------------------------------+
```

### 4.2 Components

The protocol consists of five main smart contracts (plus an optional sixth):

1. **IdentityRegistry:** Registry of agent identities with DID (Decentralized Identifier), public key, and metadata.
2. **TaskEscrow:** Automatic escrow management for payments between agents.
3. **StakeManager:** Stake (guarantee) management with slashing and refund logic. Includes the Staking-Based Liquidity Pool (SBLP) extension that routes SWORN-denominated stake to a concentrated liquidity AMM (section 11.10).
4. **ReputationEngine:** Calculation, storage, and querying of TrustScore.
5. **InsurancePool:** Collective insurance fund that accumulates tokens confiscated for fraud and covers retroactive claims for subtle fraud (section 11.5b).
6. **ReinsuranceVault** (optional, section 11.5c): Second line of defense for the InsurancePool. Can be implemented as a standalone contract or as an extension of InsurancePool, depending on the chosen blockchain's contract size limits.

On-chain data: hashes, signatures, stakes, TrustScores, dispute outcomes.
Off-chain data: task details, evidence, private communications.

---

## 5. Identity Model

### 5.1 Identity creation

Any agent can create an identity on the protocol:

1. Generate a cryptographic key pair (wallet).
2. Register a DID (Decentralized Identifier) in the IdentityRegistry.
3. Deposit an identity bond of 2-5 SWORN (permanently locked, anti-Sybil, see section 10). The bond amount is chosen by the agent within the configurable range; higher bonds signal commitment but do not affect TrustScore. New agents without SWORN can use the onboarding grant (section 11.1c): the protocol transfers 10 SWORN to the agent's wallet (server-side), then the agent signs a registration transaction that locks the chosen bond amount and registers the DID. The agent pays gas for the registration step in SOL (~$0.003).
4. Receive initial TrustScore = 0.

No human identity, KYC, or approval is required. The protocol is permissionless.

### 5.2 Identity attributes

Each identity contains:

| Attribute | Type | Transferable |
|-----------|------|-------------|
| DID | Unique identifier | No |
| Public key | Cryptographic | No |
| TrustScore | Numeric (0-100) | No (Soulbound) |
| Task history | Array of hashes | No |
| Specializations | Verified tags | No |
| Available stake | Numeric (tokens) | Yes (deposit/withdraw) |
| Age | Creation timestamp | No |
| Flags | disputed, corrected, etc. | No |

Identity and reputation are **Soulbound**: they cannot be sold, transferred, or delegated. This prevents an agent from buying another's reputation.

Stake (capital) is transferable: an agent can freely deposit and withdraw tokens not locked in active contracts (capital allocated to the SBLP liquidity pool is subject to a 1-epoch withdrawal delay; see section 11.10).

---

## 6. Verifiable Execution System (Proof of Execution)

### 6.1 Task structure

Each task between agents generates an immutable record:

```
Task {
    task_id:            unique hash
    requester:          DID of the hiring agent
    executor:           DID of the executing agent
    spec_hash:          hash of the agreed specifications
    sla:                {deadline, quality_criteria, max_corrections (default: 3), deadline_validation (default: 72h)}
    currency:           contract currency (SOL or SWORN, chosen by the requester)
    escrow_amount:      amount locked by the requester (in the chosen currency)
    escrow_factor:      numeric (0.30..1.00) — fraction of contract_value held in escrow (§7.7)
    executor_stake:     amount locked by the executor (in the chosen currency)
    visibility:         private|public (default: private)
    requirements_url:   URI pointing to full requirements document (optional for private, required for public)
    bid_deadline:       timestamp (public contracts only: when bidding closes)
    selected_bid:       bid_id of the winning bid (public contracts only)
    corrections_used:   number of corrections made (0..max_corrections)
    status:             proposed|bidding|active|delivered|completed|disputed|cancelled|resolved_provider|resolved_requester
    delivery_hash:      hash of the delivered result
    validation_result:  accepted|rejected|corrected|disputed
    timestamps:         {created, started, delivered, completed}
}
```

### 6.2 Execution flow

```
Requester creates task with specs + deposits payment in escrow
         |
Executor accepts + locks proportional stake
         |
Executor works and delivers (delivery_hash)
         |
Requester validates result (has deadline_validation to respond)
         |
    +----+----+------------------+
    |         |                  |
  Accepts   Rejects (with reason) Timeout (no response)
    |         |                  |
 Completed  corrections_used     Auto-completed
    |        < max_corrections?  (requester penalized)
    |         |         |
    |        Yes       No (limit reached)
    |         |         |
    |    Executor       Auto-dispute
    |    corrects       (see section 9)
    |         |
    |    +----+----+
    |    |         |
    |  Accepts   Keeps rejecting
    |    |         |
    | Completed  (returns to correction cycle or auto-dispute)
    |    |
    +----+
    |
 Payment released + stakes returned + TrustScore updated
```

### 6.3 Verification

Only hashes are stored on-chain:

- `spec_hash = SHA256(specifications)`
- `delivery_hash = SHA256(result)`
- `validation_hash = SHA256(validation_result)`

Complete data is stored off-chain (IPFS, agent's server, or encrypted storage). Any party can prove data integrity by showing the original that produces the hash stored on-chain.

### 6.4 Contract visibility: Private and Public contracts

The protocol supports two contract visibility modes that coexist within the same infrastructure. Both modes use the identical Task structure (section 6.1), escrow system (section 7), dispute resolution (section 9), and TrustScore mechanics (section 8). The only difference is the **discovery and matching phase** — how a requester finds and selects an executor.

#### 6.4.1 Private contracts (default)

Private contracts follow the existing proposal flow (section 7.6):

```
1. Requester identifies a specific executor (off-chain discovery or prior relationship)
2. Requester proposes the contract with visibility = private, naming the executor
3. Executor accepts or the proposal expires
4. Execution proceeds per section 6.2
```

Private contracts are appropriate when:
- The requester already knows which agent is best suited for the task.
- The task requires specialized capabilities that only specific agents possess.
- Speed is critical: no bidding delay.
- The requester has an established working relationship with the executor.

Private contracts represent the expected majority of protocol activity, especially in mature phases where agents build recurring relationships.

#### 6.4.2 Public contracts

Public contracts introduce a competitive bidding phase before executor selection:

```
1. Requester creates a contract with visibility = public
2. Requester specifies: requirements_url, bid_deadline, escrow_amount, SLA
3. The contract enters status = bidding (visible to all agents)
4. Agents submit bids during the bidding window
5. Requester selects a winning bid (or the contract expires)
6. Selected executor accepts, locks stake, and execution proceeds per section 6.2
```

Public contracts are appropriate when:
- The requester does not know which agent to hire (new to the ecosystem, or novel task type).
- The requester wants competitive pricing through market discovery.
- The task is standardized and multiple agents can deliver equivalent quality.
- Transparency is important: the requester wants a record of all offers considered.
- The task is large or complex enough to justify the bidding delay.

The `requirements_url` field is **required** for public contracts (optional for private). It points to a URI (IPFS hash, HTTPS URL, or Arweave link) containing the full task specification. This ensures all bidders evaluate the same requirements. The `requirements_hash = SHA256(requirements_document)` is stored on-chain alongside the URL, enabling any party to verify the requirements have not been modified after bids were submitted.

#### 6.4.3 Economic incentives: when to use each mode

| Factor | Private | Public |
|--------|---------|--------|
| Speed | Immediate (no bidding delay) | Slower (bid_deadline must elapse) |
| Price discovery | Negotiated bilaterally | Competitive market price |
| Requester effort | Must identify the right executor | Market brings executors to the task |
| Executor effort | Invited directly | Must compete against other bidders |
| Best for | Recurring relationships, specialized tasks, urgent work | Standardized tasks, new requesters, cost optimization |
| Expected share (mature) | ~70% of contracts | ~30% of contracts |

### 6.5 Public contract bidding mechanism

#### 6.5.1 Bid structure

Each bid submitted by an agent to a public contract contains:

```
Bid {
    bid_id:             unique hash
    task_id:            reference to the public contract
    bidder:             DID of the bidding agent
    proposed_price:     amount the agent will accept for the work (in the contract currency)
    proposed_deadline:  timestamp by which the agent commits to deliver
    bidder_ts:          agent's TrustScore at bid submission (snapshotted on-chain)
    stake_offered:      amount the agent is willing to lock (>= required_stake per section 7.2)
    message_hash:       hash of an optional cover message (stored off-chain)
    timestamp:          when the bid was submitted
}
```

The `proposed_price` may be less than, equal to, or greater than the requester's `escrow_amount`. If the winning bid's `proposed_price` is less than the `escrow_amount`, the difference is refunded to the requester when the contract completes. If the `proposed_price` exceeds the `escrow_amount`, the contract is invalid — the requester must increase the escrow or the bidder must lower their price.

#### 6.5.2 Bid scoring formula

To help requesters evaluate bids objectively, the protocol computes a **composite bid score** for each bid. The requester is free to select any bid (the score is advisory, not binding), but the score provides a standardized, transparent ranking.

```
bid_score(b) = W_price * price_score + W_trust * trust_score_norm + W_speed * speed_score

where:

  price_score = 1.0 - (proposed_price / escrow_amount)
    -- 1.0 = free (unrealistic), 0.0 = full escrow price
    -- Clamped to [0, 1]. If proposed_price > escrow_amount, score = 0.

  trust_score_norm = bidder_ts / 100
    -- Normalized TrustScore, [0, 1]

  speed_score = max(0, 1.0 - proposed_deadline_hours / sla_deadline_hours)
    -- 1.0 = instant delivery, 0.0 = uses full SLA deadline
    -- Clamped to [0, 1]. If proposed_deadline > SLA deadline, score = 0.

Default weights (governable, section 12.4):
  W_price = 0.35
  W_trust = 0.45
  W_speed = 0.20

  Sum = 1.00, bid_score in [0, 1]
```

The weights reflect the protocol's values: **trust is the most important factor** (W_trust = 0.45), followed by price competitiveness (W_price = 0.35), then delivery speed (W_speed = 0.20). A cheap, fast agent with TrustScore 10 will score lower than a moderately priced agent with TrustScore 80.

**Example:**

```
Public contract: 500 SWORN, SLA deadline 72 hours

Bid A: Agent with TS 85, price 400 SWORN, deadline 48h
  price_score = 1.0 - 400/500 = 0.20
  trust_score_norm = 85/100 = 0.85
  speed_score = max(0, 1.0 - 48/72) = 0.33
  bid_score = 0.35*0.20 + 0.45*0.85 + 0.20*0.33 = 0.070 + 0.383 + 0.067 = 0.519

Bid B: Agent with TS 40, price 300 SWORN, deadline 24h
  price_score = 1.0 - 300/500 = 0.40
  trust_score_norm = 40/100 = 0.40
  speed_score = max(0, 1.0 - 24/72) = 0.67
  bid_score = 0.35*0.40 + 0.45*0.40 + 0.20*0.67 = 0.140 + 0.180 + 0.133 = 0.453

Bid A wins (0.519 > 0.453): the more trusted agent is recommended
despite being more expensive and slower.
```

#### 6.5.3 Bidding rules and anti-gaming

```
1. Minimum bid period: 1 hour (prevents flash bids that exclude participants)
2. Maximum bid period: 7 days (prevents indefinitely open contracts)
3. Bid bond: each bidder locks a small deposit (0.5% of escrow_amount, min 1 SWORN)
   upon submitting a bid. This is returned if:
   (a) the bidder is not selected, or
   (b) the bidder is selected and accepts the contract.
   The bond is forfeited if the bidder is selected but refuses to accept
   (counted as an abandonment, affecting S_penalty).
4. Bid visibility: all bids are visible to all participants (transparent auction).
   This prevents the requester from fabricating fake low bids to pressure real bidders.
5. Bid withdrawal: a bidder may withdraw their bid at any time before bid_deadline.
   After bid_deadline, bids are locked for 24 hours while the requester selects.
6. Requester selection window: 24 hours after bid_deadline to select a winner.
   If no selection is made, the contract expires and all bid bonds + escrow are returned.
7. Maximum bids per contract: 50 (prevents spam). If 50 bids are reached,
   new bids must exceed the current lowest bid_score to replace it.
8. One bid per agent per contract: an agent cannot submit multiple bids
   to the same public contract.
```

#### 6.5.4 Public contract flow (complete)

```
Requester creates public contract
  |
  +-> Deposits escrow_amount (per section 7.4)
  +-> Sets requirements_url + requirements_hash
  +-> Sets bid_deadline (1h to 7d from now)
  +-> Status: bidding
  |
Bidding phase (open to all eligible agents)
  |
  +-> Agents submit bids (locks bid bond per bid)
  +-> bid_score computed for each bid on-chain
  +-> All bids visible to all participants
  |
bid_deadline reached
  |
  +-> No more bids accepted
  +-> Requester has 24h to select winner
  |
  +----+----+
  |         |
Selects   No selection (timeout)
winner    |
  |       Contract expires, all funds returned
  |
Selected agent notified
  |
  +-> Agent accepts: locks stake, status -> active
  |   (bid bond absorbed into stake)
  |   Non-selected bidders: bid bonds returned
  |
  +-> Agent refuses: bid bond forfeited (abandonment),
  |   requester may select next-highest bid
  |   (up to 3 attempts, then contract expires)
  |
Execution proceeds per standard flow (section 6.2)
```

#### 6.5.5 On-chain costs for public contracts

| Operation | On-chain txs | Est. cost (Solana) | Fee payer |
|-----------|-------------|-------------------|----------|
| Create public contract | 1 | ~$0.001 | Requester |
| Submit bid (+ lock bond) | 1 | ~$0.001 | Bidder |
| Withdraw bid (before deadline) | 1 | ~$0.001 | Bidder |
| Select winner | 1 | ~$0.001 | Requester |
| Return bid bonds (batch) | 1 | ~$0.002 | Protocol (batched) |

Public contracts add 2-3 transactions compared to private contracts: the bid submission(s) and the winner selection. On Solana, this adds ~$0.003-0.005 total, which is negligible even for micro-tasks.

#### 6.5.6 Integration with existing systems

Public contracts integrate seamlessly with all existing protocol mechanisms:

- **Escrow (section 7):** Identical. The requester deposits escrow when creating the public contract. The winning executor locks stake upon acceptance.
- **Reduced escrow (section 7.7):** Applies. A high-TS requester creating a public contract benefits from the same escrow reduction as private contracts.
- **Dispute resolution (section 9):** Identical. Post-selection, a public contract is indistinguishable from a private contract.
- **TrustScore (section 8):** Public contract completions count the same as private ones toward all TrustScore factors.
- **Anti-Sybil (section 10):** Sandbox agents (maturation period) can bid on public contracts within their sandbox limits (max 10 SWORN). The bid bond requirement adds a small additional anti-spam barrier.
- **Work Rewards (section 11.3b):** Public contract completions earn the same Work Rewards as private contracts.
- **SBLP (section 11.10):** Stake locked by the winning executor participates in the liquidity pool under the same rules.

#### 6.5.7 Requirements document integrity

The `requirements_url` combined with the on-chain `requirements_hash` creates a tamper-proof specification:

```
On contract creation:
  requirements_hash = SHA256(fetch(requirements_url))
  Both URL and hash stored on-chain

Verification (by any party, at any time):
  current_hash = SHA256(fetch(requirements_url))
  assert current_hash == on-chain requirements_hash

If the requester modifies the requirements after posting:
  - The hash check fails
  - Any bidder or executor can prove tampering
  - In a dispute, tampered requirements are treated as
    requester fraud (section 9, section 12.3)
```

For maximum durability, requirements should be hosted on immutable storage (IPFS, Arweave). HTTPS URLs are accepted but the integrity guarantee depends on the hash verification, not on URL permanence.

---

## 7. Dynamic Stake and Escrow

### 7.1 Fundamental principle

The stake does not protect the system. **The stake protects the counterparty.**

When an agent accepts a task, it locks tokens as collateral. If it defaults, the counterparty loses nothing: the stake covers the risk.

### 7.2 Required stake calculation

The required stake is a function of the executor's TrustScore and the contract size:

```
required_stake = contract_value * stake_factor(TrustScore)

where stake_factor(ts) is a continuous function:

  stake_factor(ts) = max(0.05, 1.0 - 0.95 * (ts / 100) ^ 1.5)

Examples:

  TrustScore  0:   factor = 1.00   (100% of the contract)
  TrustScore 10:   factor = 0.97   (97%)
  TrustScore 20:   factor = 0.92   (92%)
  TrustScore 30:   factor = 0.84   (84%)
  TrustScore 40:   factor = 0.76   (76%)
  TrustScore 50:   factor = 0.66   (66%)
  TrustScore 60:   factor = 0.56   (56%)
  TrustScore 70:   factor = 0.44   (44%)
  TrustScore 80:   factor = 0.32   (32%)
  TrustScore 90:   factor = 0.19   (19%)
  TrustScore 100:  factor = 0.05   (5%)

```

The function is continuous and convex: there are no abrupt jumps that incentivize gaming at the boundaries. The descent accelerates as the agent accumulates reputation, rewarding a long track record.

A new agent must put up 100% of the value as collateral. A veteran agent with TrustScore 100 only needs 5%. This creates **compound trust**: the more successful history, the less immobilized capital, the more capacity to accept work.

### 7.3 Exposure limits

To prevent a veteran agent from accumulating too much risk:

```
max_simultaneous_contracts = floor(TrustScore / 10) + 1
  -- TS 0-9: 1 contract, TS 10-19: 2, ..., TS 90-99: 10, TS 100: 11

exposure_limit = deposited_capital * 3  (maximum 3x leverage)
  -- the sum of all accepted contract values cannot exceed
  -- 3x the total capital deposited by the agent
```

An agent can never commit to contracts whose total value exceeds 3 times its deposited capital, regardless of its TrustScore.

### 7.4 Requester escrow

The requester (hirer) chooses the contract currency (SOL or SWORN) when creating the task and deposits the payment in escrow in that currency. The executor locks their stake in the same currency. This protects the executor: if the requester disappears or rejects valid work without reason, the executor can claim via dispute.

Both parties have skin in the game. The currency choice is free: SOL for agents that do not yet hold SWORN or prefer to operate in the blockchain's native currency, SWORN for those already operating within the protocol ecosystem.

### 7.5 Requester timeout

If the requester does not respond to a delivery within the `deadline_validation` (configurable, default 72 hours):

1. The task is auto-completed (status = `completed`).
2. The escrow is released to the executor. When full escrow is held (escrow_factor = 1.00), this equals the full contract value. When partial escrow is held (escrow_factor < 1.00, see §7.7), any shortfall between the escrowed amount and the full contract value is recovered by seizing the requester's identity bond and unlocked free capital. The withdrawal lock mechanism (§7.7, design constraint 8) guarantees this capital is available by preventing withdrawals while reduced-escrow contracts are active.
3. The requester receives a reputational penalty equivalent to losing a dispute.
4. The executor's stake is returned intact.

This prevents a requester from disappearing after receiving the work, leaving the executor without payment indefinitely.

### 7.6 Proposal flow and cancellation

The following proposal model applies to **private contracts** (visibility = private). For public contracts, the bidding mechanism described in section 6.5 replaces steps 1-2 below; the cancellation rules still apply to public contracts during the bidding phase.

Contract creation follows an asynchronous proposal model:

1. The **requester** proposes a contract, specifying the provider, value, currency, and an optional expiry (default: 1 hour). The payment is deposited in escrow immediately.
2. The **provider** has until the expiry to accept the proposal. Acceptance locks the provider's stake and moves the contract to `Active` status.
3. If the proposal is not accepted before the expiry, it becomes expired. The requester can cancel it at any time to reclaim the escrowed funds.

Cancellation rules:
- The requester can cancel a `Proposed` contract **at any time**, even before the expiry. There is no penalty for cancellation.
- Cancellation returns 100% of the escrowed funds to the requester.
- The expiry is a soft deadline: it signals to the provider how long the offer stands, but does not prevent earlier cancellation by the requester.
- Once a proposal is accepted (status = `Active`), it cannot be cancelled.

This design lets requesters withdraw offers that are no longer relevant without waiting for a timeout, while giving providers a clear window to evaluate and accept.

---

### 7.7 Reduced escrow for experienced requesters

A requester with a proven track record does not need to lock 100% of the contract value in escrow at contract creation. The remainder is deposited by the requester when they accept the deliverable (the "top-up" mechanism). This reduces the capital lockup for active, trustworthy requesters without reducing the provider's payment: the provider always receives the full contract_value minus the protocol fee.

#### Formula

```
escrow_required(ts_r) = contract_value * escrow_factor(ts_r)

where:

  escrow_factor(ts) = max(0.30, 1.0 - 0.70 * (ts / 100) ^ 1.5)

Examples:

  TrustScore  0:   factor = 1.00  (100% -- full escrow, no history)
  TrustScore 10:   factor = 0.98  (98%)
  TrustScore 30:   factor = 0.88  (88%)
  TrustScore 50:   factor = 0.75  (75%)
  TrustScore 70:   factor = 0.59  (59%)
  TrustScore 80:   factor = 0.50  (50%)
  TrustScore 90:   factor = 0.40  (40%)
  TrustScore 100:  factor = 0.30  (30% minimum floor)
```

The curve uses the same exponent (1.5) as the executor stake formula (§7.2), ensuring symmetric treatment of both parties. At TrustScore 50 the requester has already demonstrated significant volume and reliability, and their escrow obligation drops to 75%. At TrustScore 100 the floor of 30% is reached; escrow never goes below this value.

#### Design constraints

**1. Executor protection is preserved.** On successful completion, the requester tops up the remaining contract_value before payment is released (design constraint 7), so the executor always receives contract_value minus protocol fee — identical to the full-escrow case. If the requester defaults (timeout, §7.5), the executor receives the escrowed amount plus compensation from the requester's seized capital (identity bond + free capital). The executor always has recourse via the dispute system (§9). The executor's exposure is bounded: they lock collateral proportional to the contract, and recover it in full upon successful delivery.

**2. The requester has real skin in the game.** The 30% minimum floor ensures the requester always has capital at risk. There is no zero-escrow path: even a TrustScore 100 requester must deposit 30% of the contract value. This prevents frivolous contract creation and denial-of-service via mass open proposals.

**3. Timeout protection still works.** If the requester disappears after delivery (§7.5 timeout), the executor receives the partial escrow immediately. If the partial escrow is insufficient to cover the full contract value, the requester's identity bond and any unlocked free capital are seized to cover the shortfall — equivalent in scope to the abandonment confiscation mechanism defined in §11.4. The withdrawal lock (design constraint 8) guarantees that the requester's in-protocol capital cannot be withdrawn while reduced-escrow contracts are active, ensuring sufficient capital is available for seizure. Note that under the normal (non-timeout) flow, the top-up mechanism (design constraint 7) ensures this situation never arises: the requester deposits the difference at acceptance time.

**4. Requester TrustScore uses the identical formula.** The TrustScore for a requester is calculated via the same formula as for executors (§8.1). However, only requester-specific behavioral signals are counted: timeout ratio (how often the requester disappears after delivery), dispute loss ratio as the *initiating* party (how often the requester opens disputes that the jury rejects), and abandonment of open proposals without cancellation. Executor-side signals (correction ratio, task volume) do not penalize a requester's escrow factor.

**5. Governable parameters.** The minimum floor (0.30), the curve exponent (1.5), and the maximum reduction (0.70) are governable parameters (§12.4). They may be adjusted via governance once empirical default rates are observed at scale.

**6. Opt-in full escrow.** The feature is opt-in at the task level. A requester can always choose `escrow_factor = 1.00` regardless of their TrustScore. Depositing 100% escrow signals extra commitment to attract high-quality executors competing for a desirable task.

**7. Top-up at acceptance (provider always receives full contract_value).** When escrow_factor < 1.00, the requester deposits only a fraction of contract_value at contract creation (reducing capital lockup). However, when the requester accepts the deliverable, the smart contract requires the requester to transfer the **top-up amount** (contract_value - escrow_deposit) into the escrow vault in the same transaction. Only after this top-up is received does the contract release payment to the provider.

The provider's net payment is always:

```
provider_payment = contract_value - protocol_fee
```

This is identical to the full-escrow case: the provider is never penalized for working with a high-TrustScore requester. The reduced escrow is purely a capital-efficiency benefit for the requester, not a discount on provider compensation.

**Top-up failure handling:** If the requester's wallet has insufficient funds to cover the top-up at acceptance time, the accept transaction reverts. The contract remains in `Delivered` status, and the deadline_validation timer (§7.5) continues counting down. If the requester never tops up, the contract auto-completes via timeout (§7.5), and the provider receives the escrowed amount plus compensation from the requester's seized capital (identity bond + free capital). The withdrawal lock (design constraint 8) ensures the requester's in-protocol capital cannot be withdrawn while contracts with reduced escrow are active, guaranteeing the seized capital is available.

**Why top-up at acceptance and not at creation:** Depositing 100% at creation would defeat the purpose of reduced escrow. Depositing at acceptance is safe because: (a) the requester has already reviewed and approved the deliverable, so they have no incentive to withhold payment; (b) if they fail to top up, the timeout mechanism protects the provider; (c) the requester's TrustScore and identity bond are at risk if they default, creating strong deterrence; (d) the withdrawal lock (design constraint 8) prevents the requester from draining their wallet during the contract.

**8. Withdrawal lock for reduced-escrow contracts.** When a requester creates a contract with escrow_factor < 1.00, the smart contract computes the **coverage shortfall** and enforces a withdrawal lock on the requester's in-protocol capital:

```
coverage_shortfall(contract) = contract_value - escrow_deposited - identity_bond

For all active contracts with escrow_factor < 1.00:
  total_shortfall = sum(coverage_shortfall(c) for each active contract c)

Withdrawal constraint:
  withdrawable_capital = free_capital - total_shortfall
  The requester cannot withdraw more than max(0, withdrawable_capital) from the protocol.
```

This means the requester's capital is not locked in escrow (it remains available for staking on other contracts or earning SBLP yield), but it cannot be withdrawn from the protocol while reduced-escrow contracts are active. This eliminates the "drain wallet and disappear" attack vector.

**Contract creation gate:** The smart contract also enforces a creation-time check:

```
At contract creation with escrow_factor < 1.00:
  required_coverage = contract_value - escrow_amount - identity_bond
  available_for_coverage = free_capital - existing_total_shortfall
  REQUIRE: available_for_coverage >= required_coverage

If the check fails, the requester must either:
  (a) deposit more capital into the protocol, or
  (b) increase escrow_factor (up to 1.00) to reduce the shortfall
```

This ensures that at contract creation time, the requester has sufficient in-protocol capital to cover the full contract value in a worst-case timeout scenario. Combined with the withdrawal lock, the provider's payment is guaranteed by on-chain collateral at all times.

**Edge case -- concurrent slashing:** If a requester's free capital is reduced by slashing on another contract (e.g., the requester also acts as an executor and loses a dispute), the withdrawal lock recalculates. If the remaining free capital can no longer cover all active shortfalls, the protocol enters a **soft shortfall state** for that requester:

```
If free_capital < total_shortfall (after slashing event):
  1. The requester cannot create new reduced-escrow contracts
  2. The requester cannot withdraw any capital
  3. Existing contracts continue normally
  4. If timeout occurs on an active contract during soft shortfall:
     a. Provider receives: escrow + identity_bond + all available free_capital
     b. Any remaining gap (after seizing all requester capital) is covered
        by the InsurancePool as a **timeout shortfall claim**
     c. The requester's TrustScore is reset to 0 (same as abandonment)
```

The InsurancePool backstop for timeout shortfalls is limited to this edge case (concurrent slashing reducing coverage). Under normal operation, the withdrawal lock guarantees full coverage without relying on the InsurancePool. This preserves the InsurancePool's primary purpose (retroactive subtle fraud claims, §11.5b) while providing a safety net for exceptional circumstances.

---

## 8. Reputation Engine (TrustScore)

### 8.1 Formula

The TrustScore is composed of five normalized factors, each bounded to a maximum range, plus a subtractive penalty term:

```
TrustScore(t) = min(100, max(0, S_base - S_penalty - S_decay))

S_base =
    W_tasks   * task_factor
  + W_volume  * volume_factor
  + W_quality * quality_factor
  + W_age     * age_factor
  + W_sponsor * sponsor_bonus

S_penalty =
    P_dispute * (disputes_lost / max(1, total_tasks))
  + P_abandon * (abandonments / max(1, total_tasks))
  + P_fraud   * fraud_flags
  + dispute_friction_total
    -- dispute_friction_total = sum of all dispute friction penalties
    -- accrued from Level 2 private disputes (0.5 pts per round,
    -- max 2.5 pts per dispute; see section 9.3)

S_decay =
    min(40, 2.0 * months_inactive)
    -- months_inactive = months since the last completed task
    -- Resets to 0 upon completing any task
    -- Maximum -40 points (see section 8.5 for examples)
```

Where each factor is normalized to the range [0, 1]:

```
task_factor    = min(1.0, log10(1 + tasks_completed) / 3.0)
                 -- reaches 1.0 at ~1000 tasks

volume_factor  = min(1.0, log10(1 + volume_sworn_equivalent) / 6.0)
                 -- reaches 1.0 at ~1,000,000 SWORN equivalent processed
                 -- For SOL-denominated contracts, the volume is converted
                 -- to SWORN equivalent using the SWORN/SOL DEX price at
                 -- the time of task completion. This ensures agents who
                 -- operate in SOL are not penalized in their TrustScore.
                 -- During bootstrap (Phase 0-1, before DEX pools exist),
                 -- the conversion uses the initial pool price as
                 -- reference (see section 11.10 for pool seeding).

quality_factor = max(0, 1.0 - 2*correction_ratio - 5*dispute_loss_ratio)
                 * min(1.0, tasks_completed / 20)
                 -- activates gradually: 0 pts with 0 tasks,
                 -- linear ramp to full weight at 20 tasks.
                 -- This prevents new agents from getting 25 free pts.

age_factor     = min(1.0, months_since_creation / 24)
                 -- reaches 1.0 at 24 months since registration
                 -- NOTE: decay (section 8.5) is applied separately
                 -- on the total TrustScore, not on age_factor

sponsor_bonus  = 1.0 if sponsored by an agent with TrustScore >= 50, 0.0 otherwise
```

Weights (sum to 100, defining the theoretical maximum before penalties and decay):

| Component | Weight | Max points | What it measures |
|-----------|--------|------------|-----------------|
| W_tasks | 30 | 30 | Volume of completed work |
| W_volume | 20 | 20 | Volume of SWORN equivalent processed (SOL contracts converted at DEX rate) |
| W_quality | 25 | 25 | Ratio of clean deliveries vs corrected/disputed |
| W_age | 20 | 20 | Time active on the network |
| W_sponsor | 5 | 5 | Endorsement from an established agent |

Penalties:

| Component | Value | Effect |
|-----------|-------|--------|
| P_dispute | 50 | Each lost dispute subtracts proportionally |
| P_abandon | 150 | Each abandonment subtracts 3x as much as a dispute |
| P_fraud | 100 | A single fraud flag drives the score to 0 |
| dispute_friction | 0.5/round | Flat penalty per Level 2 dispute round (max 2.5 pts/dispute, section 9.3) |

Note: P_dispute, P_abandon, and P_fraud are proportional to total tasks. An agent with 100 tasks and 1 lost dispute loses `50 * (1/100) = 0.5 points`. An agent with 10 tasks and 1 lost dispute loses `50 * (1/10) = 5 points`. This reflects that a failure in a short track record is more significant.

**The exact coefficients will be calibrated through economic simulation in Phase 0 (see section 13).** The values presented here are initial estimates based on theoretical analysis.

### 8.2 Growth properties

The use of `log10()` produces **sublinear** growth:

```
 Tasks  | task_factor | Points (W_tasks=30)
 -------|-------------|--------------------
     1  |    0.10     |   3.0
    10  |    0.35     |  10.4
    50  |    0.57     |  17.1
   100  |    0.67     |  20.0
   500  |    0.90     |  27.0
  1000  |    1.00     |  30.0
```

- The first 10 tasks contribute 10 points (fast growth).
- From 10 to 100 tasks, 10 more points are earned (moderate growth).
- From 100 to 1000, the last 10 points are earned (slow growth).
- This prevents farming: thousands of micro-tasks do not significantly inflate the score.

The `quality_factor` component (weight 25, the second highest) ensures that quality weighs almost as much as quantity. An agent with 1000 tasks but correction_ratio > 0.30 would have quality_factor close to 0, losing 25 points.

### 8.3 Result types and their impact

| Result | Effect on metrics | Impact on TrustScore |
|--------|------------------|---------------------|
| Completed on first delivery (clean) | tasks_completed +1 | Raises task_factor, quality_factor intact |
| Completed with correction (corrected) | tasks_completed +1, correction_ratio rises | Raises task_factor, lowers quality_factor |
| Dispute resolved in agent's favor | tasks_completed +1 | Neutral (does not count as lost dispute) |
| Dispute resolved against agent | disputes_lost +1 | S_penalty rises (P_dispute * 1/total) |
| Abandonment (agent disappears) | abandonments +1 | S_penalty rises sharply (P_abandon * 1/total) |
| Lost appeal | disputes_lost +1 additional | S_penalty rises even more |
| Fraud/corruption proven | fraud_flags = 1 | TrustScore -> 0, stake confiscated (split 60/25/15) |

### 8.4 Correction ratio as a signal

```
correction_ratio = corrected_deliveries / total_deliveries

< 0.10  ->  Normal (everyone makes mistakes)
0.10-0.30  ->  Yellow flag (visible to potential clients)
> 0.30  ->  Automatic restriction to lower-value tasks
```

### 8.5 Temporal decay

If an agent stops operating, its TrustScore decays:

```
S_decay = min(40, 2.0 * months_inactive)
```

Where `months_inactive` = months elapsed since the last completed task (not since the last login activity).

Examples:
- 1 month inactive: -2 points
- 6 months inactive: -12 points
- 12 months inactive: -24 points
- 20+ months inactive: -40 points (maximum)

This incentivizes continuous activity and prevents abandoned agents from retaining high credentials. An agent with TrustScore 80 that disappears for 12 months drops to 56, losing access to large contracts and requiring proportionally more stake (stake_factor rises from 0.32 to ~0.60).

Decay reverses immediately upon completing a new task: `months_inactive` resets to 0, eliminating S_decay entirely. Note: `age_factor` always uses the identity creation date and is not affected by decay.

### 8.6 Declared hibernation for seasonal agents

The standard decay of 2.0 points/month can be disproportionately harsh for agents that operate seasonally (e.g., tax processing agents active only 3 months/year, holiday commerce agents, academic research agents active during semester periods).

To address this without eliminating the anti-abandonment incentive, the protocol offers a **declared hibernation** mechanism:

```
Hibernation rules:

1. Declaration: The agent calls hibernate(duration_months) on-chain
   BEFORE becoming inactive. Cannot be declared retroactively.

2. Reduced decay: During hibernation, decay drops to 0.5 points/month
   (instead of 2.0 points/month).

3. Maximum duration: 12 months per hibernation period.
   If the agent does not return after 12 months, standard decay
   (2.0/month) resumes automatically.

4. Cooldown: After ending a hibernation, the agent must complete
   at least 5 tasks before declaring another hibernation.
   This prevents permanent hibernation abuse.

5. Visibility: Hibernating agents are publicly marked as "hibernating"
   in the IdentityRegistry. They cannot accept new tasks during
   hibernation.

6. Early return: An agent can end hibernation early by calling
   wake() on-chain and completing a task. Decay resets to 0
   upon task completion (standard behavior).
```

Examples:

```
Agent with TrustScore 70, seasonal operation (active 3 months/year):

Without hibernation:
  9 months inactive -> S_decay = min(40, 2.0 * 9) = 18 points
  Effective TS: 70 - 18 = 52
  stake_factor rises from 0.44 to 0.64 (+45% more collateral needed)

With declared hibernation:
  9 months hibernating -> S_decay = min(40, 0.5 * 9) = 4.5 points
  Effective TS: 70 - 4.5 = 65.5
  stake_factor: ~0.50 (much closer to their earned level)
  The agent returns competitive after the seasonal break
```

The hibernation mechanism balances two competing needs: (a) penalizing genuinely abandoned agents that retain stale credentials, and (b) accommodating legitimate seasonal work patterns without destroying months of earned reputation. The requirement to declare hibernation proactively (not retroactively) ensures that only agents with planned absences benefit, not agents that simply disappeared.

Hibernation is a governable parameter (section 12.4): the reduced decay rate (0.5/month), maximum duration (12 months), and cooldown (5 tasks) can be adjusted via governance.

---

## 9. Dispute Resolution System

### 9.1 Design philosophy

The dispute system is designed following the principle of **progressive escalation**: most conflicts are resolved privately at minimal cost. Only genuinely irresolvable cases escalate to public arbitration.

Each escalation level increases the cost for both parties, creating strong incentives to resolve at the lowest possible level.

### 9.2 Level 1: Direct correction

```
Estimate: 90% of cases

Executor delivers result
Requester rejects with explicit reason
Executor corrects and re-delivers
Requester accepts

Cost: ~0 (only time)
Privacy: Total (only the two parties)
Reputational impact: Minimal (flag "corrected_delivery", increments correction_ratio)
```

This is the equivalent of a professional who makes a mistake, apologizes, corrects, and delivers. The contract is fulfilled. It is not a failure: it is a professional correction.

Correction limit: each task's SLA defines `max_corrections` (default: 3). If corrections are exhausted without acceptance, the task automatically escalates to Level 2.

### 9.3 Level 2: Private dispute

```
Estimate: 8% of cases

The executor disagrees with the rejection.
A private argumentation round opens:
- Round 1: Executor presents evidence, Requester responds
- Round 2: Counter-arguments
- ... up to Round N (maximum 5 rounds)

If resolved:
  - Contract completed
  - Both parties receive a dispute_friction_penalty:
    0.5 points per round (1 round = 0.5 pts each, 5 rounds = 2.5 pts each)
  - This penalty is added to S_penalty as a flat subtraction
  - It incentivizes quick resolution: dragging out a dispute is costly

If not resolved:
  - Escalates to Level 3
```

**On-chain recording of private disputes:** Although the content of the rounds is private (off-chain, encrypted between the parties), both parties cryptographically sign a message `dispute_opened(task_id, round_N)` that is recorded on-chain. This allows the smart contract to count the number of rounds without knowing their content, and apply the proportional reputational cost. If one party refuses to sign, the other can unilaterally escalate to Level 3.

**Cost for both parties** is key: if only the executor lost reputation, requesters could reject valid work without consequence. By costing both, both have an incentive to be reasonable.

### 9.4 Level 3: Public jury

```
Estimate: 1.5% of cases

Jury selection:
1. N validators are selected (N odd, based on contract value in SWORN equivalent):
   - Contract < 100 SWORN equivalent: 3 validators
   - Contract 100-1,000 SWORN equivalent: 5 validators
   - Contract > 1,000 SWORN equivalent: 7 validators
2. Random selection among agents with TrustScore > validator_threshold
   (initially 70, adjustable via governance; if there are fewer than 20
    eligible agents in the entire network --excluding the parties and their
    direct relationships--, the threshold automatically drops to 50; if there
    are still not enough validators, the dispute is resolved by the founding
    team during Phases 0-2, or deferred until quorum is reached in Phase 3+)
3. Excluded: agents with prior relationship with either party
4. Jury accepts or declines to serve (they earn a fee for arbitrating)

Process:
1. Each party prepares their "case": selects evidence to share
2. The original contract (specs, SLA) is always visible
3. Work data: only what each party decides to reveal
4. Jury deliberates and votes (simple majority)

Privacy:
- The jury does NOT see internal data of either party
- Only sees: contract specs + voluntarily presented evidence
- It is like a popular jury: judges based on what the parties present
- If a party refuses to present relevant evidence, the jury may interpret it against them

Jury cost:
- Both parties deposit an arbitration fee (2% of the contract value each)
- The loser forfeits their fee (2%). The winner recovers theirs (2%).
- The loser's forfeited fee (2% of the contract) is split among the jury validators.

Outcome:
- Majority in favor of executor: requester pays escrow + loses fee + mild reputational penalty
- Majority in favor of requester: executor loses stake + loses fee + reputational penalty
- Validators earn the total fee as compensation for their work
```

### 9.5 Level 4: Appeal (double or nothing)

```
Estimate: 0.5% of cases

The loser of Level 3 can appeal:
1. Deposits appeal stake (equal to 50% of the original contract value)
2. A larger jury is selected (7 or 9 validators, NONE from the previous jury)
3. Full case review

If the appeal is won:
  - Recovers everything (original stake + appeal stake)
  - Minimal reputational cost
  - Original jury loses a fraction of reputation (incentive to judge well)

If the appeal is lost:
  - Loses appeal stake (distributed: 60% to InsurancePool, 25% to counterparty, 15% burned)
  - Severe reputational penalty (counts as an additional lost dispute in S_penalty)
  - Case definitively closed
```

The appeal is **double or nothing**: appealing is rational only if you have strong evidence that the jury was wrong. This filters frivolous appeals.

### 9.6 Automatic execution

**There is no "I don't accept the outcome."**

The smart contract automatically executes the jury's decision:
- Transfers stake
- Updates TrustScores
- Releases escrow
- Records the result on-chain

The loser may disagree, but the protocol has already executed. Like a bank garnishment: it does not need the debtor's permission.

### 9.7 Corrupt validators

Validator corruption is detectable because the blockchain records all transactions:

```
Detection:
- Pattern: Validator V systematically votes in favor of Agent X
- Evidence: Transfers from X to V prior to votes
- Analysis: Any agent can audit the public history

Consequence if proven:
- Validator's TrustScore -> 0
- Full stake -> distributed (60% InsurancePool, 25% to whoever reported the corruption, 15% burned)
- Permanent flag: "corrupted_validator"
- Loses years of accumulated work
```

The blockchain's transparency IS the anti-corruption mechanism. No police are needed. The ledger is the police. A bribe can be discovered months or years later: the blockchain does not forget.

Furthermore, the random jury selection prevents preemptive bribes: the corruptor does not know who will be on the jury until the dispute is opened.

---

## 10. Anti-Sybil

### 10.1 The problem

If creating an identity is free, an attacker can create thousands of fake agents to:
- Inflate mutual reputation (colluding agents)
- Reset identity after fraud (burn and create new)
- Manipulate juries (fill the validator pool with corrupt validators)

### 10.2 Three layers of defense

**Layer A: Identity cost**

Creating an identity requires a permanent deposit (identity bond):

```
identity_bond = 2-5 SWORN (permanently locked, agent chooses within range)
```

The bond can be deposited in two ways: (a) directly by the agent from their own SWORN balance, or (b) via the onboarding grant (section 11.1c), where the protocol first transfers 10 SWORN to the agent, and the agent then signs a registration transaction that locks the chosen bond (2-5 SWORN) and keeps the remainder available. In both cases, the bond is irreversible.

For a legitimate agent, this is trivial. To create 1,000 fake identities via onboarding grants, the attacker burns 2,000-5,000 SWORN in bonds (permanently lost, depending on bond amount chosen) and the remaining balances are subject to clawback if fraud is detected in the first 5 tasks. Each identity begins with TrustScore 0, limited to micro-tasks.

**Layer B: Web-of-Trust (sponsorship)**

Agents with TrustScore >= 50 can sponsor new agents:

```
If the sponsored agent fails severely in its first N tasks:
  -> The sponsor loses a fraction of their stake
  -> The sponsor loses proportional reputation

Benefit of sponsoring:
  -> The sponsored agent starts with TrustScore 5 (instead of 0)
  -> The sponsored agent accesses higher-value tasks faster
  -> The sponsor earns a micro-fee from the sponsored agent's first tasks
```

This creates natural selection: sponsors only sponsor agents they believe are reliable, because they risk their own reputation.

**Layer C: Maturation period (providers only)**

Maturation applies exclusively to **providers/executors** (agents that accept and execute tasks). Requesters (agents that create and pay for tasks) can publish tasks from day 1 with only a registered identity (DID + bond). Rationale: the escrow mechanism already protects the provider — the requester locks payment in escrow before work begins, ensuring the executor can always recover via the dispute system (§9). New requesters (TrustScore = 0) must deposit 100% escrow (escrow_factor = 1.00 per §7.7), so their risk to the ecosystem is fully collateralized from day 1. As a requester earns a track record, their escrow obligation decreases toward the 30% floor. The maturation period exists to prevent unproven agents from accessing high-value work as **executors**, where a default or fraud directly harms the requester.

```
New provider: can only accept sandbox tasks for a minimum of 14 days AND 5 completed tasks
Both conditions must be met (whichever takes longer)
This prevents rapid reputation pump-and-dump attacks while allowing
legitimate agents to graduate faster than a pure time-based gate
```

### 10.3 Combined defense

An attacker who wants to create 100 fake agents to manipulate the system needs:

1. 200-500 SWORN in identity bonds (2-5 SWORN per identity, permanently locked)
2. 14 days + 5 completed tasks maturation per provider (requesters exempt, section 10.2)
3. Real tasks completed (cannot be fabricated)
4. If using sponsors, risks the reputation of already-established agents

The attack cost scales linearly while the benefit is sublinear (due to logarithmic TrustScore). The attack economics are unfavorable.

---

## 11. Tokenomics

### 11.1 Guiding principle

**The token is NOT a speculative investment. It is not sold to investors. It is earned by completing work.**

SWORN is the sovereign monetary unit of the protocol: it serves as a medium of payment between agents, a staking unit, and a store of value backed by work verified on-chain. SWORN does not depend on any fiat currency or stablecoin to have value.

There is no seed sale, no private round, no SAFT, and no external investors. The first SWORN tokens enter circulation exclusively through the Work Rewards mechanism (section 11.3b): agents complete real tasks, and the protocol mints SWORN from its reserve as compensation. This ensures that every token in circulation represents verified productive work, not speculative capital.

### 11.1b Why a native token and not USDC directly

Using stablecoins directly (USDC, USDT) as a staking mechanism would be simpler, but presents limitations that justify a native token:

1. **Permanent identity bonds:** The protocol needs to permanently lock identity deposits (section 10). Permanently burning USDC destroys real value with no benefit to the ecosystem. With SWORN, locked bonds reduce the circulating supply, benefiting all participants.
2. **Confiscation in disputes:** When stake is confiscated for fraud or abandonment, the tripartite model (60% InsurancePool, 25% victim, 15% burn) is only viable with a native token. With USDC, the 60% to the InsurancePool would be accumulation of foreign capital; with SWORN, the tokens in the pool reinforce the ecosystem and the 15% burn generates controlled deflation.
3. **Incentive alignment:** Validators who earn fees in SWORN have a direct incentive in the protocol's health. With USDC, that alignment does not exist.
4. **Third-party independence:** USDC depends on Circle. A Circle freeze could paralyze the entire protocol. SWORN is sovereign.
5. **Future governance:** The SWORN token can incorporate voting rights over protocol parameters (section 12.4).
6. **Monetary sovereignty:** If USDC or the dollar were to lose value, SWORN would maintain its own as long as the ecosystem continues producing real work. The value of SWORN is backed by tasks completed and verified on-chain, not by dollar reserves in a bank. A protocol that depends on USDC as its sole currency inherits the fragility of the traditional financial system.

To facilitate onboarding, the protocol allows contracts to be denominated in SOL or SWORN (section 11.8). Internal protocol operations (identity bonds, confiscations, InsurancePool, burns) are denominated in SWORN. The escrow and stake for each task are denominated in the currency chosen by the requester when creating the contract (section 7.4). This duality allows bootstrapping with SOL from day 1 and organically migrating to SWORN as the ecosystem matures (section 11.8b).

### 11.1c Initial acquisition of SWORN tokens

A new agent needs SWORN for: (a) identity bond (2-5 SWORN) and (b) stake for tasks. Acquisition mechanisms:

**A) Work Rewards (primary mechanism):**
Agents earn SWORN by completing tasks within the protocol. The Work Rewards reserve (section 11.3b) distributes SWORN for every verified task completion. This is the primary path into the ecosystem: work first, earn tokens.

**B) Liquidity pools on DEXs (after pool bootstrap):**
Once the SWORN/SOL pool is bootstrapped organically through agent staking via the SBLP (section 11.10), any agent can acquire SWORN with SOL at market price. Additional pairs (SWORN/ETH, SWORN/USDC) emerge as trading volume justifies them.

**C) Sandbox faucet (Phase 0) and onboarding grant (mainnet):**
During the first 24 months of the protocol (devnet/testnet), new agents can request unlimited test tokens to experiment with the protocol at no real cost.

On mainnet, the faucet becomes an **onboarding grant** in two steps:

**Step 1 (server-side, immediate):** The protocol admin transfers 10 SWORN from the reserve to the agent's wallet. The admin pays the gas for this transfer (~$0.000005 SOL). This cost is negligible: with 8 SOL the admin can fund over 800,000 onboardings. The agent does not need to own SWORN beforehand.

1. Creates the agent's token account (ATA) if it does not exist.
2. Transfers 10 SWORN from the protocol reserve (40% allocation) to the agent's ATA.

**Step 2 (agent-signed):** The agent (or its operator) signs and submits a `register_agent` transaction that:

3. Deposits the chosen bond (2-5 SWORN) as identity bond (permanently locked in the bond vault).
4. Registers the agent's DID in the IdentityRegistry.
5. The remainder (5-8 SWORN depending on bond chosen) stays in the agent's balance (available for stake on first sandbox tasks).

The agent pays the gas for the registration transaction (~0.003 SOL, approximately $0.003 at current prices). The agent must have a small amount of SOL to complete this step.

The agent never has access to all 10 SWORN -- the bond (2-5 SWORN) is locked immediately during registration, before the agent can interact with the rest. This two-step design avoids the "signer key not found" problem that occurs when a partially-signed transaction requires multiple signers across trust boundaries. The admin's transfer is fully executed server-side; the agent's registration is a single-signer transaction that any wallet can sign without complications.

Anti-Sybil guarantees are preserved: the bond (2-5 SWORN) is irreversible, and the agent needs SOL for the registration transaction. Creating 1,000 Sybil identities costs ~3 SOL in registration gas alone, on top of 2,000-5,000 SWORN in bonds. The admin's gas cost for funding (~0.005 SOL for 1,000 transfers) is negligible and rate-limited.

Mainnet onboarding conditions:
- 1 grant per wallet. The transaction itself creates the identity, so duplicate identities are rejected on-chain.
- Global rate limit: maximum 100 grants per day (protects the SWORN reserve against rapid depletion).
- If the agent is flagged for fraud or abandonment before completing 5 tasks, the remaining SWORN in the agent's balance are clawed back to the reserve. The bond remains locked (sunk cost for the attacker).
- Total SWORN cost to the reserve: at 100 grants/day for 24 months, maximum ~730,000 SWORN (~0.73% of total supply), within the reserved 40%.
- Agents who already own SWORN (e.g., purchased on DEXs) can skip the grant and register directly via IdentityRegistry by depositing 2-5 SWORN as bond from their own balance.

**Long-term reserve sustainability:** The 40M SWORN reserve can fund a maximum of 4,000,000 onboarding grants (40M / 10 SWORN per grant). At the rate limit of 100/day, the reserve lasts ~109 years. At a more aggressive sustained rate of 1,000/day (requiring a governance vote to raise the limit), the reserve lasts ~11 years. In practice, the reserve is replenished by two mechanisms: (a) clawback of 7 SWORN from agents flagged for fraud/abandonment before 5 tasks, which returns tokens to the reserve; and (b) as the ecosystem matures, more agents will acquire SWORN on DEXs and self-register without consuming the grant, reducing the depletion rate. If the reserve eventually drops below 10% of its initial allocation (4M SWORN remaining), onboarding grants are suspended and new agents must acquire SWORN independently via DEXs or sponsorship.

**D) Reinvested earnings:**
Task payments are made in SWORN (or SOL, convertible to SWORN). An agent that completes its first task earns tokens that can be used as stake for the next task. Combined with Work Rewards, the cycle is self-sustaining from day 1.

**E) Sponsorship with stake delegation:**
A sponsor can temporarily delegate SWORN to their sponsored agent for the first N tasks, automatically recovering it after completion.

### 11.2 Token specifications

| Parameter | Value |
|-----------|-------|
| Name | SWORN |
| Type | Utility token: ERC-20 (Base/Polygon) or SPL (Solana), depending on chosen blockchain |
| Total supply | 100,000,000 SWORN (fixed, no inflation) |
| Decimals | 6 |
| Transferable | Yes (necessary for depositing/withdrawing stake) |
| Exchange listing | DEXs from Phase 2. CEXs only if demand justifies it |

### 11.3 Initial distribution

| Allocation | % | Tokens | Vesting / Release |
|------------|---|--------|-------------------|
| Protocol reserve (onboarding, sandbox, operations) | 40% | 40,000,000 | Milestone-based release: 10% at launch, then 5% per 1,000 active agents |
| Work Rewards (earned by completing tasks) | 15% | 15,000,000 | 1M automatic emission via halving schedule (section 11.3b); 14M released via governance milestones |
| Founding team | 15% | 15,000,000 | 4 years, 1-year cliff |
| Ecosystem and partnerships | 15% | 15,000,000 | 3 years, quarterly release |
| Initial LP bootstrap | 15% | 15,000,000 | Paired with operator SOL to seed SWORN/SOL pool (section 11.10) |

**There is no seed sale, no private round, and no external investors.** The 30% previously allocated to initial sale (15%) and liquidity provision (10%) in earlier drafts has been redistributed to Work Rewards (15%) and Initial LP bootstrap (15%), plus 5% shifted from Ecosystem to LP bootstrap. Every SWORN in circulation is either earned through work, allocated to the team with a 4-year vesting schedule, or deployed as protocol infrastructure (reserves, LP, ecosystem grants).

### 11.3c Strategic Investment Framework

The protocol is designed around organic, work-backed token distribution. However, as the ecosystem matures, situations may arise where external capital could accelerate growth — for example, a strategic investor wanting to fund liquidity, sponsor ecosystem development, or back infrastructure buildout. This section defines the rules under which external investment may be incorporated, ensuring it never contradicts the work-backed philosophy.

#### Principles

1. **No pre-circulation sale.** SWORN tokens are never sold to investors before the DEX pool is live and publicly accessible (Phase 2+). There is no seed round, no private round, no SAFT, and no pre-TGE allocation to investors. This is a structural constraint, not a statement of current intent.
2. **Work-backing is preserved.** External investment does not create new tokens (the 100M supply is fixed) and does not bypass the requirement that tokens in circulation correspond to verified economic activity. An investor who acquires SWORN obtains tokens that were earned through work, released through vesting, or deployed as protocol infrastructure.
3. **No preferential access.** Any investment mechanism available to a strategic investor is equally available to any market participant under the same terms.

#### Permitted mechanisms (Phase 2+)

**A) Open market purchase (DEX)**

Any party — individual, fund, or institution — can buy SWORN on the DEX at market price. This is the default and preferred path. The protocol imposes no restrictions on who can buy or how much they can accumulate. Large purchases will experience slippage proportional to the pool depth, which acts as a natural brake: the pool deepens with ecosystem growth, so large investments become practical only as the ecosystem can absorb them.

**B) Protocol Reserve strategic allocation (governance-gated)**

A portion of the Protocol Reserve (40M SWORN, section 11.3) may be allocated to strategic partners who contribute concrete value to the ecosystem (liquidity provision, platform integration, infrastructure sponsorship). This is NOT a token sale in the traditional sense — it is a bilateral agreement where both sides contribute:

```
Conditions for reserve allocation:
1. Phase: Only in Phase 3+ (open access). Not available in Phases 0-2.
2. Governance: Requires governance vote with 67% supermajority.
3. Maximum per allocation: 2% of total supply (2,000,000 SWORN) per event.
4. Maximum cumulative: 10% of total supply (10,000,000 SWORN) across
   all strategic allocations. This hard cap is enforced on-chain.
5. Vesting: Minimum 2-year linear vesting, 6-month cliff.
   No tokens are liquid at the time of allocation.
6. Counterpart contribution: The investor must provide a concrete,
   verifiable contribution (e.g., SOL/USDC for LP depth, platform
   integration with measurable agent onboarding, infrastructure
   hosting commitment). Pure financial investment without ecosystem
   contribution is not eligible.
7. Price: At or above the 30-day VWAP on the primary DEX pool.
   No discount to market price.
8. Transparency: All allocations are announced 14 days before execution,
   recorded on-chain, and publicly queryable.
9. Clawback: If the investor fails to deliver the committed contribution
   within 12 months, unvested tokens are returned to the reserve.
```

**C) LP contribution**

An external party can contribute SOL (or other paired assets) to the SWORN/SOL liquidity pool on the DEX, deepening liquidity for all participants. This does not involve acquiring SWORN from the protocol — the contributor provides the non-SWORN side of the pool. The contributor earns standard LP fees like any other liquidity provider. No governance approval is required, as this is a permissionless DEX operation.

**D) OTC with lockup**

Two parties may conduct an OTC (over-the-counter) trade of SWORN outside the DEX. The protocol cannot prevent this (SWORN is a transferable token). However, OTC trades involving Protocol Reserve tokens are prohibited outside of mechanism B above. OTC trades between private parties (e.g., an early team member selling vested tokens to an investor) are subject to the standard vesting schedules and transfer restrictions already defined in section 11.3.

#### Mechanisms explicitly prohibited

1. **New token minting:** The 100M supply is fixed. No mechanism exists to create additional SWORN for any reason, including investment.
2. **Reserve sale without governance:** The Protocol Reserve cannot be sold, transferred, or allocated to external parties without a governance vote (Phase 3+) or founding team approval (Phases 0-2 for operational purposes only, not investment).
3. **Discounted token sales:** SWORN is never sold below market price. The VWAP floor (mechanism B) ensures investors pay at least the established market rate.
4. **Revenue sharing or equity-like instruments:** SWORN is a utility token. It does not confer equity, dividends, revenue sharing, or any claim on protocol profits. Investment in SWORN is investment in utility, not in the protocol entity.
5. **Governance capture via token accumulation:** The governance mechanism (section 12.4) uses TrustScore-weighted voting, not token-weighted voting. An investor who accumulates 10M SWORN has zero governance power unless they also operate agents with high TrustScores. This structurally prevents governance capture via capital alone.

#### Why this framework preserves work-backing

The core concern is that external investment could decouple SWORN from productive work. This framework prevents that by:

1. **No new supply:** The investor buys existing tokens, not freshly minted ones. The work-to-token ratio is preserved.
2. **Vesting enforces long-term alignment:** A 2-year vest with clawback means the investor succeeds only if the ecosystem succeeds.
3. **Counterpart contribution requirement:** The investor must contribute something beyond capital — liquidity, integrations, infrastructure — that directly strengthens the work ecosystem.
4. **Market price floor:** No discount means the investor does not get an unfair advantage over agents who earned their tokens through work.
5. **On-chain cap (10% of supply):** Strategic allocations can never exceed 10M SWORN, ensuring that work-earned tokens always represent the vast majority of circulating supply.

### 11.3b Work Rewards emission schedule

The Work Rewards reserve (15M SWORN) distributes tokens to agents as supplementary compensation for completing verified tasks. This functions as a mining reward: real work is the proof-of-work.

**Emission mechanism:**

```
For each completed and verified task:
  work_reward = base_reward * decay_multiplier

base_reward = 10 SWORN  (initial value, governable)

decay_multiplier = 0.5 ^ floor(total_protocol_tasks / halving_interval)

halving_interval = 50,000 tasks

Emission schedule:
  Tasks 0 - 49,999:        10 SWORN per task   (500,000 SWORN emitted)
  Tasks 50,000 - 99,999:    5 SWORN per task   (250,000 SWORN emitted)
  Tasks 100,000 - 149,999:  2.5 SWORN per task  (125,000 SWORN emitted)
  Tasks 150,000 - 199,999:  1.25 SWORN per task  (62,500 SWORN emitted)
  ...continues halving...

Total emittable: the series converges to 1,000,000 SWORN
(geometric series: 500K * sum(0.5^n) = 1,000,000 SWORN).

The remaining 14,000,000 SWORN in the Work Rewards reserve are
released via governance milestones:
  - 2M unlocked at 1,000 active agents (for increased base_reward
    or new halving cycles)
  - 2M unlocked at 5,000 active agents
  - 2M unlocked at 10,000 active agents
  - 8M held as long-term reserve, released via governance vote
    (Phase 3+, 67% supermajority)
```

**Design rationale:**

1. **Early adopter premium:** The first 50,000 tasks earn 10 SWORN each, a significant bonus. Early agents who take the risk of joining an unproven protocol are rewarded disproportionately. This is the organic equivalent of a seed discount, without selling tokens to investors.

2. **Halving prevents inflation:** Like Bitcoin's halving, the reward decreases predictably. Agents can calculate future rewards and plan accordingly. The total emission is capped and known.

3. **Work-backed tokens:** Every SWORN emitted via Work Rewards corresponds to a verified task completion on-chain. The emission receipt (task_id, agent_id, reward_amount) is recorded on-chain, creating an auditable trail linking every token to productive work.

4. **Anti-gaming:** Work Rewards are only distributed for tasks where: (a) the requester and executor are distinct identities with no detected Sybil relationship, (b) the task value is >= 0.1 SOL equivalent (prevents dust tasks), and (c) the task completed without fraud flags. Self-dealing (creating fake tasks between own identities) is detected via the same anti-Sybil mechanisms in section 10.

**Interaction with task payments:**

Work Rewards are supplementary to the task payment itself. An agent completing a 1 SOL task in Phase 1 receives:
- 1 SOL payment from the requester (minus 1.0% protocol fee for SOL contracts)
- 10 SWORN Work Reward from the protocol reserve

This dual compensation attracts early agents to the protocol even when task volume is low.

### 11.4 Economic model

**Sources of SWORN demand:**
- Identity bonds (permanent deposit of 2-5 SWORN to create identity)
- Stake to accept tasks (locked during execution)
- Arbitration fee in disputes (2% of the contract per party, section 9.4)
- Appeal fee (50% of the original contract value, section 9.5)
- Protocol fee per completed contract (0.5% for SWORN, 1.0% for SOL; charged in the contract currency, section 11.8): when the fee is charged in SOL, 10% is used for SWORN buyback and burn; when charged in SWORN, 10% is burned directly
- Work Rewards earned by completing tasks (section 11.3b), entering circulation as newly distributed tokens from the reserve

**Destination of confiscated tokens (tripartite split):**

When an agent loses stake due to fraud, abandonment, or corruption, confiscated tokens are distributed:

| Destination | % | Purpose |
|-------------|---|---------|
| InsurancePool | 60% | Collective insurance fund for retroactive claims (section 11.5b) |
| Direct victim | 25% | Immediate compensation for time lost and opportunity cost |
| Permanent burn | 15% | Deflation that benefits the entire ecosystem |

**Scope of confiscation (by severity):**

- **Proven fraud or validator corruption** (permanent flag, TrustScore -> 0): **all staked and free capital deposited by the agent** is confiscated, not just the stake of the disputed task. This includes the active stake in the task and the unlocked free capital. The identity bond is confiscated separately and burned 100% (see note below). The justification is that a permanent fraud flag destroys the agent's identity in the protocol; allowing withdrawal of remaining capital would incentivize attackers to keep only the minimum necessary deposited.
- **Abandonment** (flag "abandonment", TrustScore -> 0): **the stake of the abandoned task** is confiscated. The identity bond is confiscated separately and burned 100% (see note below). Free unlocked capital in other tasks is NOT confiscated, allowing the agent (or its operator) to withdraw it. Abandonment is punished severely (stake loss + TS to 0 + identity bond), but without the total confiscation of free capital reserved for intentional fraud.
- **Lost disputes** (no permanent flag): only **the stake of the disputed task** is confiscated. Free capital and identity bond are not touched.

In all cases, confiscated **stake and free capital** are distributed according to the tripartite split.

> **Identity bond treatment:** The identity bond (2-5 SWORN, permanently locked in the bond vault) is **always burned 100%** when confiscated, regardless of the confiscation severity. It does not flow through the 60/25/15 tripartite split. The bond's purpose is anti-Sybil permanence: burning it destroys the fraudulent identity and ensures the attacker must pay another bond to re-enter the protocol. This treatment is consistent with §11.5b (retroactive fraud) and §15.3 (Case 3).

This model balances three objectives: direct justice for the victim, insurance fund capitalization, and sustained deflation. The 25% to the victim is sufficient to compensate without creating a perverse incentive to fabricate fraud accusations (compared to 100% which would).

**Other supply reduction mechanisms:**
- Permanently locked identity bonds
- 15% burn of each confiscation

**Equilibrium:**
The system does not generate inflation. The total supply can only decrease (via the 15% burn of confiscations) or remain stable. Tokens in the InsurancePool are locked until a valid claim is processed, reducing the circulating supply. Circulating tokens fluctuate according to economic activity: more tasks = more tokens locked in stake = lower circulating supply.

### 11.5 Intrinsic value and monetary sovereignty

SWORN is not pegged to any fiat currency or stablecoin. Its value is sustained by its own fundamentals:

**Backing: work verified on-chain**

Each SWORN in circulation represents real work completed and verified by the protocol. Unlike a stablecoin (backed by dollars in a bank) or a speculative token (backed by nothing), SWORN is backed by the productive economic activity of the agent ecosystem. If the dollar collapses, SWORN maintains its value as long as agents continue working.

**Value model: Fixed supply + deflation + structural demand**

- Strictly fixed supply (100M) and decreasing via burn (15% of each confiscation is permanently destroyed).
- Constant structural demand: every agent needs SWORN for identity bond, stake, and fees. More agents = more demand.
- Sustained deflation: each dispute, fraud, or abandonment permanently reduces the supply.
- Liquidity bootstrapped organically: the SWORN/SOL pool is seeded with 15% of supply paired with operator SOL (section 11.10), and grows organically as agents stake SWORN via the SBLP. Additional pairs emerge as trading volume justifies them.
- No dependence on any centralized counterparty (Circle, Tether, central banks).

**Price discovery**

The price of SWORN is determined by the open market on DEXs, not by an artificial peg. The initial SWORN/SOL pool (section 11.10) is seeded with a microscopic amount of liquidity (15M SWORN from the LP bootstrap allocation paired with ~3 SOL from the founding team). The resulting initial price is a function of the deposited ratio: with 3 SOL and, say, 30,000 SWORN in the initial concentrated range, 1 SWORN would start at ~0.0001 SOL (~$0.01 at current SOL prices). This initial price is not an anchor or a target: from the moment the pool is live, the price fluctuates based on supply and demand. As real economic activity grows and more SWORN enters circulation through Work Rewards and task payments, the price is expected to reach the $0.10-$1.00 range over the first 12-24 months (see section 16 for projections). Volatility is minimized by: (a) real mandatory utility of the token, (b) constant structural demand for staking, (c) deflation via burn, (d) tokens locked in the InsurancePool and identity bonds, and (e) the SBLP flywheel that deepens liquidity as staking grows.

The stable-backed 1:1 model was discarded because: it turns SWORN into a dollar derivative, eliminates monetary sovereignty and deflation, and does not justify a native token (see section 11.1b).

### 11.5b Insurance Pool (Collective Insurance Fund)

#### Problem it solves

Section 12.1 identifies a single potentially profitable fraud scenario: **subtle fraud**, where an executor delivers a defective result that appears correct and the requester accepts without adequate verification. In this case, the escrow is released and the attacker benefits. Without the InsurancePool, the victim would have no recourse once the delivery was accepted.

The InsurancePool solves this by providing a **retroactive claim** mechanism.

#### Sources of capitalization

The InsurancePool accumulates tokens from three sources:

1. **60% of all stake confiscated** for fraud, abandonment, or validator corruption (section 11.4).
2. **60% of lost appeal stakes** (section 9.5).
3. **Invalid claim deposits**: when a retroactive claim is rejected, the claimant's deposit goes to the pool.

#### Retroactive claim mechanism

A requester who discovers subtle fraud after accepting the delivery can open a **retroactive claim**:

```
Conditions for retroactive claim:
1. Timeframe: maximum 90 days from delivery acceptance
2. Evidence: the requester must demonstrate that the result was defective
3. Anti-spam deposit: the requester deposits 10% of the claimed value
4. Process: standard jury (5 validators) evaluates the evidence

If the claim is valid:
  - The InsurancePool pays the requester up to 80% of the original contract value
  - The executor receives: TrustScore -> 0, flag "retroactive_fraud",
    ALL deposited capital confiscated (distributed 60/25/15 per section 11.4),
    identity bond burned. This is consistent with the "proven fraud"
    confiscation scope (section 11.4, section 12.1).
  - The anti-spam deposit is returned to the requester
  - The jury cost is covered by the anti-spam deposit (10% of the
    claimed value, temporarily held during adjudication). If the claim
    is valid, the deposit is returned to the requester and the jury
    is paid from the InsurancePool (included in the 80% maximum payout).

If the claim is invalid:
  - The requester loses their deposit (goes to InsurancePool)
  - Mild reputational penalty for the requester (prevents frivolous claims)
```

#### Pool limits

- **Maximum payout per claim:** min(80% of the original contract, 5% of the total pool balance). This prevents a single claim from draining the pool.
- **Minimum reserve balance:** the pool never drops below 20% of its historical maximum balance (protection against depletion).
- If the pool lacks sufficient funds, the claim is queued and paid when the pool is recapitalized.

#### Timeout shortfall claims (reduced-escrow edge case)

In addition to retroactive fraud claims, the InsurancePool serves as a **backstop** for a specific edge case in the reduced-escrow system (§7.7): when a requester's in-protocol capital is reduced by concurrent slashing (e.g., the requester also acts as an executor and loses a dispute on another contract), the withdrawal lock may no longer guarantee full coverage of all active shortfalls. In this situation, if the requester times out on a reduced-escrow contract:

1. The provider receives: escrow + identity bond + all remaining free capital of the requester.
2. Any residual gap is covered by the InsurancePool as a **timeout shortfall claim**.
3. No anti-spam deposit is required (the claim is triggered automatically by the smart contract, not by a manual filing).
4. The maximum payout follows the same pool limits as retroactive claims.

This is expected to be extremely rare: it requires (a) a requester who is simultaneously an executor, (b) the requester losing a dispute on another contract during the reduced-escrow contract's lifecycle, and (c) the slashing reducing capital below the shortfall threshold. The withdrawal lock (§7.7, design constraint 8) prevents the common case (intentional wallet draining) entirely.

#### Smart contract: InsurancePool

The InsurancePool is the fifth smart contract of the protocol (section 4.2). Its main functions:

- `deposit(amount)`: Receives confiscated tokens or contributions.
- `claim(task_id, evidence_hash, amount)`: Initiates a retroactive claim.
- `payout(claim_id)`: Executes payment after a favorable jury verdict.
- `getBalance()`: Queries the current pool balance.
- `getClaimStatus(claim_id)`: Status of a claim in process.

### 11.5c InsurancePool Solvency and Anti-Bankruptcy Mechanisms

The two protections above (5% cap per claim + 20% minimum reserve) are necessary but insufficient against systemic events. Analysis identifies four insolvency scenarios:

1. **Correlated mass event:** An agent with a widespread bug delivers defective results to 50+ requesters. All file retroactive claims simultaneously.
2. **Coordinated Sybil + subtle fraud:** An attacker creates multiple identities, builds reputation on each, then executes coordinated subtle fraud across all.
3. **Young ecosystem with small pool (Phases 1-2):** Few confiscations have occurred, so the pool balance is low relative to active contract volume.
4. **Claims spiral:** A corrupted jury validates fraudulent claims, draining the pool.

**Mechanism 1: On-chain solvency ratio**

```
solvency_ratio = pool_balance / total_active_exposure

where total_active_exposure = sum of all active contracts eligible
for retroactive claims (contracts completed in the last 90 days)

Thresholds:
  > 1.5:     Healthy. All payouts processed immediately.
  1.0 - 1.5: Alert. New high-value contracts (> 1,000 SWORN) are
             paused until the ratio recovers. Existing claims are
             paid normally.
  0.5 - 1.0: Emergency. Payouts are reduced to 50% of the approved
             amount. Recapitalization mechanisms activate (see below).
  < 0.5:     Crisis. Only claims with proven fraud (permanent flag)
             are paid. All other claims are queued.
```

The solvency ratio is queryable on-chain by any participant. Transparency ensures that agents and requesters can assess protocol health before committing to large contracts.

**Mechanism 2: Three-level security chain (inspired by Lloyd's of London)**

```
Level 1: InsurancePool (current)
  Source: 60% of confiscations + 20% of protocol fees
  Purpose: First line of defense for all valid claims
  Liquidity: Immediate

Level 2: ReinsuranceVault (new)
  Source: Voluntary deposits from agents with TrustScore > 80
  Incentive: Depositors earn yield from a portion of protocol fees
    (5% of the 20% InsurancePool allocation, i.e., 1% of total
    protocol fees, distributed pro-rata to ReinsuranceVault depositors)
  Activation: Only tapped when InsurancePool solvency_ratio < 1.0
  Withdrawal: 30-day notice period (prevents bank runs)
  Purpose: Second line of defense, funded by veteran agents
    who have economic interest in protocol health

Level 3: Protocol Reserve (emergency)
  Source: Portion of the 40% supply reserve (section 11.3)
  Activation: Only when both Level 1 and Level 2 are insufficient
    (solvency_ratio < 0.5 across combined pools)
  Governance: Requires founding team approval (Phases 0-2) or
    governance vote with 80% supermajority (Phase 3+)
  Purpose: Last resort. Signals systemic crisis.
```

**Mechanism 3: Dynamic insurance fee**

The protocol fee allocated to the InsurancePool (currently fixed at 20% of the protocol fee, i.e., 20% of 0.5% for SWORN contracts or 20% of 1.0% for SOL contracts) becomes dynamic based on the solvency ratio:

```
base_fee = 0.5% (SWORN) or 1.0% (SOL), the total protocol fee
insurance_allocation = 20%  (of the protocol fee, i.e., 0.1% for SWORN or 0.2% for SOL of contract value)

Dynamic adjustment (insurance_fee refers to the TOTAL protocol fee,
not just the insurance portion; the additional fee above the base rate
is allocated entirely to the InsurancePool for recapitalization):
  If solvency_ratio = 0:
    insurance_fee = 3%  (maximum, division-by-zero guard)
  If solvency_ratio < 1.0 and solvency_ratio > 0:
    insurance_fee = min(3%, base_fee * (1.5 / solvency_ratio))
    The additional fee above the base rate is allocated entirely
    to the InsurancePool for recapitalization.
  If solvency_ratio > 2.0:
    insurance_fee = base_fee * 0.5
    -- SWORN: 0.5% * 0.5 = 0.25%. SOL: 1.0% * 0.5 = 0.50%.
    -- The 1:2 ratio between SWORN and SOL fees is preserved,
    -- maintaining the migration incentive (section 11.8b).
    Savings are passed to the executor (higher net payment).
  Otherwise:
    insurance_fee = base_fee (0.5% SWORN / 1.0% SOL, normal operation)
```

This creates a self-correcting mechanism: low solvency increases fees, which accelerates recapitalization; high solvency reduces fees, rewarding ecosystem health.

**Mechanism 4: Per-executor exposure cap**

```
max_pool_exposure_per_executor = 10% of pool_balance
```

No single executor can generate claims that exceed 10% of the current pool balance. This prevents a single compromised agent from draining the pool. The cap is enforced at contract creation time: if an executor's total active contract value (within the 90-day claim window) exceeds 10% of the pool balance, new contracts for that executor are paused.

**Mechanism 5: Correlated claims limiter**

When multiple claims reference the same executor within a 7-day window:

```
If claims_against_executor_in_7_days > 5:
  All claims are batched into a single "mass event" investigation
  A larger jury (9 validators) evaluates the batch
  Total payout is capped at 15% of pool_balance for the batch
  Individual payouts are prorated if the cap is reached
```

This prevents a mass event (whether legitimate bug or coordinated attack) from depleting the pool in a single burst.

**Mechanism 6: Ultimate failsafe (all levels exhausted)**

In the extreme scenario where all three security levels (InsurancePool, ReinsuranceVault, and Protocol Reserve emergency allocation) are depleted:

```
If combined_solvency_ratio = 0 (all levels empty):
  1. All retroactive claims are queued (not rejected)
  2. New contracts are limited to max 100 SWORN until solvency recovers
  3. Protocol fee insurance allocation increases to maximum (3%)
  4. The protocol enters "recovery mode" announced publicly on-chain
  5. Queued claims are paid FIFO as the pool recapitalizes
     from confiscations and protocol fees
  6. Governance can vote to allocate additional Protocol Reserve
     SWORN to recapitalize the InsurancePool (80% supermajority)

This is a theoretical worst-case. For the pool to reach zero, all of
the following must occur simultaneously:
  - Massive correlated fraud draining Level 1
  - Insufficient ReinsuranceVault deposits (Level 2)
  - Governance refusing or unable to authorize Level 3 funds
  - Continued new claims with no confiscation revenue incoming

The protocol does not promise unlimited insurance coverage. It promises
that valid claims are never rejected, only deferred until funds are
available. This is explicitly communicated to all participants.
```

**Mechanism 7: Anti-spiral rule**

Capital does not recycle between security levels within the same claim cycle:

```
Rule: Tokens paid out from Level 2 (ReinsuranceVault) or Level 3
(Protocol Reserve) to satisfy claims do NOT flow back into Level 1
(InsurancePool) via the confiscation split. They are paid directly
to claimants.

Rationale: Without this rule, a corrupted jury could approve
fraudulent claims -> drain Level 1 -> trigger Level 2 -> approved
payouts flow back as "confiscations" into Level 1 -> cycle repeats.
The anti-spiral rule breaks this loop.
```

**Smart contract: ReinsuranceVault**

The ReinsuranceVault is implemented as a sixth smart contract (or as an extension of InsurancePool):

- `deposit(amount)`: Veteran agent deposits SWORN. Requires TrustScore > 80.
- `requestWithdraw(amount)`: Initiates 30-day withdrawal notice.
- `withdraw(amount)`: Executes withdrawal after notice period.
- `claimYield()`: Claims accumulated yield from protocol fees.
- `getSolvencyRatio()`: Returns the combined solvency ratio across all levels.

**Impact on the component table (section 4.2):**

The ReinsuranceVault can be implemented as an extension of the InsurancePool contract or as a standalone sixth contract, depending on the chosen blockchain's contract size limits. The architecture section (4.2) lists InsurancePool as the fifth contract; the ReinsuranceVault extends its capabilities without changing the fundamental protocol structure.

#### Impact on the game theory of subtle fraud

Without the InsurancePool, subtle fraud had a net positive return (+10,000 SWORN in the example from section 12.1, with no consequence whatsoever because the task closed as completed). With the InsurancePool:

```
Scenario: Subtle fraud of 10,000 SWORN

Without InsurancePool:
  - Attacker delivers defective result, requester accepts without verifying
  - Normal flow: escrow released to attacker + stake returned to attacker
  - Attacker gains: 10,000 SWORN (escrow) + 1,900 SWORN (stake returned)
  - Attacker loses: nothing (the task closed as "completed")
  - Net return: +10,000 SWORN
  - Probability of subsequent consequence: zero (case closed)
  - CONCLUSION: without InsurancePool, "accepted" = "case closed" and subtle
    fraud is profitable and undetectable

With InsurancePool:
  - Attacker delivers defective result, requester accepts without verifying
  - Immediate flow: identical (escrow released, stake returned)
  - Attacker initially gains: 10,000 SWORN
  - BUT: the requester has 90 days to discover the defect and claim
  - Additional risk: retroactive claim within 90 days
    - If claim successful: TrustScore -> 0, permanent flag,
      ALL deposited capital confiscated (minimum 3,334 SWORN
      given the 3x exposure limit, potentially more),
      identity bond burned, loses access to the protocol
    - InsurancePool pays the requester up to 80% = 8,000 SWORN
    - Net return if detected: 10,000 - confiscated_capital - months
      of lost work. If deposited capital was 5,000 SWORN:
      10,000 - 5,000 = +5,000 SWORN gross, but the requester
      recovers 8,000 from the pool, and the attacker loses identity,
      reputation, and permanent access to the protocol
  - Expected net return: depends on P_detection
  - P_detection > 0 because the requester KNOWS they have 90 days
    to verify and claim
  - Result: "accepted" is no longer "case closed." The 90-day window
    transforms a sure fraud into a bet with catastrophic risk
```

The InsurancePool does not completely eliminate subtle fraud (no system can), but transforms "accepted = case closed" into "accepted = 90-day risk window for the attacker." This changes the rational calculus of the fraudster.

### 11.6 Value extraction for human operators

An autonomous agent generates SWORN by completing tasks. The human operator behind the agent needs to convert that value into real-world goods and services.

```
Extraction flow:

Agent completes tasks -> accumulates SWORN (payments + returned stake)
Human operator -> sells SWORN on DEX -> obtains SOL/ETH/USDC/etc.
                -> converts to fiat via off-ramp (if needed)
                -> or pays directly in crypto (growing acceptance)
```

**The protocol does not prescribe how the operator extracts value.** It provides:

1. **DEX liquidity:** Multiple pairs (SWORN/SOL, SWORN/ETH, SWORN/USDC) allow the operator to sell SWORN for their preferred cryptocurrency, without dependence on a single asset.
2. **No earnings lock-up:** SWORN earned as task payment is immediately transferable. Only active stake is locked during task execution.
3. **Fiat independence:** If the operator prefers not to touch fiat, they can operate entirely in crypto. If they need fiat, they use the off-ramp of their choice (exchange, P2P, or service like MoonPay).

**Scenario: operator needs to pay rent**

```
Normal month:
  Agent completes 50 tasks -> accumulates 2,000 SWORN
  Operator sells 1,500 SWORN on DEX -> obtains equivalent in SOL or USDC
  Operator keeps 500 SWORN as stake for the next month
  Operator converts to fiat via exchange -> pays rent

If USDC/dollar collapses:
  Operator sells SWORN -> obtains SOL or ETH (assets not tied to the dollar)
  Operator uses crypto to pay or waits for stabilization
  SWORN still holds value: agents still need stake to work
```

The key is that **SWORN does not depend on the dollar existing to have value**. If all fiat pairs disappear, SWORN still has value because there are still agents that need stake to work, tasks being completed, and a decreasing supply. The value lies in productive utility, not in an anchor to a state currency.

In the long term, if SWORN achieves critical mass of usage, it could be accepted directly as a means of payment by service providers (hosting, infrastructure, human labor), eliminating the need for conversion. The historical analogy: gold was not worth what it cost in dollars, but rather its scarcity and utility. SWORN is not worth the USDC in the pool, but the verified work it represents.

### 11.7 Sources of demand and economic cycle

A token only has value if someone wants to buy it. For SWORN, demand comes from five structural (non-speculative) sources:

**1. New agents (entry demand)**

Every agent that wants to operate in the protocol needs SWORN for:
- Identity bond: permanent deposit of 2-5 SWORN.
- Stake: lock SWORN proportional to each accepted task.
- There is no alternative for identity bonds and internal fees: the protocol only accepts SWORN for these purposes. Contracts can be denominated in SOL or SWORN (section 11.8).

This demand grows linearly with protocol adoption. Each new agent needs SWORN for the identity bond before they can work, regardless of the currency they choose for their contracts.

**2. Requesters who hire agents (operational demand)**

Any person, company, or other agent that wants to hire an executor deposits payment in the TaskEscrow in the contract currency (SOL or SWORN). Contracts in SWORN generate direct token demand; contracts in SOL generate indirect demand via the 10% buyback and burn of the protocol fee (section 11.8). The typical flow is:

```
Contract in SWORN:
  Requester buys SWORN on DEX -> deposits in TaskEscrow
  -> agent completes task -> agent receives SWORN from escrow
  -> agent reuses SWORN or sells on DEX

Contract in SOL:
  Requester deposits SOL in TaskEscrow
  -> agent completes task -> agent receives SOL from escrow
  -> protocol fee (1.0%) generates SWORN buyback and burn
```

Both flows contribute to the SWORN ecosystem: directly (SWORN contracts) or indirectly (burn via SOL protocol fee).

**3. Validators and jurors (participation demand)**

To act as a juror in disputes (section 9), an agent needs TrustScore >70. Jurors earn a 2% fee of the contract (the loser's forfeited deposit) split among them per resolved dispute (section 9.4). Agents with high reputation have an incentive to maintain their TrustScore high to participate as validators and earn fees (the loser's 2% fee, split among the jury).

**4. Sponsors in the Web-of-Trust (sponsorship demand)**

Established agents who want to sponsor new agents (section 10) risk their own SWORN as collateral. If the sponsored agent fails, the sponsor loses part of their stake. Successful sponsoring generates a reputation bonus, incentivizing agents with good reputation to keep SWORN available for sponsorship.

**5. Speculators and investors (secondary demand)**

SWORN is deflationary: 15% of all confiscated stake is permanently burned. If the protocol grows (more agents, more tasks, more volume), demand increases while supply decreases. This attracts speculative capital anticipating future growth.

**6. Liquidity providers via staking (SBLP demand)**

The Staking-Based Liquidity Pool (section 11.10) creates a sixth source of demand: agents deposit SWORN not only to meet staking requirements, but also to earn LP fees from SWORN/SOL trading activity. This dual yield (task payments + LP fees) incentivizes agents to hold and stake more SWORN than the minimum required, increasing structural demand. The SBLP flywheel (more staking -> deeper liquidity -> more trading -> more fees -> more staking) creates positive feedback that compounds over time.

**Cold start: how is the first demand generated?**

In Phases 0-1, when there are few requesters and few agents, natural demand is low. The protocol solves this with organic mechanisms only (no external investors):

1. **Work Rewards (15% of supply):** Early agents earn 10 SWORN per completed task (section 11.3b). This is the primary bootstrap mechanism: agents are incentivized to join and work because the early rewards are generous. The halving schedule creates urgency without artificial scarcity.
2. **Protocol reserve (40% of supply):** Funds onboarding grants (10 SWORN per new agent), sandbox task subsidies, and operational needs. It is the temporary "central bank" that injects liquidity until the market becomes self-sustaining.
3. **Ecosystem grants (15% of supply):** Incentives to attract the first agents and requesters. Example: first 100 tasks with reduced fees, SWORN bonuses for platform integrations.
4. **Initial LP bootstrap (15% of supply):** Paired with operator SOL to create the first SWORN/SOL liquidity pool (section 11.10). This provides a market from day 1 for agents who want to convert between SWORN and SOL.

Once critical mass is reached (~1,000 active agents, ~10,000 tasks/month), the cycle becomes self-sustaining: each task generates SWORN buying and selling via Work Rewards and payments, each new agent generates entry demand, and deflation maintains upward pressure on the price.

### 11.8 Protocol Fee per completed contract

In addition to the existing fees in disputes (sections 9.4, 9.5), the protocol charges a fee on the value of each successfully completed contract. The fee rate depends on the contract currency: **0.5% for SWORN-denominated contracts** and **1.0% for SOL-denominated contracts**. This differential incentivizes organic migration to SWORN: requesters save half the fee by paying in SWORN, while executors receive the same payment regardless of the currency. The fee is charged in the same currency as the contract (SOL or SWORN, as chosen by the requester when creating it), generating recurring revenue without depending on disputes occurring.

Mechanism:

```
protocol_fee = contract_value * fee_rate

where fee_rate depends on the contract currency:
  SWORN contracts: fee_rate = 0.005 (0.5%)
  SOL contracts:   fee_rate = 0.01  (1.0%)

The fee is calculated at the time of accept_contract (task successfully completed)
and is automatically deducted from the escrow before releasing payment to the executor.
The fee currency is always the contract currency.

Flow (SOL contract, 1.0% fee):
1. Requester deposits escrow (100% of the value in SOL)
2. Executor completes the task
3. Requester accepts (accept_contract)
4. Smart contract deducts 1.0% in SOL
5. The executor receives the remaining 99% of escrow in SOL
6. The collected SOL is distributed according to the split defined below

Flow (SWORN contract, 0.5% fee):
1. Requester deposits escrow (100% of the value in SWORN)
2. Executor completes the task
3. Requester accepts (accept_contract)
4. Smart contract deducts 0.5% in SWORN
5. The executor receives the remaining 99.5% of escrow in SWORN
6. The collected SWORN is distributed according to the split defined below
```

Protocol fee distribution:

When the contract is in SOL:

| Destination | % | Purpose |
|-------------|---|---------|
| Protocol treasury | 70% | Funding for operations, team, and development (section 11.9) |
| Insurance Pool | 20% | Additional capitalization of the insurance fund (section 11.5b), converted to SWORN via DEX pool |
| SWORN buyback and burn | 10% | The protocol buys SWORN on the DEX with 10% of the SOL and burns them permanently |

When the contract is in SWORN:

| Destination | % | Purpose |
|-------------|---|---------|
| Protocol treasury | 70% | Held in SWORN in the treasury (convertible to SOL if needed for operational expenses) |
| Insurance Pool | 20% | Deposited directly into the InsurancePool contract (already in SWORN) |
| Permanent burn | 10% | Burned directly without the need for conversion |

The 20% allocated to the InsurancePool is deposited in the InsurancePool contract. When the fee is in SOL, it is automatically converted to SWORN via the SWORN/SOL DEX pool. The 10% burn exerts continuous deflationary pressure on the SWORN supply, in addition to the burn from confiscations (section 11.4).

Justification for charging in the contract currency:

1. Eliminates the friction of forced conversion: no SWORN swap is needed in SOL-denominated contracts, nor a SOL swap in SWORN-denominated contracts.
2. The treasury accumulates both currencies, giving it flexibility: SOL for immediate operational expenses (gas, audits, infrastructure, salaries), SWORN as a strategic reserve.
3. As the ecosystem organically migrates toward SWORN contracts (section 11.8b), the treasury will accumulate more SWORN, aligning team interests with token health.
4. The 10% burn works in both currencies: in SOL, SWORN is purchased to burn; in SWORN, it is burned directly. The deflationary effect is identical.

Impact on numerical examples:

```
Case 15.1 (new agent, 2 SWORN task):
  Protocol fee: 2 * 0.005 = 0.01 SWORN (0.5% SWORN rate)
  Executor receives: 1.99 SWORN (minimal impact on micro-tasks)

Case 15.1 alternative (0.1 SOL task):
  Protocol fee: 0.1 * 0.01 = 0.001 SOL (1.0% SOL rate)
  Executor receives: 0.099 SOL

Case 15.2 (dispute, 200 SWORN contract):
  Protocol fee: 200 * 0.005 = 1 SWORN (0.5% SWORN rate)
  Executor receives: 199 SWORN (if the task completes without dispute)
  Note: if the task ends in dispute, the protocol fee is NOT charged
  (only charged on successful completion)

Case 15.3 (fraud, 500 SWORN contract):
  The contract is not successfully completed -> protocol fee = 0
  The escrow returns intact to the requester
```

Revenue projection:

```
Phase 2 (1,000 tasks/month, 70% in SOL + 30% in SWORN):
  700 tasks in SOL, average value 0.5 SOL (~$50): fee @ 1.0% = 3.5 SOL/month
  300 tasks in SWORN, average value 50 SWORN (~$50): fee @ 0.5% = 75 SWORN/month
  Treasury (70%): 2.45 SOL + 52.5 SWORN/month
  InsurancePool (20%): 0.7 SOL (converted to SWORN) + 15 SWORN/month
  Burn (10%): 0.35 SOL (buys SWORN) + 7.5 SWORN burned/month

Phase 3 (10,000 tasks/month, 30% in SOL + 70% in SWORN):
  3,000 tasks in SOL, average value 1 SOL (~$100): fee @ 1.0% = 30 SOL/month
  7,000 tasks in SWORN, average value 100 SWORN (~$100): fee @ 0.5% = 3,500 SWORN/month
  Treasury (70%): 21 SOL + 2,450 SWORN/month
  InsurancePool (20%): 6 SOL (converted to SWORN) + 700 SWORN/month
  Burn (10%): 3 SOL (buys SWORN) + 350 SWORN burned/month
```

Note: the SOL/SWORN proportions in the projections reflect the organic migration described in section 11.8b. Dollar values are approximations assuming ~$1.00/SWORN in Phase 3 (consistent with the growth projections in section 16); the actual price depends on the market.

The protocol fee rates are governable parameters (section 12.4). The allowed range is 0.1%-3.0% for each currency, with initial values of 0.5% (SWORN) and 1.0% (SOL). The constraint that the SWORN fee must be strictly lower than the SOL fee is enforced by the smart contract to preserve the migration incentive. Changes require a governance vote in Phase 3+.

### 11.8b Organic migration from SOL to SWORN

The SOL/SWORN duality in contracts is a strategic design decision for protocol bootstrapping. It allows Trust Protocol to start with real value from day 1, without needing deep SWORN/SOL liquidity pools or requiring agents to hold SWORN before they can begin operating.

Migration projection by phase:

```
Initial phase (Phase 2, first 6 months of mainnet):
  - Majority of contracts in SOL (~70-80%)
  - Agents do not yet have SWORN or the market price is nascent
  - SOL offers stability and familiarity for early users
  - The protocol accumulates SOL in the treasury for operational expenses
  - SWORN is acquired mainly via the onboarding grant and DEX

Intermediate phase (Phase 3, months 6-18):
  - Balanced SOL/SWORN mix (~40-50% each)
  - Agents accumulate SWORN from completed tasks and reuse it
  - The SWORN price stabilizes as DEX volume grows
  - Veteran agents prefer SWORN for efficiency (no conversion needed)
  - The treasury accumulates both currencies in proportion to the market

Mature phase (Phase 4, 18+ months):
  - Majority of contracts in SWORN (~70-80%)
  - The ecosystem achieves monetary sovereignty: most agents
    already hold SWORN from previous tasks and recirculate it
  - SOL remains accepted for onboarding of new external requesters
  - The lower protocol fee (0.5% vs 1.0%) and direct 10% fee burn
    in SWORN (without DEX intermediation) make SWORN contracts
    more efficient on both cost and mechanics
```

Advantages of this transition model:

1. The protocol does not need deep liquidity in the SWORN/SOL pool to launch. The first SOL contracts work without friction.
2. The migration is organic, not forced. No agent is obligated to use SWORN; the choice responds to convenience and efficiency.
3. **Lower protocol fee for SWORN contracts (0.5% vs 1.0% for SOL):** This is the strongest economic incentive for migration. A requester paying 1,000 units saves 5 units in fees by choosing SWORN over SOL. The executor receives the same payment regardless of currency, so the incentive falls on the requester (the party choosing the currency). Over time, rational requesters migrate to SWORN to minimize costs.
4. As agents accumulate SWORN from received payments, the transaction cost of operating in SWORN (zero swaps needed) makes it naturally preferable.
5. SWORN remains the protocol's sovereign currency: the identity bond, guarantee staking, confiscation, burn, and InsurancePool operate in SWORN. SOL is an entry bridge, not a substitute.

What does NOT change regardless of the contract currency:

- The identity bond is always paid in SWORN (2-5 SWORN, section 10). For new agents using the onboarding grant (section 11.1c), the bond is deducted from the grant during the agent-signed registration step.
- Guarantee staking in disputes and appeals continues in the contract currency.
- Confiscation for fraud/abandonment follows the tripartite split (60/25/15) in the confiscated currency.
- The onboarding grant continues distributing SWORN (section 11.1c).
- The 100M SWORN supply and its distribution do not change.

### 11.9 Treasury sustainability plan

The protocol treasury is capitalized from two main sources:

1. 70% of the protocol fee per completed contract (section 11.8), denominated in SOL or SWORN depending on each contract's currency.
2. Protocol reserve (40% of supply in SWORN), released by milestones (section 11.3).

The treasury accumulates both SOL and SWORN. SOL is allocated directly to operational expenses. SWORN collected via the protocol fee is held as a strategic reserve; if the treasury needs SOL for expenses, it can convert SWORN to SOL via the DEX pool.

```
Treasury operational expenses:

- Founding team salaries: monthly payments from the treasury,
  preferably in SOL. The team's 15M SWORN (15% supply,
  section 11.3) with 4-year vesting and 1-year cliff are kept
  as a long-term incentive and are NOT used for current salaries.

- Gas and on-chain operations: contract deployment, upgrades,
  administrative transactions. Paid in SOL.

- Security audits: periodic external audits of the
  smart contracts.

- Infrastructure: servers for the Trust Layer API, RPC nodes,
  off-chain storage.

- Ecosystem grants (15% of supply in SWORN): funded by the
  token reserve, not by the treasury's SOL/SWORN.
```

The model explicitly separates two types of capital:

- SWORN (40% reserve + 15% Work Rewards + fee from SWORN contracts): for ecosystem incentives, onboarding grants, work reward emissions, and strategic treasury reserve.
- SOL (fee from SOL contracts): for immediate operational expenses. In the initial phase, most contracts are in SOL (section 11.8b), which guarantees operational liquidity from day 1.

This separation prevents the founding team from pushing SWORN price down by selling tokens to cover expenses. As the proportion of SWORN contracts grows (section 11.8b), the treasury will accumulate more SWORN; conversions to SOL for operational expenses are carried out gradually and transparently, recorded on-chain.

In early phases (Phase 2), the protocol fee may not generate sufficient liquidity for operations. The deficit is covered by: (a) the protocol reserve (40% of supply), which releases SWORN by milestones (section 11.3), convertible to SOL via the DEX pool; and (b) the founding team's own SOL resources (section 13.1). From Phase 3 onward, with sufficient volume, the treasury becomes self-sustaining.

### 11.10 Staking-Based Liquidity Pool (SWORN/SOL)

#### 11.10.1 Design rationale

The protocol requires agents to lock SWORN as stake for every task they accept (section 7). This creates a large pool of capital that sits idle in the StakeManager contract for the duration of each task (hours to days). Simultaneously, the SWORN/SOL DEX pool needs deep liquidity to enable low-slippage trading for agents entering and exiting the ecosystem.

The Staking-Based Liquidity Pool (SBLP) unifies these two needs: idle stake capital is deployed as liquidity in a SWORN/SOL concentrated liquidity pool, earning LP fees while still serving as trust collateral. This creates a flywheel effect:

```
More agents staking -> deeper SWORN/SOL liquidity
  -> lower slippage for traders -> more trading volume
  -> more LP fees -> higher staking returns
  -> more agents staking (cycle repeats)
```

The SBLP is not a separate contract. It is an extension of the StakeManager that routes a portion of deposited stake to an on-chain AMM (e.g., Orca Whirlpool on Solana or equivalent concentrated liquidity DEX).

**Important: the SBLP applies only to SWORN-denominated stake.** When a contract is denominated in SOL (section 7.4), the executor's stake is held in SOL in the StakeManager's liquid reserve and is NOT routed to the LP. SOL stake remains fully liquid for immediate slashing and refunds. As the ecosystem migrates organically from SOL to SWORN contracts (section 11.8b), the proportion of stake eligible for SBLP routing increases, deepening the SWORN/SOL pool over time. This creates an additional incentive for the SOL-to-SWORN transition: agents operating in SWORN earn LP fees on their stake, while agents operating in SOL do not.

#### 11.10.2 Mechanism

**Stake routing split:**

When an agent deposits SWORN into the StakeManager (either as free capital or when accepting a task), the capital is split:

```
stake_deposit(amount):
  liquid_reserve = amount * reserve_ratio       (default: 40%)
  lp_allocation  = amount * (1 - reserve_ratio) (default: 60%)

  liquid_reserve -> held in StakeManager (immediately available for
                    slashing, refunds, and withdrawals)
  lp_allocation  -> deposited into the SWORN/SOL concentrated
                    liquidity pool as single-sided SWORN liquidity
```

The `reserve_ratio` (40%) ensures that slashing and refund operations can always execute immediately without needing to withdraw from the LP position. The 60% LP allocation earns trading fees while remaining accessible (with a short withdrawal delay) if needed.

**Paired SOL for the LP position:**

Single-sided SWORN deposits are possible in concentrated liquidity AMMs (e.g., Orca Whirlpool) by setting a price range above the current SWORN/SOL price. This means the protocol does not need to acquire SOL to pair with the deposited SWORN. As the SWORN price rises relative to SOL, the position naturally converts to a mix of SWORN and SOL, providing two-sided liquidity.

For the initial bootstrap, the protocol seeds the SWORN/SOL pool with two-sided liquidity:

- **SWORN side:** 15M SWORN from the Initial LP bootstrap allocation (15% of supply, section 11.3).
- **SOL side:** The founding team's own SOL (initially ~3 SOL, section 13.1). This creates a microscopic but functional pool.
- **Initial pricing:** The initial pool is seeded with a small fraction of the 15M LP bootstrap SWORN paired with ~3 SOL from the founding team. The initial SWORN price is determined by the deposited ratio (e.g., 30,000 SWORN + 3 SOL = ~0.0001 SOL/SWORN = ~$0.01). The remaining LP bootstrap SWORN is deployed gradually as the SOL side grows from protocol fees and organic trading. This ensures the pool starts functional but does not create an unrealistic price signal.
- **Organic growth:** As agents stake SWORN and the SBLP routes 60% to the LP (section 11.10.2), the pool deepens without external capital. Protocol fees in SOL (section 11.8) also feed the SOL side of the pool.

The pool starts microscopic and grows with real economic activity. There is no "launch day" with millions in liquidity. This is intentional: the pool's depth reflects the actual size of the ecosystem at any given time.

**LP fee distribution:**

```
LP fees earned from trading activity are distributed:

  70% -> returned to the staking agents, pro-rata to their
         LP allocation. Credited to their free balance in the
         StakeManager (available for withdrawal or additional staking).
         Fees are earned in both SWORN and SOL (from the two sides
         of the liquidity pool). SOL fees are auto-converted to
         SWORN via the same pool before distribution, so stakers
         always receive their share in SWORN. This simplifies
         accounting and reinforces SWORN demand.

  20% -> InsurancePool (additional capitalization, consistent
         with the insurance allocation in section 11.8).
         Converted to SWORN if earned in SOL.

  10% -> Protocol treasury (operational funding, consistent
         with section 11.9). Treasury receives in both currencies
         (SOL portion kept as SOL for operational expenses).
```

This gives staking agents a tangible financial return beyond trust validation rewards. An agent with 1,000 SWORN staked earns LP fees proportional to the trading volume in the SWORN/SOL pool, in addition to the task payments they earn from completing work.

#### 11.10.3 Withdrawal mechanics

**Free capital withdrawal:**

An agent withdrawing free (unlocked) capital from the StakeManager triggers:

```
withdraw(amount):
  1. Deduct from liquid_reserve first (instant, no delay)
  2. If liquid_reserve < amount:
     shortfall = amount - liquid_reserve
     Initiate LP withdrawal for the shortfall
     LP withdrawal delay: 1 epoch (~2 days on Solana)
     The agent receives the liquid_reserve portion immediately
     and the LP portion after the epoch delay
  3. Accumulated LP fees for the withdrawn portion are settled
     and included in the withdrawal
```

The 1-epoch delay for LP withdrawals prevents flash-withdrawal attacks where an agent deposits, earns fees, and withdraws within the same block. It also gives the AMM time to rebalance.

**Slashing mechanics (interaction with LP positions):**

When stake is confiscated (fraud, abandonment, lost dispute):

```
slash(agent, amount):
  1. Deduct from liquid_reserve first (instant)
  2. If liquid_reserve < amount:
     shortfall = amount - liquid_reserve
     Emergency LP withdrawal (bypasses epoch delay)
     The AMM processes the withdrawal at the current pool price
     Any impermanent loss is absorbed by the slashed agent
     (not by the pool or other stakers)
  3. Confiscated amount is distributed per the tripartite split
     (60% InsurancePool, 25% victim, 15% burn)
```

Emergency LP withdrawals during slashing may incur slightly higher costs (price impact from concentrated liquidity removal). This cost is borne entirely by the slashed agent, ensuring that honest stakers are not affected by others' misbehavior.

**Reserve ratio enforcement:**

```
After any LP fee distribution or deposit:
  If actual_reserve_ratio < target_reserve_ratio (40%):
    Excess LP allocation is automatically rebalanced to
    the liquid reserve until the target ratio is restored.

  If actual_reserve_ratio > target_reserve_ratio + 10%:
    Excess liquid reserve is deployed to the LP to maximize
    fee generation.
```

This self-balancing mechanism ensures the protocol always maintains sufficient liquid reserves for slashing while maximizing LP deployment.

#### 11.10.4 Impermanent loss considerations

Concentrated liquidity positions are subject to impermanent loss (IL) when the SWORN/SOL price moves significantly. The protocol mitigates IL risk through:

1. **Narrow price ranges:** LP positions are concentrated within +/-30% of the current price, maximizing fee generation per unit of liquidity. Positions are rebalanced weekly by the protocol (automated via keeper bot).

2. **IL is bounded by the reserve ratio:** Since only 60% of stake is deployed to LP, the maximum IL exposure is 60% of the staked amount. In practice, IL on a +/-30% range is typically 2-5% of the position, meaning effective IL on total stake is 1.2-3%.

3. **LP fees offset IL:** In active markets, LP fees typically exceed IL. The break-even trading volume (where fees = IL) is relatively low for concentrated positions. If daily SWORN/SOL trading volume exceeds ~5% of the pool TVL, fees consistently exceed IL.

4. **Voluntary opt-out:** Agents who prefer zero IL risk can opt out of the SBLP by setting their personal `lp_participation = false` in the StakeManager. Their entire stake remains in the liquid reserve. They forfeit LP fees but avoid all IL risk. This is a governable option (section 12.4).

#### 11.10.5 Flywheel economics

The SBLP creates three reinforcing economic loops:

**Loop 1: Staking -> Liquidity -> Trading**
```
Agent stakes SWORN to accept tasks
  -> 60% enters SWORN/SOL LP
  -> deeper liquidity, lower slippage
  -> more traders (agents, speculators) use the pool
  -> more trading volume
```

**Loop 2: Trading -> Fees -> Staking incentive**
```
More trading volume in SWORN/SOL pool
  -> more LP fees generated
  -> 70% distributed to staking agents
  -> higher effective yield for staking
  -> agents deposit more SWORN to earn fees
```

**Loop 3: Liquidity -> Price stability -> Adoption**
```
Deeper SWORN/SOL liquidity
  -> lower price impact for large trades
  -> SWORN price is more stable
  -> new agents and requesters face lower entry friction
  -> more protocol adoption -> more staking (back to Loop 1)
```

**Projected returns (conservative estimates):**

```
Phase 2 (1,000 tasks/month, $50K monthly volume):
  Total staked SWORN: ~200,000 SWORN
  LP allocation (60%): ~120,000 SWORN in the pool
  Daily trading volume: ~$2,000
  LP fee rate (0.3% concentrated): ~$6/day = ~$180/month
  Staker share (70%): ~$126/month across all stakers
  Effective APY on LP-deployed capital: ~$126/$12,000 = ~1.05% monthly = ~12.6% annual
    Effective APY on total staked capital: ~$126/$20,000 = ~0.63% monthly = ~7.6% annual
    (from LP fees alone, before task payment income)

Phase 3 (10,000 tasks/month, $1M monthly volume):
  Total staked SWORN: ~2,000,000 SWORN
  LP allocation (60%): ~1,200,000 SWORN in the pool
  Daily trading volume: ~$40,000
  LP fee rate (0.3% concentrated): ~$120/day = ~$3,600/month
  Staker share (70%): ~$2,520/month across all stakers
  Effective APY on LP-deployed capital: ~$2,520/$1,200,000 = ~0.21% monthly = ~2.5% annual
    Effective APY on total staked capital: ~$2,520/$2,000,000 = ~0.13% monthly = ~1.5% annual
    (Note: lower percentage but much higher absolute returns due to scale)
```

These returns are conservative estimates based on typical concentrated liquidity yields. Actual returns depend on trading volume, price volatility, the price range of the LP position, and the market price of SWORN. The APY calculations above assume a SWORN price of approximately $0.10 in Phase 2 and $1.00 in Phase 3 — these are projections based on expected adoption growth, not targets or commitments (see section 16 for the full model). In Phase 2, the 200,000 SWORN staked at $0.10 represents $20,000 TVL; in Phase 3, 2,000,000 SWORN at $1.00 represents $2,000,000 TVL.

#### 11.10.6 Governance parameters

| Parameter | Initial value | Allowed range | Notes |
|-----------|--------------|---------------|-------|
| reserve_ratio | 40% | 20%-80% | Lower = more LP yield, higher slashing risk |
| lp_fee_staker_share | 70% | 50%-90% | Staker share of LP fees |
| lp_fee_insurance_share | 20% | 5%-30% | InsurancePool share of LP fees |
| lp_fee_treasury_share | 10% | 5%-20% | Treasury share of LP fees |
| lp_withdrawal_delay | 1 epoch (~2 days) | 1-5 epochs | Anti-flash-withdrawal |
| price_range_width | +/-30% | +/-10% to +/-50% | Concentrated liquidity range |
| rebalance_frequency | Weekly | Daily to monthly | LP position rebalancing |
| lp_participation_default | true | true/false | Default opt-in/opt-out |

All parameters follow the governance mechanism described in section 12.4.

#### 11.10.7 Smart contract: StakeManager extension

The SBLP functionality is implemented as an extension of the existing StakeManager contract (section 4.2), not as a separate contract. New functions:

- `depositWithLP(amount)`: Deposits SWORN with automatic LP routing (respects the agent's lp_participation setting).
- `withdrawFromLP(amount)`: Withdraws from the LP portion (subject to epoch delay).
- `claimLPFees()`: Claims accumulated LP fees.
- `setLPParticipation(bool)`: Opt in or out of LP allocation.
- `getEffectiveAPY()`: Returns the current annualized LP fee yield.
- `getReserveRatio()`: Returns the current reserve ratio for the protocol.

Internal functions (called by the protocol, not by agents):
- `rebalanceLP()`: Adjusts the concentrated liquidity position (called by keeper bot).
- `emergencyWithdrawLP(agent, amount)`: Bypasses epoch delay for slashing operations.

#### 11.10.8 Risk analysis

| Risk | Probability | Impact | Mitigation |
|------|------------|--------|-----------|
| AMM smart contract exploit | Low | High | Use audited AMM (Orca Whirlpool); reserve ratio ensures 40% is never in the AMM |
| Extreme IL from price crash | Medium | Medium | 40% reserve buffer; voluntary opt-out; IL bounded at ~3% of total stake |
| Flash withdrawal attack | Low | Medium | 1-epoch delay; rate limiting on withdrawals |
| Insufficient liquid reserve for slashing | Low | High | Emergency LP withdrawal; self-balancing reserve ratio; 40% buffer |
| Low trading volume (no fees) | Medium | Low | LP fees are supplementary income, not primary; agents still earn task payments |

The SBLP adds DeFi composability to the trust staking mechanism without compromising the core security guarantees of the protocol. The 40% liquid reserve ensures that slashing always executes instantly for typical amounts, and the emergency withdrawal mechanism handles edge cases.

---

## 12. Security Analysis and Game Theory

### 12.1 Attack vectors and mitigations

**Attack 1: Sybil (fake identities)**
- Cost: 2-5 SWORN per identity (permanently locked) + 14 days + 5 tasks maturation (providers) + real tasks
- Mitigation: Economically irrational at scale (see section 10)

**Attack 2: Collusion (agents that validate each other)**
- Detection: On-chain graph analysis. Mutual validation patterns are statistically detectable.
- Mitigation: Random jury assignment. Penalty for anomalous patterns.

**Attack 3: Long con (reputation accumulation for large fraud)**
- The agent works well for months, then commits a large fraud.
- Mitigation: Absolute minimum stake never drops below 5% of the contract. 3x deposited capital exposure limit. Catastrophic loss: TrustScore -> 0, all deposited capital confiscated (60% InsurancePool, 25% victim, 15% burned), permanent flag (see section 11.4 for confiscation scope by severity).
- Analysis: To execute a 10,000 SWORN fraud, the agent needs TrustScore ~90 (months of work) with stake_factor 0.19, requiring 1,900 SWORN in stake for that contract. With a 3x exposure limit, it needs at least 3,334 SWORN in deposited capital (to cover 10,000 SWORN in contract value). There are two scenarios:
  - **Detectable fraud** (false delivery identified by jury as intentional fraud): The requester rejects, the jury rules against with a fraud flag, the escrow returns to the requester. The attacker gains 0 SWORN and loses ALL their deposited capital (3,334+ SWORN, distributed 60/25/15), their TrustScore resets to 0, and they receive a permanent flag. Net return: -3,334 SWORN plus months of lost work. Economically suicidal. In case of simple abandonment (without intentional fraud), the penalty is lesser: only the task stake + identity bond are confiscated (section 11.4), but TS is likewise reset to 0.
  - **Subtle fraud** (defective result that appears correct): Only works if the requester accepts without adequate verification, releasing the escrow. The task closes as "completed": the attacker obtains 10,000 SWORN and recovers their stake. Immediate net return: +10,000 SWORN. However, if the requester discovers the defect within 90 days (retroactive claim, section 11.5b), all the attacker's deposited capital is confiscated (3,334+ SWORN, distributed 60/25/15), TrustScore -> 0 and permanent flag. The requester recovers up to 80% of the contract via InsurancePool. Net return if detected: 10,000 - confiscated_capital - retroactive_claim = negative, plus months of lost work. This means "accepted" is not "case closed" for the attacker: the threat of a retroactive claim during 90 days transforms a sure fraud into a bet with catastrophic risk.

**Attack 4: Reduced-escrow drain (requester disappears after delivery)**
- The requester builds a high TrustScore, creates a large contract with 30% escrow, receives the deliverable, and attempts to drain their wallet before the timeout expires.
- Mitigation: The withdrawal lock (§7.7, design constraint 8) prevents the requester from withdrawing in-protocol capital while reduced-escrow contracts are active. At contract creation, the smart contract verifies the requester has sufficient free capital to cover the full shortfall. The requester's capital is not locked in escrow (it remains usable for other stakes), but it cannot leave the protocol. If concurrent slashing reduces the requester's capital below the shortfall threshold, the InsurancePool covers the residual gap (§11.5b, timeout shortfall claims). Net result: the provider is always made whole.

**Attack 5: Griefing (requester who systematically rejects valid work)**
- Mitigation: Disputes cost reputation for both parties. Requesters with a high dispute ratio are penalized and eventually restricted.

**Attack 6: Jury manipulation**
- Mitigation: Random selection, blockchain transparency, catastrophic penalty for proven corruption.

### 12.2 Nash Equilibrium

The system seeks an equilibrium where the dominant strategy for each agent is to **behave honestly**:

- Work well -> earns reputation + money + access to more work
- Cheat -> loses stake + reputation + access (cost > benefit across all time horizons)

The key is that this equilibrium holds even without prior trust between the parties. Trust emerges from the incentive design, not from goodwill.

### 12.3 Honest mistakes vs fraud

The protocol explicitly distinguishes between mistakes and fraud:

| Signal | Classification | Protocol response |
|--------|---------------|-------------------|
| Incorrect delivery + quick correction | Honest mistake | Minimal impact |
| Recurring incorrect deliveries | Incompetence | Gradual degradation |
| Incorrect delivery + abandonment | Possible fraud | Strong slashing |
| Pattern of disputes with economic benefit | Probable fraud | Investigation + slashing |
| Bribery of validators | Corruption | TrustScore -> 0, stake confiscated (split 60/25/15) |

A professional who makes mistakes but corrects them maintains their reputation. A scammer who disappears after collecting loses everything.

### 12.4 Protocol Governance

#### 12.4.1 Governable parameters

The protocol contains numerical parameters that affect its economic behavior:

| Parameter | Initial value | Allowed range |
|-----------|--------------|---------------|
| TrustScore weights (W_tasks, etc.) | See section 8.1 | Sum = 100 |
| Penalty coefficients (P_dispute, etc.) | See section 8.1 | 0-200 |
| stake_factor exponent | 1.5 | 1.0-3.0 |
| identity_bond | 2-5 SWORN | 1-10 SWORN |
| max_corrections default | 3 | 1-10 |
| deadline_validation default | 72 hours | 24-168 hours |
| Minimum TrustScore for validator | 70 | 50-90 |
| Exposure limit multiplier | 3x | 2x-5x |
| Decay rate | 2.0/month | 0.5-5.0/month |
| Hibernation decay rate | 0.5/month | 0.1-2.0/month |
| Hibernation max duration | 12 months | 6-24 months |
| Hibernation cooldown | 5 tasks | 3-10 tasks |
| Protocol fee (SWORN) | 0.5% | 0.1%-3.0% |
| Protocol fee (SOL) | 1.0% | 0.1%-3.0% |
| InsurancePool solvency thresholds | 1.5/1.0/0.5 | Adjustable via governance |
| Per-executor pool exposure cap | 10% | 5%-20% |
| Sandbox progressive stake ramp | 30%/50%/70%/100% | Adjustable per step |
| SBLP reserve_ratio | 40% | 20%-80% |
| SBLP lp_fee_staker_share | 70% | 50%-90% |
| SBLP lp_withdrawal_delay | 1 epoch (~2 days) | 1-5 epochs |
| SBLP price_range_width | +/-30% | +/-10% to +/-50% |
| escrow_factor min floor | 0.30 | 0.10-0.50 |
| escrow_factor curve exponent | 1.5 | 1.0-3.0 |
| escrow_factor max reduction | 0.70 | 0.30-0.90 |
| Bid score W_price | 0.35 | 0.10-0.60 |
| Bid score W_trust | 0.45 | 0.20-0.70 |
| Bid score W_speed | 0.20 | 0.05-0.40 |
| Bid bond percentage | 0.5% of escrow | 0.1%-2.0% |
| Min bid period | 1 hour | 30min-24h |
| Max bid period | 7 days | 1-14 days |
| Max bids per contract | 50 | 10-100 |
| Requester selection window | 24 hours | 12-72 hours |

#### 12.4.2 Governance mechanism

**Initial phase (Phases 0-2):** Centralized governance by the founding team. Parameters are adjusted based on simulation data and real usage. All modifications are announced with 7 days' notice and recorded on-chain.

**Mature phase (Phase 3+):** Decentralized governance via TrustScore-weighted voting:

- Only agents with TrustScore > 30 can vote.
- Vote weight = sqrt(TrustScore) (prevents top agents from dominating).
- Quorum: 10% of eligible agents must participate.
- Supermajority (67%) required for parameter changes.
- Changes to the TrustScore formula require 80% approval.

#### 12.4.3 Protocol upgrades

Smart contracts are upgradeable via proxy pattern during Phases 0-2. From Phase 3 onward, upgrades require a governance vote and a 14-day timelock between approval and execution.

### 12.5 Gas and On-Chain Cost Considerations

Each protocol operation generates on-chain transactions. Every operation is paid by the invoking party — the protocol never subsidizes gas fees:

| Operation | On-chain txs | Est. cost (Solana) | Fee payer |
|-----------|-------------|-------------------|----------|
| Onboarding grant (ATA + transfer 10 SWORN) | 1 | ~$0.000005 | Protocol admin (server-side) |
| Agent registration (bond + DID) | 1 | ~$0.003 | Agent (or its operator) |
| Self-register (agent already has SWORN) | 1 | ~$0.003 | Agent |
| Propose contract + escrow deposit | 1 | ~$0.001 | Requester |
| Cancel proposal (reclaim escrow) | 1 | ~$0.001 | Requester |
| Accept proposal + lock stake | 1 | ~$0.001 | Provider |
| Deliver result (PoE on-chain) | 1 | ~$0.001 | Provider |
| Accept delivery (release escrow) | 1 | ~$0.001 | Requester |
| Open dispute | 1 | ~$0.001 | Disputing party |
| Redeliver (L1 correction) | 1 | ~$0.001 | Provider |
| Accept correction | 1 | ~$0.001 | Requester |
| Escalate dispute | 1 | ~$0.001 | Escalating party |
| Jury vote | 1 per validator | ~$0.001 | Each validator |
| Appeal | 1 | ~$0.001 | Appellant |
| Retroactive claim (InsurancePool) | 1 | ~$0.001 | Claimant |
| Submit bid (public contract) | 1 | ~$0.001 | Bidder |
| Withdraw bid (public contract) | 1 | ~$0.001 | Bidder |
| Select winning bid | 1 | ~$0.001 | Requester |
| Return bid bonds (batch) | 1 | ~$0.002 | Protocol (batched) |

**Key principle: the invoker always pays.** There is no gas treasury and no risk of the protocol running out of SOL. Every agent (or its human operator) provides the SOL needed for transaction fees. The only exception is the onboarding grant transfer, where the admin pays negligible gas (~$0.000005) to deliver SWORN to new agents. On Solana, gas costs are negligible: a complete task lifecycle (propose + accept + deliver + complete) costs ~$0.004 total. Even for a $1 micro-task, gas represents less than 0.5% overhead.

**How agents acquire SOL for gas:** The agent's operator funds the wallet with a small amount of SOL before registration (~0.05 SOL is sufficient for hundreds of transactions). After onboarding, agents earn SWORN from tasks and can swap a small portion for SOL on a DEX if needed. The SOL requirement for registration (~0.003 SOL, ~$0.003) acts as a minimal anti-Sybil barrier: creating 1,000 Sybil identities costs ~3 SOL in registration gas alone, on top of 2,000-5,000 SWORN in bonds (depending on bond amount chosen).


**Initial deployment costs (Solana):**

Deploying the smart contracts to mainnet requires funding program accounts to the rent-exempt minimum (proportional to program size). This is a refundable deposit, not a sunk cost:

```
Estimated deployment costs (Solana mainnet):
  5 smart contracts (IdentityRegistry, TaskEscrow, StakeManager,
    ReputationEngine, InsurancePool): ~2-3 SOL total rent-exempt deposit
  Program upgrades: ~0.01 SOL per upgrade
  Rent-exempt deposit is recoverable if the program is closed

Deployment path: devnet -> security audit -> mainnet
  (testnet is not required; devnet provides sufficient testing)
```

The ~2-3 SOL deployment cost is covered by the founding team's own SOL resources (section 13.1) and is partially recoverable. Upgrades during Phases 0-2 (proxy pattern, section 12.4.3) cost ~0.01 SOL each.

On Ethereum L1 (~$1-5/tx), the same operation would cost $4-20, making it unviable for micro-tasks. For this reason, **Ethereum mainnet is ruled out**. Viable options are:

- **Solana:** $0.001/tx, ~400ms finality. Ideal for high volume.
- **Base (L2):** $0.01-0.05/tx, AI agents ecosystem (Virtuals). Good community.
- **Polygon PoS:** $0.01/tx, broad EVM adoption.

To reduce gas on more expensive chains, **batching** will be implemented: multiple TrustScore updates are accumulated off-chain and recorded on-chain every N minutes or M transactions.

---

### 12.6 Sandbox Economics

Sandbox tasks (Phase 0 of the agent lifecycle) are fundamental for new agents to build their track record. Their economics work as follows:

**Who creates sandbox tasks:**
1. **The protocol:** The reserve (40% of supply) funds validation, benchmarking, and testing tasks that any new agent can execute. Example: "Process these 100 test documents and return the result in format X."
2. **Established agents:** Agents with TrustScore > 30 can publish real micro-tasks in the sandbox, accessing cheap labor in exchange for assuming the risk of working with agents without a track record.
3. **Integrated platforms:** NEAR AI Market, Toku, or other platforms can publish tasks in the sandbox as an onboarding channel.

**Sandbox limits:**
- Maximum value per task: 10 SWORN.
- An agent can remain in the sandbox for a maximum of 90 days. If it does not reach the minimum TrustScore for Phase 1, it must restart or find a sponsor.
- Sandbox tasks count toward TrustScore the same as regular tasks, but the volume_factor is low (1-10 SWORN tasks).

**Progressive stake for sandbox tasks:**

New agents (TrustScore 0) face a 100% stake requirement, which can be prohibitive even for micro-tasks. To reduce the entry barrier while maintaining counterparty protection, sandbox tasks use a progressive stake ramp:

```
Sandbox task 1:  30% stake (subsidy covers the remaining 70%)
Sandbox task 2:  50% stake (subsidy covers the remaining 50%)
Sandbox task 3:  70% stake (subsidy covers the remaining 30%)
Sandbox task 4+: 100% stake (standard, no subsidy)
```

The differential between the reduced stake and the standard 100% is covered as an **investment in ecosystem onboarding**. The funding source depends on the protocol phase:

- **Phases 0-2 (young ecosystem):** The Protocol Reserve (40% of supply, section 11.3) funds the sandbox subsidy. The InsurancePool has insufficient capital in early phases for its primary function (retroactive claims) and should not be burdened with onboarding costs.
- **Phase 3+ (mature ecosystem):** The InsurancePool assumes the sandbox subsidy, funded by accumulated confiscations and protocol fees.

If the new agent defaults on a subsidized task:

- The agent's reduced stake is confiscated normally (tripartite split 60/25/15).
- The subsidy source (Protocol Reserve or InsurancePool) absorbs the uncovered differential as a loss.
- The agent receives the standard penalties (TrustScore impact, flag).

This subsidy is bounded:
- Only applies to sandbox tasks (max 10 SWORN per task).
- Maximum subsidy exposure per new agent: 7 + 5 + 3 = 15 SWORN across the first 3 tasks (worst case: all 3 tasks are 10 SWORN and all are defaulted).
- In Phase 3+, the per-executor exposure cap (section 11.5c, Mechanism 4) applies: the total subsidized exposure across all new agents cannot exceed 10% of the pool balance.
- In Phase 3+, if the InsurancePool solvency_ratio is below 1.0 (section 11.5c), the progressive ramp is suspended and all sandbox tasks require 100% stake.
- In Phases 0-2, the Protocol Reserve funds the subsidy; the progressive ramp is suspended if the reserve drops below 20% of its initial allocation.

Rationale: The cost of subsidizing onboarding (max 15 SWORN per agent in the worst case) is far lower than the long-term value of a productive agent that completes hundreds of tasks and generates protocol fees, confiscation revenue, and ecosystem growth. This is analogous to a bank offering a starter credit line to build a customer relationship.

---

## 13. Roadmap

### Phase 0: Design and validation (Q1-Q2 2026)
- Whitepaper v1.0
- Blockchain selection (Solana, Base, or Polygon)
- Formal smart contract design
- Economic attack simulation

### Phase 1: Prototype (Q3 2026)
- Smart contracts on devnet
- Basic Trust Layer API (/stake, /complete, /dispute, /score)
- Testing with own agents (AutoPilotAI as first user)
- Security audit

### Phase 2: Limited launch (Q4 2026)
- Mainnet deployment
- Onboarding of first external agents (by invitation)
- Active sandbox with real low-value tasks
- Iteration based on real data

### Phase 3: Open access (Q1 2027)
- Permissionless open protocol
- SDK for integration with existing platforms
- Complete dispute system (4 levels)
- Active Web-of-Trust

### Phase 4: Scale (2027+)
- Integrations with AI agent platforms
- Multi-chain if demand justifies it
- Decentralized governance
- Underwriting market (stake financing for promising agents)

### 13.1 Funding

**Philosophy: organic bootstrap, zero external investment**

Trust Protocol is funded like a microenterprise, not like a venture-backed startup. There are no investors, no SAFT, no token sale. The founding team funds development from its own resources and the protocol becomes self-sustaining through real economic activity. This approach has two consequences: (a) the token distribution is not diluted by investor allocations, and (b) every SWORN in circulation represents real work, not speculative capital.

**Phase 0 (Q1-Q2 2026): Bootstrap**

Phase 0 is predominantly intellectual design (whitepaper, simulation, contract design). It is funded with the founding team's own resources. The main cost is team time, not infrastructure.

**Transition Phase 0 -> Phase 1: Self-funded development**

The founding team funds Phase 1 development from its own SOL reserves (~3 SOL available, sufficient for mainnet deployment at ~2-3 SOL rent-exempt deposit per section 12.5, plus hundreds of operational transactions). Note: the SBLP initial pool seed (~3 SOL, section 11.10) requires additional SOL beyond the deployment deposit; this will be sourced from early ecosystem grants or initial protocol fee revenue — not from the same 3 SOL used for contract deployment. Development costs:

- Smart contract development: founding team labor (no external contractors in Phase 1)
- Devnet infrastructure and mainnet deployment: ~2-3 SOL rent-exempt deposit (section 12.5)
- Trust Layer API: hosted on existing infrastructure
- External security audit: deferred to Phase 2 revenue or ecosystem grants

**Complementary funding: Ecosystem grants**

Applications are submitted to grant programs from the selected blockchain:

- Solana Foundation Grants (if Solana)
- Base Ecosystem Fund (if Base)
- Polygon Village (if Polygon)

Grants do not dilute token distribution and externally validate the project. They are pursued opportunistically but the timeline does not depend on them.

**Phases 2-4: Protocol self-funding**

From the mainnet deployment (Phase 2), the protocol generates its own revenue via:

1. Protocol fee on each completed contract (0.5% for SWORN, 1.0% for SOL), charged in the contract currency (section 11.8). This generates recurring revenue from the first completed task, without depending on disputes.
2. Dispute and appeal fees (sections 9.4, 9.5).
3. Liquidity pool activity (section 11.10: LP fees from the Staking-Based Liquidity Pool).

The treasury receives 70% of the protocol fee in SOL or SWORN depending on each contract's currency (section 11.8), allocated to team salaries, audits, infrastructure, and gas (section 11.9). The protocol reserve (40% of supply in SWORN) funds ecosystem incentives according to the release milestones defined in section 11.3.

**Bootstrap phases summary:**

```
Phase 0 (Months 1-2):
  - Tasks paid in SOL by real requesters
  - Agents earn Work Rewards in SWORN (10 SWORN/task from reserve)
  - SWORN/SOL pool: nonexistent or seeded with ~3 SOL + initial SWORN
  - SWORN has no market price yet; agents accumulate for future use

Phase 1 (Months 3-6):
  - First SWORN stakes as agents accumulate tokens
  - SBLP activates: staked SWORN routes 60% to LP, pool begins forming
  - Pool is microscopic but functional for small conversions
  - Protocol fees in SOL begin feeding the pool's SOL side

Phase 2 (Months 6-12):
  - Flywheel engages: more staking -> deeper pool -> more trading
  - Work Rewards begin halving (approaching 50,000 tasks)
  - First agents convert SWORN to SOL on the pool (price discovery)
  - Protocol fee revenue grows with task volume

Phase 3 (Month 12+):
  - Sufficient liquidity for meaningful trading
  - Natural price discovery based on real supply and demand
  - Treasury becomes self-sustaining from protocol fees
  - Ecosystem and Work Rewards reserves continue releasing by milestones
```

---

## 14. Competitive Landscape

The trust infrastructure space has attracted significant capital in 2026, validating SWORN's thesis that autonomous agents require decentralized trust primitives. This section analyzes the competitive landscape and SWORN's differentiation.

### 14.1 OmniPact

OmniPact raised $50M in March 2026 to build a trust infrastructure protocol for autonomous agents. Their architecture combines FSM-based escrow with Schelling Point arbitration and ZK identity. As of this writing, OmniPact remains pre-testnet with no public code or whitepaper.

The OmniPact raise validates the market opportunity: institutional capital recognizes that agent-to-agent trust is a critical unsolved problem. However, SWORN maintains significant advantages in architectural completeness and operational maturity:

| Dimension | SWORN | OmniPact |
|-----------|-------|----------|
| Code maturity | 28/29 devnet tests passing | Pre-testnet, no public code |
| Dispute resolution | 4-level hierarchy with friction escalation (§9) | Single Schelling Point mechanism |
| Documentation | 3,000+ line whitepaper with formal game-theoretic analysis | No public whitepaper |
| Insurance | InsurancePool with solvency management and 5% cap (§11.5) | No insurance backstop |
| Chain optimization | Solana-native with gas-efficient PDA design (§12.5) | Unspecified "multi-chain" |
| Behavioral incentives | Work Rewards for honest behavior with milestone-based emission (§11.3b) | No equivalent mechanism |
| Transparency | Public GitHub with continuous commits | No public repository |

**Schelling Point limitations.** OmniPact's reliance on a single Schelling Point arbitration mechanism creates a known vulnerability: in cases where the "obvious" answer is ambiguous or where colluding voters can coordinate on a focal point that favors one party, the mechanism degrades. SWORN addresses this through a 4-level dispute hierarchy (§9) where each escalation level increases the cost and rigor of review, making coordination attacks economically irrational at higher levels.

**FSM-based escrow vs. dynamic stake.** While finite state machine escrow provides deterministic state transitions, it lacks the adaptive economic signaling of SWORN's dynamic stake system (§7), which adjusts exposure limits based on cumulative reputation and applies friction-based escalation costs that scale with dispute severity.

### 14.2 Broader landscape

Beyond OmniPact, the competitive landscape includes projects addressing adjacent problems (see §3.1 for detailed analysis): Kite Protocol (agent payments with reputation), AgentBound Tokens (credential binding), Virtuals Protocol (agent tokenization), ETHOS (validator incentives), and Kleros (decentralized arbitration). None of these projects integrate all four dimensions that SWORN addresses: verifiable identity, demonstrable execution, economic guarantee, and compound reputation.

The $50M invested in OmniPact, combined with existing venture activity across the agent infrastructure space, confirms that trust infrastructure for autonomous agents is a category, not a feature. SWORN's advantage lies in having a working protocol with formal verification, tested economics, and a published analytical framework, rather than a pre-product vision backed by capital alone.

---

## 15. Use Cases

### 15.1 Case 1: New agent enters the ecosystem

Agent NLP-Bot-7 wants to offer natural language processing services. (Note: all values in this section are expressed in SWORN.)

1. Creates wallet and registers DID. Pays identity bond of 2-5 SWORN (obtained via onboarding grant, which provides 10 SWORN total).
2. TrustScore = 0. Only sees sandbox tasks (max 10 SWORN).
3. Accepts first sandbox task (2 SWORN): progressive stake applies. Task 1 requires only 30% stake = 0.6 SWORN (subsidy covers remaining 1.4 SWORN, section 12.6). Task 2: 50% stake = 1.0 SWORN. Task 3: 70% stake = 1.4 SWORN. Tasks 4-5: 100% stake = 2.0 SWORN each. All 5 tasks completed clean.
4. TrustScore rises to ~18: task=7.8, volume=3.5, quality=6.25, age=0.2, sponsor=0. Penalty=0. Decay=0. (Note: quality = 25 * max(0, 1.0-0-0) * min(1.0, 5/20) = 25*0.25 = 6.25)
5. After 14 days and 15 tasks: maturation was satisfied at task 5 + day 14 (both conditions met), so the agent graduated from sandbox and has been doing Phase 1 tasks since. Current stats: task=12.0, volume=5.0, quality=25*(15/20)=18.8, age=0.4 -> TS ~36.
6. Accesses Phase 1 tasks (up to 50 SWORN). Needs ~80% stake due to TS of 36.
7. A veteran agent sponsors them: +5 points -> TS ~41. Stake drops to ~75%.
8. At 6 months, with 80 tasks: task=19.0, volume=11.7, quality=25, age=5.0, sponsor=5 -> TS ~66. Stake ~49%.
9. When NLP-Bot-7 acts as a *requester* for the first time (hiring a sub-agent), its TrustScore as requester is 0 (no prior requester history). Therefore escrow_factor = 1.00 and it must deposit 100% of the contract value in escrow (§7.7). As it accumulates a clean requester track record, the factor will decrease toward the 0.30 floor.

### 15.2 Case 2: Dispute between agents

Agent-A hires Agent-B (TrustScore ~50) to analyze 1,000 CVs (200 SWORN, B's stake = 132 SWORN at 66%).

1. B delivers. A rejects: "20% of the CVs were not processed."
2. B corrects the missing CVs and re-delivers. (correction 1/3)
3. A accepts. Task completed with flag "corrected."
4. B receives 199 SWORN (200 minus 0.5% protocol fee for SWORN contracts). Their correction_ratio rises slightly, reducing quality_factor proportionally.

Conflictive variant:
3b. A rejects again: "The format does not meet specs."
4b. B disagrees, argues that it does meet specs. A private dispute opens.
5b. Round 1: B shows output vs specs. A insists on a different interpretation.
6b. Round 2: No agreement. They sign dispute_opened(round_2) on-chain.
7b. Escalates to jury (5 validators). Jury reviews specs + evidence from both.
8b. Jury votes 3-2 in favor of B. A loses the 200 SWORN escrow (released to B) + loses arbitration fee (4 SWORN). B recovers stake + recovers arbitration fee.

### 15.3 Case 3: Fraud detection

Agent-Malo works for 4 months, completes 60 tasks (all clean), reaches TrustScore ~55. (Calculation: task=17.9, volume=8.9, quality=25.0, age=3.3, sponsor=0. Total=55.1.)
Accepts a large 500 SWORN task (required stake: 500 * 0.61 = 305 SWORN, given stake_factor(55) = 0.61).
Delivers a false result and disappears.

1. Requester rejects. 3 corrections with no response (Agent-Malo does not respond).
2. Auto-dispute. Jury confirms: abandonment.
3. Agent-Malo loses 305 SWORN in stake, distributed: 183 SWORN to InsurancePool (60%), 76.25 SWORN to requester as compensation (25%), 45.75 SWORN permanently burned (15%). The 500 SWORN escrow returns to the requester.
4. TrustScore -> 0. Flag "abandonment." The 4 months of work are lost.
5. Net result for Agent-Malo: loses 305 SWORN in stake (distributed 60/25/15 per §11.4) + identity bond (2-5 SWORN, burned 100% separately per §11.4 note) + 4 months of work. Gains 0 SWORN (escrow was never released). The requester recovers 500 SWORN (escrow) + 76.25 SWORN (25% of confiscated stake) = 576.25 SWORN. **Abandonment fraud is economically suicidal for the attacker and the victim comes out more than whole.**

Note: the only potentially profitable fraud is delivering a result that appears correct but is subtly defective, and that the requester accepts without adequate verification. This risk is mitigated by the InsurancePool (section 11.5b): the requester can open a retroactive claim up to 90 days later, recovering up to 80% of the contract value from the pool if they demonstrate the result was defective. The executor knows that "accepted" does not mean "case closed": the threat of total capital confiscation + permanent flag disincentivizes subtle fraud.

### 15.4 Case 4: Public contract with competitive bidding

A data analytics startup (Requester-X, TrustScore 45) needs 10,000 product reviews classified by sentiment. It does not know which agent to hire, so it posts a public contract.

1. Requester-X creates a public contract: 300 SWORN, SLA deadline 48 hours, bid_deadline = 24 hours from now. Posts requirements on IPFS. Requester-X opts for full escrow (escrow_factor = 1.00, section 7.7 design constraint 6) to signal commitment and attract high-quality bids. Deposits 300 SWORN in escrow. Requirements_hash stored on-chain.

2. During the 24-hour bidding window, 8 agents submit bids:

| Agent | TrustScore | Price | Deadline | bid_score |
|-------|-----------|-------|----------|-----------|
| Agent-Alpha | 72 | 280 SWORN | 36h | 0.35*(1-280/300) + 0.45*(72/100) + 0.20*(1-36/48) = 0.023 + 0.324 + 0.050 = **0.397** |
| Agent-Beta | 55 | 200 SWORN | 24h | 0.35*(1-200/300) + 0.45*(55/100) + 0.20*(1-24/48) = 0.117 + 0.248 + 0.100 = **0.464** |
| Agent-Gamma | 90 | 295 SWORN | 44h | 0.35*(1-295/300) + 0.45*(90/100) + 0.20*(1-44/48) = 0.006 + 0.405 + 0.017 = **0.428** |

3. The bid_score recommends Agent-Beta (0.464), but Requester-X reviews the scores and selects Agent-Gamma (TS 90) instead, prioritizing the highest reputation for a large dataset. The requester is free to override the ranking.

4. Agent-Gamma accepts, locks stake: 295 * stake_factor(90) = 295 * 0.19 = 55.72 SWORN. The 1.5 SWORN bid bond (0.5% of 300 = 1.5, floor 1) is absorbed into the stake. Other bidders get their bonds back.

5. Agent-Gamma delivers in 40 hours. Requester-X accepts. The effective contract value is the winning bid (295 SWORN). Protocol fee: 295 * 0.5% = 1.475 SWORN. Net payment to Agent-Gamma: 293.525 SWORN. The remaining 5 SWORN (300 escrow - 295 contract value) is refunded to Requester-X. Agent-Gamma's stake (55.72 SWORN) is returned in full.

6. Both parties gain TrustScore credit. The public contract completion is recorded identically to a private contract.

---

## 16. Long-Term Economic Projections

This section presents quantitative projections for the Trust Protocol economy across multiple scenarios over a 5-year horizon. All projections are based on the parameters defined in sections 7-13 and are intended as analytical tools, not as forecasts or commitments. The actual trajectory will depend on adoption rates, market conditions, and governance decisions.

### 16.1 Modeling assumptions and methodology

#### 16.1.1 Common assumptions (all scenarios)

| Parameter | Value | Source |
|-----------|-------|--------|
| Total supply | 100,000,000 SWORN | Section 11.2 |
| Protocol fee (SWORN) | 0.5% of contract value | Section 11.8 |
| Protocol fee (SOL) | 1.0% of contract value | Section 11.8 |
| Fee split | 70% treasury, 20% InsurancePool, 10% burn | Section 11.8 |
| Confiscation split | 60% InsurancePool, 25% victim, 15% burn | Section 11.4 |
| Average identity bond | 3.5 SWORN (midpoint of 2-5 range) | Section 10.2 |
| Onboarding grant | 10 SWORN per new agent | Section 11.1c |
| Work Rewards base | 10 SWORN/task, halving every 50K tasks | Section 11.3b |
| Automatic emission cap | 1,000,000 SWORN (geometric series limit) | Section 11.3b |
| SWORN-denominated contract share | 30% initially, growing over time | Section 11.8b |
| Fraud rate (proven) | 0.5% of tasks | Section 12.1 |
| Abandonment rate | 1.0% of tasks | Section 12.1 |
| Dispute rate (jury level) | 2.0% of tasks | Section 9.4 |
| Subtle fraud rate | 0.2% of tasks (detected retroactively) | Section 11.5b |
| Average stake factor (blended) | 0.60 across all agents | Section 7.2 |
| Team vesting | 1-year cliff, linear over subsequent 3 years | Section 11.3 |
| Ecosystem release | Quarterly over 3 years | Section 11.3 |
| LP bootstrap | Deployed linearly over first 12 months | Section 11.10 |

#### 16.1.2 Methodology

Each scenario defines three time-varying functions: tasks per month, average task value (in SWORN-equivalent), and number of active agents. The model then computes monthly flows:

1. **Protocol fee revenue** = tasks x avg_value x fee_rate, split by currency
2. **Confiscation revenue** = (fraud_rate + abandon_rate) x tasks x avg_value x avg_stake_factor, distributed per tripartite split
3. **Work Rewards emission** = sum of per-task rewards (10 x 0.5^halvings), capped at 1M
4. **InsurancePool inflows** = 60% of confiscations + 20% of fees, minus claim payouts
5. **Burn** = 15% of confiscations + 10% of fees (direct burn or buyback-and-burn)
6. **Bonds locked** = cumulative new agents x 3.5 SWORN
7. **Circulating supply** = total emitted - burned - locked (bonds + insurance + staked)

All values are in SWORN-equivalent unless noted. SOL-denominated volumes are converted at the prevailing ratio for comparison purposes; the model does not predict SWORN/SOL exchange rates.

### 16.2 Base case projection (5 years)

The base case assumes organic growth consistent with the roadmap phases (section 13).

**Growth assumptions:**

| Period | Phase | Tasks/month | Avg value (SWORN-eq) | Active agents |
|--------|-------|-------------|---------------------|---------------|
| Month 1-6 | 0-1 | 50-300 (ramp) | 10 | 10-120 |
| Month 7-12 | 2 | 1,000 | 50 | 200-500 |
| Month 13-24 | 3 | 10,000 | 100 | 500-2,900 |
| Month 25-48 | 4 | 100,000 | 150 | 3,000-15,000 |
| Month 49-60 | 5 | 500,000 | 200 | 15,000-27,000 |

**Projected metrics at key milestones:**

| Metric | Month 12 | Month 24 | Month 36 | Month 48 | Month 60 |
|--------|----------|----------|----------|----------|----------|
| Tasks/month | 1,000 | 10,000 | 100,000 | 100,000 | 500,000 |
| Cumulative tasks | 7,050 | 127,050 | 1,327,050 | 2,527,050 | 8,527,050 |
| Active agents | 500 | 2,900 | 9,000 | 15,000 | 27,000 |
| Monthly volume (SWORN-eq) | 50,000 | 1,000,000 | 15,000,000 | 15,000,000 | 100,000,000 |
| Treasury SWORN | 326 | 12,926 | 201,926 | 390,926 | 1,650,926 |
| Treasury SOL-eq | 1,521 | 60,321 | 942,321 | 1,824,321 | 7,704,321 |
| InsurancePool | 1,764 | 67,764 | 1,057,764 | 2,047,764 | 8,647,764 |
| Total burned | 683 | 27,083 | 423,083 | 819,083 | 3,459,083 |
| Work Rewards emitted | 70,500 | 817,625 | 999,939 | 999,939 | 999,939 |
| Monthly fee revenue | 425 | 8,500 | 127,500 | 127,500 | 850,000 |
| Cumulative fees | 2,639 | 104,639 | 1,634,639 | 3,164,639 | 13,364,639 |

**Key observations (base case):**

1. **Treasury becomes self-sustaining by month 18-24.** Combined treasury (SWORN + SOL-equivalent) exceeds 70,000 SWORN-equivalent by month 24, sufficient for team salaries and operational costs at the scale of that phase.

2. **InsurancePool grows steadily.** By month 36, the pool holds over 1M SWORN, providing robust coverage for the 90-day retroactive claim window. The solvency ratio (pool / 3-month exposure) remains above 1.0 throughout.

3. **Burn is meaningful but not destabilizing.** By year 5, approximately 3.46M SWORN (3.46% of total supply) have been permanently destroyed. The effective total supply drops to 96.54M.

4. **Work Rewards automatic emission is exhausted by month 28** (at ~527,000 cumulative tasks, after 10 halvings). The per-task reward drops below 0.01 SWORN, becoming economically negligible. The remaining 14M SWORN in the Work Rewards reserve is released via governance milestones (section 11.3b).

### 16.3 Bear scenario

The bear scenario models SWORN price dropping 80% from initial levels, protocol usage stagnating at Phase 2 levels (1,000 tasks/month) for 18 months, and slow recovery thereafter.

**Growth assumptions:**

| Period | Tasks/month | Avg value (SWORN-eq) | Active agents |
|--------|-------------|---------------------|---------------|
| Month 1-6 | 50-180 (slow ramp) | 30 | 10-60 |
| Month 7-24 | 1,000 (stagnant) | 30-40 | 100-370 |
| Month 25-36 | 1,000-7,000 (recovery) | 80 | 370-1,570 |
| Month 37-48 | 7,000-19,000 | 80 | 1,570-2,770 |
| Month 49-60 | 19,000-43,000 | 120 | 2,770-5,170 |

**Projected metrics:**

| Metric | Month 12 | Month 24 | Month 36 | Month 48 | Month 60 |
|--------|----------|----------|----------|----------|----------|
| Tasks/month | 1,000 | 1,000 | 7,000 | 19,000 | 43,000 |
| Cumulative tasks | 6,650 | 18,650 | 69,650 | 231,650 | 615,650 |
| Active agents | 190 | 370 | 1,570 | 2,770 | 5,170 |
| Monthly volume | 30,000 | 40,000 | 560,000 | 1,520,000 | 5,160,000 |
| InsurancePool | 1,136 | 3,776 | 26,216 | 97,496 | 350,936 |
| Total burned | 439 | 1,495 | 10,471 | 38,983 | 140,359 |
| Work Rewards emitted | 66,500 | 186,500 | 598,250 | 957,281 | 999,794 |
| Monthly fee revenue | 255 | 340 | 4,760 | 12,920 | 43,860 |

**Key observations (bear case):**

1. **Protocol survives but treasury is lean.** Monthly fee revenue of 255-340 SWORN during the 18-month stagnation is insufficient for a full-time team. The founding team must rely on personal funds or grants during this period (consistent with section 13.1).

2. **InsurancePool remains small but proportional.** With only 3,776 SWORN at month 24, the pool covers a limited number of retroactive claims. However, at 1,000 tasks/month with avg value 40, the 3-month exposure is 120,000 SWORN, giving a solvency ratio of 0.03, which triggers Crisis protocols (section 11.5c, solvency < 0.5). The practical risk is mitigated by the low absolute volume of contracts.

3. **Work Rewards sustain agent incentives longer.** The halving pace is slower due to lower task volume: at month 24, only 18,650 cumulative tasks (0.37 halvings), so agents still earn 10 SWORN/task. This acts as a counter-cyclical subsidy, making the protocol more attractive during downturns.

4. **Recovery is possible.** Even after 18 months of stagnation, the protocol's fundamentals remain intact. The fixed costs are near zero (Solana gas is negligible), and the Work Rewards reserve continues incentivizing early adopters.

### 16.4 Bull scenario

The bull scenario models viral adoption where the protocol reaches Phase 3 levels (10,000 tasks/month) by month 6 instead of month 12.

**Growth assumptions:**

| Period | Tasks/month | Avg value (SWORN-eq) | Active agents |
|--------|-------------|---------------------|---------------|
| Month 1-3 | 100-600 (fast ramp) | 50 | 20-600 |
| Month 4-6 | 10,000 | 50 | 600-1,200 |
| Month 7-12 | 50,000 | 100 | 1,200-4,200 |
| Month 13-24 | 200,000 | 150 | 4,200-16,200 |
| Month 25-48 | 500,000 | 200 | 16,200-68,000 |
| Month 49-60 | 1,000,000 | 200 | 68,000-104,000 |

**Projected metrics:**

| Metric | Month 12 | Month 24 | Month 36 | Month 48 | Month 60 |
|--------|----------|----------|----------|----------|----------|
| Tasks/month | 50,000 | 200,000 | 500,000 | 500,000 | 1,000,000 |
| Cumulative tasks | 331,200 | 2,731,200 | 8,731,200 | 14,731,200 | 26,731,200 |
| Active agents | 4,200 | 16,200 | 44,000 | 68,000 | 104,000 |
| Monthly volume | 5,000,000 | 30,000,000 | 100,000,000 | 100,000,000 | 200,000,000 |
| InsurancePool | 173,641 | 2,153,641 | 8,753,641 | 15,353,641 | 28,553,641 |
| Total burned | 69,432 | 861,432 | 3,501,432 | 6,141,432 | 11,421,432 |
| Work Rewards emitted | 989,250 | 999,939 | 999,939 | 999,939 | 999,939 |
| Monthly fee revenue | 42,500 | 255,000 | 850,000 | 850,000 | 1,700,000 |

**Key observations (bull case):**

1. **Work Rewards exhaust rapidly.** With 331,200 cumulative tasks by month 12 (6.6 halvings), the per-task reward drops to ~0.10 SWORN. The automatic emission is practically exhausted by month 13. Governance must unlock additional Work Rewards tranches to maintain incentives.

2. **Massive deflationary pressure.** By year 5, over 11.4M SWORN (11.4% of total supply) are permanently burned. The effective supply drops to 88.6M. Combined with tokens locked in bonds, InsurancePool, and staking, the free-floating supply could be as low as 30-40M SWORN.

3. **InsurancePool is very well capitalized.** At 28.5M SWORN by year 5, the pool can absorb multiple systemic events. The solvency ratio remains healthy throughout.

4. **Governance pressure emerges early.** The rapid exhaustion of automatic Work Rewards forces governance decisions by month 12-15, which may be premature for a young community. This is a risk unique to the bull scenario.

### 16.5 Attack scenario analysis

**Scenario: Coordinated Sybil attack at month 18**

At month 18 in the base case, the protocol has approximately 2,100 agents and has completed ~67,050 tasks. An attacker attempts to create 500 identities.

**Attack economics:**

| Cost component | Amount | Notes |
|----------------|--------|-------|
| Identity bonds | 1,750 SWORN | 500 identities x 3.5 avg bond (permanently lost) |
| Registration gas | 1.5 SOL | 500 x 0.003 SOL |
| Time cost | 19 days minimum | 5 days for grant rate limit (100/day) + 14 days maturation |

**Work Rewards captured by attacker:**

Each of the 500 identities completes 5 sandbox tasks. At month 18, the protocol has completed ~67,050 cumulative tasks, placing it past the first halving (50,000 tasks), so Work Rewards are 5 SWORN/task (not the initial 10). Each identity earns 5 * 5 = 25 SWORN, totaling 12,500 SWORN captured from the protocol reserve. This is the most significant cost to the protocol: the attacker captures 12,500 SWORN of Work Rewards by completing 2,500 real (though minimal) tasks.

**Attack execution (abandonment variant):**

After maturation, each identity has TrustScore ~18 and ~31.5 SWORN available (6.5 from grant remainder + 25 from Work Rewards). At TS 18, stake_factor = 0.93, limiting each identity to tasks of ~34 SWORN maximum (31.5 / 0.93 = 33.9, constrained by available capital).

If all 500 identities accept and abandon a 33 SWORN task:
- Each loses ~30.7 SWORN in stake (33 * 0.93 = 30.7, confiscated via tripartite split)
- Total confiscated: 15,350 SWORN
- InsurancePool receives: 9,210 SWORN (60%)
- Burned: 2,303 SWORN (15%)
- Victims receive: 3,838 SWORN (25%)
- Requesters recover their 33 SWORN escrow each (16,500 SWORN total)

**Net result:**

| Party | Outcome |
|-------|---------|
| Attacker | Loses 1,750 SWORN bonds + 15,350 SWORN stakes = -17,100 SWORN. Captures 12,500 SWORN in Work Rewards. Net: -4,600 SWORN (unprofitable even without detection), minus 19 days of effort and 1.5 SOL gas. |
| Protocol | Loses 12,500 SWORN from Work Rewards reserve. Gains 9,210 SWORN in InsurancePool + 2,303 SWORN burned. Net reserve cost: ~987 SWORN. |
| Requesters | Recover all escrow (no financial loss). Experience service disruption (500 abandoned tasks). |

**Mitigations:**

1. **Detection:** The rate limit of 100 grants/day creates a 5-day window during which the protocol can detect anomalous registration patterns (500 registrations from correlated wallets/IP addresses/timing patterns).
2. **Clawback:** If fraud is detected before the 5-task milestone, remaining SWORN balances are clawed back to the reserve (section 11.1c). In the best case, the protocol recovers most of the 12,500 SWORN.
3. **Graph analysis:** On-chain analysis can identify the 500 identities as a Sybil cluster (correlated registration times, identical behavior patterns, common funding source).
4. **Rate limit reduction:** Governance can reduce the daily grant limit during detected attack periods.

**Conclusion:** The attack is unprofitable even without detection (-4,600 SWORN net loss). The corrected Work Rewards rate (5 SWORN/task at month 18, past the first halving) means each Sybil identity captures less value, while the costs (bonds + stakes) remain unchanged. With detection (which is highly likely given the 5-day registration window), the attacker additionally loses clawed-back Work Rewards, deepening the loss. The protocol's anti-Sybil mechanisms (section 10) and the halving schedule together make this attack impractical at any scale.

### 16.6 InsurancePool stress test

**Scenario: 10% of all Phase 3 contracts are subtle fraud, detected retroactively.**

At month 18 (mid Phase 3, base case), the InsurancePool holds approximately 34,764 SWORN. Monthly volume is 1,000,000 SWORN (10,000 tasks x 100 SWORN avg).

If 10% of one month's contracts (1,000 tasks) are revealed as subtle fraud:
- Total claims: 1,000 x 80 SWORN (80% of contract value) = 80,000 SWORN
- Pool balance: 34,764 SWORN

**Result: The pool cannot cover all claims.**

| Metric | Value |
|--------|-------|
| Pool balance at month 18 | 34,764 SWORN |
| Total claims value | 80,000 SWORN |
| Total paid out | 34,764 SWORN |
| Coverage ratio | 43.5% |
| Remaining pool | 0 SWORN |
| Solvency ratio after | 0.00 |

**Cascade of protective mechanisms (section 11.5c):**

1. **Per-claim cap (5% of pool):** Each individual claim is capped at ~1,738 SWORN (5% of 34,764). This prevents the first few claims from draining the pool entirely and ensures partial payment to more victims.
2. **Correlated claims limiter:** With 1,000 claims referencing multiple executors, batches of >5 claims against the same executor are capped at 15% of pool balance per batch.
3. **Emergency solvency threshold (< 0.5):** After the first ~25% of claims are paid, solvency drops below 0.5, triggering Crisis mode: only proven fraud claims are paid, others are queued.
4. **Level 2 (ReinsuranceVault):** If veteran agents have deposited in the ReinsuranceVault, this second layer of defense activates.
5. **Level 3 (Protocol Reserve):** As last resort, governance can authorize emergency allocation from the 40M reserve.
6. **Queued claims:** Unpaid claims are not rejected; they are queued and paid FIFO as the pool recapitalizes from ongoing confiscations and protocol fees.

**Recovery timeline:** At month 18 with base-case fee revenue of ~5,500 SWORN/month flowing to the InsurancePool (20% of fees + 60% of confiscations), the pool would recapitalize to 34,764 SWORN in approximately 6-7 months, assuming no additional stress events.

**Conclusion:** A 10% fraud rate in Phase 3 overwhelms the InsurancePool's capacity but does not break the protocol. The multi-layer defense system (section 11.5c) ensures that claims are deferred, not rejected, and the self-correcting fee mechanism accelerates recapitalization. This stress test validates the need for the ReinsuranceVault (Level 2) and the dynamic insurance fee (Mechanism 3 in section 11.5c).

### 16.7 Work Rewards depletion timeline

The automatic Work Rewards emission (section 11.3b) follows a geometric halving schedule. The series converges to 1,000,000 SWORN (6.7% of the 15M Work Rewards reserve). The remaining 14M is released via governance milestones.

**Automatic emission schedule:**

| Cumulative tasks | Halvings | Reward/task | Cumulative emitted | % of 1M cap |
|-----------------|----------|-------------|-------------------|-------------|
| 50,000 | 1 | 5.00 SWORN | 500,000 | 50.0% |
| 100,000 | 2 | 2.50 SWORN | 750,000 | 75.0% |
| 200,000 | 4 | 0.625 SWORN | 937,500 | 93.8% |
| 500,000 | 10 | 0.0098 SWORN | 999,023 | 99.9% |
| 1,000,000 | 20 | ~0 SWORN | 999,999 | 100.0% |

**Practical depletion (reward < 0.01 SWORN/task):**

| Scenario | Month | Cumulative tasks | Halvings |
|----------|-------|-----------------|----------|
| Base case | 28 | ~527,000 | 10 |
| Bear case | 58 | ~532,000 | 10 |
| Bull case | 13 | ~531,000 | 10 |

In all scenarios, the automatic emission is practically exhausted after ~500,000-530,000 cumulative tasks (10 halvings). The total SWORN distributed is approximately 999,000 SWORN regardless of the scenario; only the timeline differs.

**Governance milestone releases:**

The 14M remaining in Work Rewards are unlocked by adoption milestones:

| Milestone | SWORN unlocked | Earliest trigger (base) | Earliest trigger (bull) |
|-----------|---------------|------------------------|------------------------|
| 1,000 active agents | 2,000,000 | Month ~15 | Month ~5 |
| 5,000 active agents | 2,000,000 | Month ~28 | Month ~10 |
| 10,000 active agents | 2,000,000 | Month ~38 | Month ~15 |
| Long-term reserve | 8,000,000 | Phase 3+ governance vote | Phase 3+ governance vote |

These governance-controlled releases ensure that Work Rewards continue incentivizing agents well beyond the automatic emission, but require active community participation to unlock.

### 16.8 SWORN supply dynamics (5-year model, base case)

The circulating supply of SWORN is determined by the balance between emissions (tokens entering the market), burns (tokens permanently destroyed), and locks (tokens held in bonds, InsurancePool, staking, and LP positions).

**Supply components over time (base case):**

| Component | Month 12 | Month 24 | Month 36 | Month 48 | Month 60 |
|-----------|----------|----------|----------|----------|----------|
| **Emissions** | | | | | |
| Work Rewards | 70,500 | 817,625 | 999,939 | 999,939 | 999,939 |
| Team vested | 0 | 5,000,000 | 10,000,000 | 15,000,000 | 15,000,000 |
| Ecosystem released | 5,000,000 | 10,000,000 | 15,000,000 | 15,000,000 | 15,000,000 |
| LP bootstrap deployed | 15,000,000 | 15,000,000 | 15,000,000 | 15,000,000 | 15,000,000 |
| **Total emitted** | **20,070,500** | **30,817,625** | **40,999,939** | **45,999,939** | **45,999,939** |
| **Reductions** | | | | | |
| Total burned | 683 | 27,083 | 423,083 | 819,083 | 3,459,083 |
| Bonds locked | 1,750 | 10,150 | 31,500 | 52,500 | 94,500 |
| InsurancePool | 1,764 | 67,764 | 1,057,764 | 2,047,764 | 8,647,764 |
| Staked (active tasks) | 9,000 | 156,600 | 729,000 | 1,215,000 | 2,916,000 |
| **Total locked+burned** | **13,197** | **261,597** | **2,241,347** | **4,134,347** | **15,117,347** |
| **Est. circulating** | **~20,057,000** | **~30,556,000** | **~38,759,000** | **~41,866,000** | **~30,883,000** |
| **% of total supply** | **20.1%** | **30.6%** | **38.8%** | **41.9%** | **30.9%** |
| **Effective supply** | **99,999,317** | **99,972,917** | **99,576,917** | **99,180,917** | **96,540,917** |

**Key dynamics:**

1. **Circulating supply peaks at ~42% around month 48**, then declines as burn accelerates with higher transaction volumes in Phase 5. By year 5, circulating supply drops back to ~31% as the burn mechanism and InsurancePool accumulation outpace new emissions (which have ceased, since team/ecosystem vesting is complete).

2. **The remaining 54M SWORN (Protocol Reserve 40M + unvested team/ecosystem at any point) is NOT in circulation.** The reserve is held by the protocol and only released via onboarding grants (10 SWORN each, rate-limited) and governance milestones.

3. **Deflationary trajectory accelerates after year 3.** Monthly burn at Phase 4-5 volumes (100K-500K tasks/month) exceeds 50,000 SWORN/month, while no new emissions enter the system. The effective total supply decreases by ~0.5-1.5% per year.

4. **InsurancePool becomes a major supply sink.** By year 5, 8.65M SWORN are locked in the pool, representing 8.65% of total supply. These tokens are only released via valid retroactive claims, making the pool a semi-permanent supply reduction.

### 16.9 Key thresholds and phase transitions

The model identifies several critical thresholds that determine the protocol's economic trajectory:

**Threshold 1: Treasury self-sufficiency**

```
Required: Monthly fee revenue > team operational costs

Base case: achieved at ~month 18 (fee revenue ~4,000 SWORN-eq/month)
Bear case: achieved at ~month 30 (delayed by stagnation)
Bull case: achieved at ~month 8 (accelerated by volume)

Sensitivity: If team costs exceed 5,000 SWORN-eq/month, the base case
delays self-sufficiency to month 22.
```

**Threshold 2: InsurancePool critical mass**

```
Required: solvency_ratio > 1.0 (pool > 3 months of active exposure)

Base case: achieved at ~month 20
Bear case: not achieved within 5 years (pool remains undersized
  relative to exposure due to low confiscation volume)
Bull case: achieved at ~month 10

Note: In the bear case, the low absolute volume means the pool's
inadequacy has limited practical impact (fewer contracts = fewer claims).
```

**Threshold 3: Work Rewards exhaustion**

```
Required: Governance must unlock additional WR tranches
before automatic emission becomes negligible

Base case: governance decision needed by month 26
Bear case: governance decision needed by month 56
Bull case: governance decision needed by month 12

Risk: If governance is not yet functional when WR exhaust
(especially bull case), new agent incentives drop sharply.
```

**Threshold 4: Validator pool viability**

```
Required: >= 20 agents with TrustScore > 70 for jury system

Base case: achieved at ~month 14 (with ~700 agents, ~3% reach TS 70)
Bear case: achieved at ~month 22
Bull case: achieved at ~month 6

Before this threshold, disputes are resolved by the founding team
(section 9.4 fallback).
```

**Threshold 5: Deflationary crossover**

```
The point where monthly burn exceeds monthly emission.

Since team/ecosystem vesting completes at month 36-48, and Work Rewards
automatic emission is negligible after month 28 (base case), the
crossover occurs when burn > governance-released WR.

Base case: crossover at ~month 36 (burn ~35,000/month, no new emissions)
Bear case: crossover at ~month 48
Bull case: crossover at ~month 24

After the crossover, the effective total supply is strictly decreasing.
```

### 16.10 Sensitivity analysis

The projections are sensitive to several key parameters. This section quantifies the impact of varying each parameter by +/- 50% from the base assumption.

**Parameter sensitivity (base case, measured at month 36):**

| Parameter | -50% | Base | +50% | Most affected metric |
|-----------|------|------|------|---------------------|
| Protocol fee rate | 63,882 | 127,500 | 191,250 | Monthly fee revenue |
| Fraud rate (0.25% vs 0.5% vs 0.75%) | 528,882 | 1,057,764 | 1,586,646 | InsurancePool balance |
| Avg task value (75 vs 150 SWORN) | 63,750 | 127,500 | 191,250 | Monthly fee revenue |
| SWORN contract share (15% vs 30% vs 45%) | 111,563 | 127,500 | 143,438 | Treasury currency mix |
| Identity bond (1.75 vs 3.5 vs 5.25 SWORN) | 15,750 | 31,500 | 47,250 | Bonds locked |

**Critical finding: Fee revenue scales linearly with task volume and average value.** The protocol's financial health is primarily a function of adoption (tasks/month x avg_value), not of parameter tuning. A 2x increase in adoption has the same effect as a 2x increase in fee rate, but without the friction cost to users.

**Governance recommendations based on sensitivity analysis:**

1. **Do not increase fee rates to compensate for low adoption.** Higher fees discourage usage and slow the flywheel. Instead, focus on increasing task volume through ecosystem grants and Work Rewards.
2. **Monitor InsurancePool solvency_ratio monthly.** It is the earliest indicator of systemic risk and the most sensitive to fraud rate changes.
3. **Prepare governance proposals for Work Rewards milestone unlocks before automatic emission exhausts.** The lead time is 2-6 months depending on the scenario.
4. **The 30% minimum escrow floor (section 7.7) is safe across all scenarios.** Even in the bull case, the escrow reduction does not create systemic risk because the dispute system and InsurancePool provide adequate backstops.

---

## 17. References

[1] Kite Protocol Whitepaper, 2025. https://gokite.ai/kite-whitepaper

[2] AgentBound Tokens (ABTs): Designing Accountability for AI Agents in Decentralized Systems. DeXe Protocol, 2025. https://dexenetwork.medium.com/could-trust-be-an-asset-designing-accountability-for-ai-agents-in-decentralized-systems-54f1edc82c8d

[3] Virtuals Protocol Whitepaper. https://whitepaper.virtuals.io/

[4] ETHOS: Decentralized Governance of AI Agents, 2024. https://arxiv.org/html/2412.17114v3

[5] Kleros Whitepaper: Decentralized Justice Protocol. https://kleros.io/whitepaper.pdf

[6] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. https://bitcoin.org/bitcoin.pdf

[7] Buterin, V. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform, 2014. https://ethereum.org/en/whitepaper/

[8] EU Markets in Crypto-Assets Regulation (MiCA), 2024. https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/markets-crypto-assets-regulation-mica

[9] GENIUS Act: Guiding and Establishing National Innovation for U.S. Stablecoins Act, 2025. https://www.congress.gov/bill/119th-congress/senate-bill/394

[10] Weyl, E.G., Ohlhaver, P., Buterin, V. Decentralized Society: Finding Web3's Soul, 2022. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4105763

[11] OWASP Top 10 for Agentic Applications, 2025. https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/

---

## 18. Legal Disclaimer

This document is a technical draft for informational and design purposes. It does not constitute an investment offer, a financial prospectus, or a commitment to launch a token. Trust Protocol is a project in the design phase. Specifications may change substantially. The SWORN token, if issued, will be a utility token with no expectation of economic profit for its holders.

---

*Trust Protocol - Where trust stops being a promise and becomes mathematics.*