
Next-Generation AI-Validated Layer-1 Blockchain
TECHNICAL WHITEPAPER v4.0 — MARCH 2026
"The World's First AI-Validated Blockchain using Proof of Neural Consensus"
Positronic (ASF) is the world's first Layer-1 blockchain that embeds artificial intelligence directly into its consensus mechanism. Unlike projects that merely deploy AI as decentralized applications on top of existing chains, ASF integrates four specialized neural network models into the block validation pipeline itself, creating a novel consensus paradigm called Proof of Neural Consensus (PoNC).
The Positronic blockchain combines the security guarantees of Delegated Proof of Stake (DPoS) with real-time AI transaction scoring, enabling the network to detect and quarantine fraudulent transactions, MEV attacks, smart contract exploits, and economic instabilities before they are committed to the chain. This proactive defense model represents a fundamental departure from traditional blockchains that rely solely on cryptographic and economic incentives.
| Innovation | Description |
|---|---|
| Proof of Neural Consensus | 4 AI models (TAD, MSAD, SCRA, ESG) score every transaction in real-time |
| Bitcoin-Style Tokenomics | 1B supply, 24 ASF block reward, yearly halving, 20% fee burn, zero pre-mine |
| TRUST Soulbound Token | Non-transferable reputation system with 5 levels and mining multipliers |
| Gasless Transactions | Paymaster system allowing sponsors to pay gas on behalf of users |
| Smart Wallet | Account abstraction with session keys, social recovery, spending limits |
| Game Bridge Platform | External games connect to ASF via SDK for Play-to-Mine rewards and on-chain assets |
| AI Agents | Autonomous on-chain agents with identity, permissions, and trust scoring |
| Hash Commitment Privacy | SHA-512 hash commitments for balance, ownership, and membership verification |
| Cross-Chain Abstraction | Cross-chain abstraction layer with hash anchoring interface (external connectivity planned) |
| DePIN | Physical device registration for decentralized infrastructure mining |
| Post-Quantum Security | CRYSTALS-Dilithium dual signatures alongside Ed25519 |
| Decentralized Identity | W3C-compatible DID system with verifiable credentials |
| EIP-1559 Gas Oracle | Adaptive base fee pricing with priority lanes (SYSTEM, FAST, STANDARD, HEAVY) |
| HD Wallet (BIP-32/44) | Hierarchical deterministic key derivation with mnemonic recovery |
| Compact Block Relay | Header + TX hashes propagation for 90%+ bandwidth savings |
| Network Partition Detection | Automatic detection and graceful recovery from network splits |
| VM v2 Precompiles | Base64, JSON Parse, and Batch Ed25519 Verify native contracts |
| Metric | Value |
|---|---|
| Total Supply | 1,000,000,000 ASF |
| Block Reward | 24 ASF (halving yearly) |
| Block Time | ~12 seconds (Ethereum-aligned) |
| Hash Algorithm | SHA-512 (512-bit) |
| Validators | Unlimited (21 producers/epoch, weighted-random) |
| Chain ID | 420420 |
| RPC Methods | 213 |
| Test Coverage | 6,848 tests (173 test files) |
| Source Modules | 223 |
| Phases Completed | 31 / 31 |
The Positronic blockchain is built as an account-based state machine (similar to Ethereum) with SHA-512 cryptographic hashing, providing 512-bit security output compared to Bitcoin's SHA-256. The architecture prioritizes modularity, allowing each subsystem (AI validation, consensus, token management, identity) to operate independently while integrating seamlessly through the core blockchain orchestrator.
ASF employs SHA-512 as its primary hashing algorithm, providing 256-bit collision resistance and 512-bit preimage resistance. This choice offers several advantages over the SHA-256 used by Bitcoin and most other blockchains:
| Property | SHA-256 | SHA-512 (ASF) |
|---|---|---|
| Output Size | 256 bits (32 bytes) | 512 bits (64 bytes) |
| Collision Resistance | 128 bits | 256 bits |
| Quantum Resistance | ~128 bits (Grover) | ~256 bits (Grover) |
| 64-bit CPU Performance | Slower (32-bit ops) | Faster (native 64-bit ops) |
| Block Size | 512 bits | 1024 bits |
Each block in the ASF chain contains a header with metadata and a list of validated transactions:
| Type | ID | Description |
|---|---|---|
| TRANSFER | 0 | Native ASF coin transfer |
| CONTRACT_CREATE | 1 | Deploy new smart contract |
| CONTRACT_CALL | 2 | Call smart contract method |
| STAKE | 3 | Delegate stake to validator |
| UNSTAKE | 4 | Undelegate from validator |
| EVIDENCE | 5 | Submit forensic evidence on-chain |
| REWARD | 6 | Block reward (system-generated) |
| AI_TREASURY | 7 | AI treasury allocation (system-generated) |
| GAME_REWARD | 8 | Play-to-Mine game reward (system-generated) |
| TOKEN_CREATE | 9 | Create PRC-20 token |
| TOKEN_TRANSFER | 10 | Transfer custom token |
| NFT_MINT | 11 | Mint PRC-721 NFT |
| NFT_TRANSFER | 12 | Transfer NFT |
ASF uses an account-based state model where each account maintains a balance, nonce, optional contract code, storage, and a TRUST reputation score. The global state is organized as a Merkle Patricia Trie, enabling efficient state proofs for light clients and cross-chain verification.
Proof of Neural Consensus is ASF's signature innovation: a consensus mechanism that augments traditional DPoS with a multi-model AI ensemble that scores every transaction for risk before it enters the block. This creates a proactive defense layer that can detect and quarantine malicious activity in real-time, something no existing blockchain offers at the consensus level.
The PoNC ensemble consists of four specialized neural network models, each targeting a different class of threats:
| Model | Full Name | Architecture | Weight | Target Threats |
|---|---|---|---|---|
| TAD | Transaction Anomaly Detector | Autoencoder + VAE (bootstrap-trained) | 30% | Unusual transaction patterns, outliers |
| MSAD | MEV & Sandwich Attack Detector | Temporal Convolutional Network | 25% | Front-running, sandwich attacks, MEV extraction |
| SCRA | Smart Contract Risk Analyzer | Graph Neural Network | 25% | Malicious contracts, reentrancy, exploits |
| ESG | Economic Stability Guardian | LSTM Time Series | 20% | Flash loans, market manipulation, instability |
To optimize performance without sacrificing security, PoNC uses a tiered scoring approach. Not every transaction needs all four models:
| Tier | Models Used | Criteria | Latency |
|---|---|---|---|
| Light | TAD only | Small value + trusted sender (reputation > 0.9, nonce > 50) | ~5ms |
| Medium | TAD + ESG | Moderate value or new sender | ~15ms |
| Full | All 4 models | Large value, contract calls, risky patterns | ~50ms |
The weighted ensemble produces a composite risk score, immediately quantized to integer basis points (0–10,000). Classification uses integer comparison with a ±50bp dead zone for cross-platform determinism (see §3.6):
| Integer Score (bp) | Float Equivalent | Decision | Action |
|---|---|---|---|
| < 8,450 | < 0.845 | ACCEPTED | Transaction proceeds to mempool normally |
| 8,450 — 9,549 | 0.845 — 0.955 | QUARANTINED | Held for manual/validator review |
| ≥ 9,550 | ≥ 0.955 | REJECTED | Transaction refused, sender flagged |
After quantization to integer basis points, the score is adjusted using integer-only arithmetic (_apply_adjustments_q) to maintain cross-platform determinism:
score_q = score_q * 80 // 100 for trusted senders (reputation > 9,000bp, nonce > 50)score_q += 500 for accounts with nonce = 0score_q += 1000 when sender_balance_ratio > 8,000bp
New networks face a cold start problem: freshly trained AI models lack sufficient data to distinguish unusual-but-legitimate transactions from actual anomalies, causing excessive false positives. The ColdStartManager solves this with a three-phase graduated threshold system based on block height:
| Phase | Block Range | Mode | Behavior |
|---|---|---|---|
| A | 0 – 100,000 | Learning | Score every TX but quarantine none; kill switch disabled; collect false positive data |
| B | 100,001 – 500,000 | Calibration | Thresholds tighten linearly toward production; kill switch at 0.5% FP rate (10× stricter); quarantine enabled with 2× review timeout |
| C | 500,001+ | Production | Full thresholds (accept 8,500 bp, quarantine 9,500 bp); kill switch at 5% FP rate; online learning enabled |
False positive reports are rate-limited (10 per hour per reporter) to prevent manipulation. Phase B thresholds interpolate linearly so the network gradually transitions from permissive to strict without sudden behavioral changes.
A critical requirement for consensus is that all validator nodes must produce identical AI classification decisions for the same transaction, regardless of hardware (Intel, AMD, ARM). Two problems must be solved: random seed consistency and floating-point divergence.
All random operations within the neural models are seeded identically via DeterministicContext(seed=AI_CONSENSUS_SEED). This ensures model weight initialization and stochastic operations produce the same values on every node.
IEEE 754 floating-point arithmetic is not deterministic across CPU architectures. The same multiply-accumulate sequence can produce different results on Intel (x87/SSE) vs AMD vs ARM due to different rounding modes, FMA fusion, and intermediate precision. For example, one node might compute a score of 0.8499 (ACCEPT) while another computes 0.8501 (QUARANTINE) — a consensus fork.
To eliminate this, ASF converts all AI scores to integer basis points (0–10,000) immediately after the ensemble weighted average, and all subsequent comparisons use integer arithmetic only:
| Parameter | Float Value | Integer (Basis Points) |
|---|---|---|
| Score Scale | 0.0 – 1.0 | 0 – 10,000 |
| Accept Threshold | 0.85 | 8,500 |
| Quarantine Threshold | 0.95 | 9,500 |
| Dead Zone | ±0.005 | ±50 bp |
Quantization formula: score_q = min(int(float_score * 10000 + 0.5), 10000)
Even after quantization, two nodes might produce scores that differ by 1 basis point due to intermediate float rounding before quantization. The dead zone of ±50 basis points around each threshold ensures these borderline cases are always classified conservatively:
| Condition | Classification |
|---|---|
score_q < accept_q - 50 (i.e. < 8,450) | ACCEPTED |
score_q ≥ reject_q + 50 (i.e. ≥ 9,550) | REJECTED |
| Everything in between | QUARANTINED (safe default) |
score * 10000 quantization,
where a ±1 basis point error is absorbed by the 50bp dead zone — a 50x safety margin.
Reputation adjustments (_apply_adjustments_q) also use integer-only arithmetic:
adjusted = score_q * 80 // 100 instead of score *= 0.8.
After transactions pass the AI validation gate, they enter the DPoS consensus layer where a set of elected validators propose and finalize blocks. ASF's DPoS implementation features Byzantine Fault Tolerant (BFT) finality, slot-based block production, and a comprehensive slashing mechanism to discourage misbehavior.
| Parameter | Value | Description |
|---|---|---|
| MAX_VALIDATORS | 10,000 (soft cap) | All eligible validators active; 21 block producers per epoch (weighted-random) |
| SLOTS_PER_EPOCH | 32 | Number of block slots per epoch |
| BLOCK_TIME | ~12 seconds | Target block production interval (Ethereum-aligned) |
| FINALITY_THRESHOLD | 2/3 supermajority | Required attestations for BFT finality |
| Component | Responsibility |
|---|---|
| SlotClock | Wall-clock timing, epoch/slot derivation |
| ValidatorRegistry | Validator data, status tracking, metrics |
| ValidatorElection | All-eligible election, 21 weighted-random proposers per epoch |
| AttestationTracker | Tracks validator votes on blocks, pro-rata reward distribution |
| StakingManager | Self-bonding, delegation, unbonding, reward distribution |
| FinalityTracker | Attestation accumulation, BFT finality determination |
| SlashingManager | Double-sign detection, downtime penalties, jailing |
Validators go through a defined lifecycle: Register (32 ASF minimum stake) → Activated (all eligible validators join the active set) → Propose & Attest (21 producers selected by weighted-random per epoch; all active validators attest on blocks for pro-rata rewards) → Miss/Double-Sign (penalties triggered) → Jailed (temporarily excluded) → Unjail (re-enter election after timeout).
At each epoch boundary, the system derives a new epoch seed from the previous block hash, runs a validator election that activates ALL eligible validators (no top-N cap), selects 21 block producers via stake-weighted random, processes pending unjail requests, and resets the finality tracker. Epoch-0 uses a deterministic genesis seed.
| Offense | Penalty | Additional |
|---|---|---|
| Double-Sign | 33% stake slashed | 36-epoch jail + exponential backoff; permanent ban after 3 events |
| Extended Downtime | 33% stake slashed | 16 consecutive missed blocks triggers slash + jail |
| Invalid Block Proposal | Block rejected | Trust score reduced |
| Recipient | Share |
|---|---|
| Block Producer | 25% |
| Attesters (pro-rata by stake) | 25% |
| Node Operators / Community Pool | 20% |
| AI Treasury (DAO) | 10% |
| Burn (Deflationary, remainder) | 20% |
ASF adopts a Bitcoin-inspired economic model with a fixed total supply, mining-based distribution, predictable halving schedule, and zero founder pre-mine. This design ensures fair distribution while creating sustainable deflationary pressure through fee burning.
| Allocation | Amount | Percentage | Mechanism |
|---|---|---|---|
| Node Mining | 500,000,000 ASF | 50% | Block rewards (must be mined) |
| Play-to-Mine | 200,000,000 ASF | 20% | Gameplay rewards |
| AI Treasury | 150,000,000 ASF | 15% | DAO-governed, 5% max annual unlock |
| Community | 50,000,000 ASF | 5% | Faucet & airdrops |
| Team | 50,000,000 ASF | 5% | 4-year vesting (1/48 per month) |
| Security Fund | 50,000,000 ASF | 5% | Bug bounties & emergency |
| Founder Pre-mine | 0 ASF | 0% | No pre-mine! |
The initial block reward is 24 ASF, halving approximately once per year (~2.6 million blocks at 12-second intervals). The 12-second block time (aligned with Ethereum) creates a controlled emission schedule that makes ASF significantly scarcer than fast-block chains, driving long-term value through supply discipline.
| Year | Block Reward | Approx. Annual Emission | Cumulative Mined |
|---|---|---|---|
| Year 1 | 24 ASF | ~63M ASF | ~63M |
| Year 2 | 12 ASF | ~31.5M ASF | ~94.5M |
| Year 3 | 6 ASF | ~15.75M ASF | ~110.25M |
| Year 4 | 3 ASF | ~7.9M ASF | ~118.15M |
| Year 5 | 1.5 ASF | ~3.9M ASF | ~122M |
| Year 6+ | < 1 ASF | Diminishing | → 500M cap |
20% of all transaction fees are permanently burned (calculated as the remainder after other shares to prevent rounding dust loss), reducing the circulating supply over time. This creates sustained deflationary pressure, especially as network usage grows. The remaining fees are distributed to block producers (25%), attesters pro-rata by stake (25%), node operators / community pool (20%), and AI treasury (10%).
TRUST is ASF's non-transferable reputation token, permanently bound to each address. Unlike transferable tokens, TRUST cannot be bought, sold, or moved between accounts. It must be earned through consistent positive behavior on the network and can be lost through malicious activity. This creates a genuine meritocratic system where reputation directly impacts mining rewards.
| Level | Score Range | Mining Multiplier | Benefits |
|---|---|---|---|
| 🌱 NEWCOMER | 0 — 99 | 1.0x | Basic access |
| 👤 MEMBER | 100 — 499 | 1.1x | Gasless TX eligible |
| ⭐ TRUSTED | 500 — 1,999 | 1.3x | Light AI tier (faster TX) |
| 👑 VETERAN | 2,000 — 9,999 | 1.6x | Priority mempool |
| 🏆 LEGEND | 10,000+ | 2.0x | Double mining rewards |
| Action | Points |
|---|---|
| Block mined | +1 |
| Game completed | +1 |
| DAO vote cast | +2 |
| Token created | +3 |
| NFT created | +2 |
| Consistent uptime (per epoch) | +1 |
| Offense | Points |
|---|---|
| Suspicious transaction | -20 |
| Quarantined transaction | -10 |
| False evidence submission | -100 |
| Validator slashed | -50 |
| Spam detected | -5 |
To prevent abandoned accounts from retaining high trust scores indefinitely, a decay mechanism reduces the score by 1 point per 30 days of inactivity. The score floor is 0 and cannot go negative. This ensures that only actively participating members maintain their reputation benefits.
For example, a LEGEND-level miner with a 2.0x multiplier earns 48 ASF per block in Year 1 (instead of the standard 24 ASF), creating a strong incentive for long-term positive participation.
ASF provides native token standards that allow anyone to create fungible tokens (PRC-20) and non-fungible tokens (PRC-721) directly on the blockchain. These standards are modeled after Ethereum's ERC-20 and ERC-721 but include ASF-specific enhancements such as AI verification for NFTs.
PRC-20 is the standard for creating custom fungible tokens on the Positronic blockchain. Each token contract tracks balances, allowances, and supply metrics.
| Function | Description |
|---|---|
| transfer(to, amount) | Transfer tokens to an address |
| approve(spender, amount) | Authorize a spender to use tokens |
| transferFrom(from, to, amount) | Spend on behalf of approved owner |
| mint(to, amount) | Create new tokens (owner only) |
| burn(amount) | Permanently destroy tokens |
State Tracking: balances (per address), allowances (owner-spender pairs), total_supply, decimals (configurable), holder_count, transfer_count, total_burned.
PRC-721 extends the traditional NFT standard with two unique features: dynamic metadata (NFTs whose properties can evolve over time) and AI verification (each NFT receives an authenticity score from the AI validation system).
| Function | Description |
|---|---|
| mint(to, metadata) | Create new NFT with metadata (name, description, image_uri, attributes) |
| transfer(from, to, token_id) | Transfer NFT ownership |
| approve(to, token_id) | Approve address to manage NFT |
| set_approval_for_all(operator, approved) | Approve operator for all NFTs |
| burn(token_id) | Permanently destroy NFT |
| update_metadata(token_id, new_metadata) | Update dynamic NFT properties |
Each PRC-721 NFT includes an ai_verified boolean and an ai_score (0.0 to 1.0). The AI system analyzes NFT metadata and associated content to detect plagiarism, verify originality, and assess quality. This provides buyers with an objective authenticity measure directly on-chain.
When the dynamic flag is set during minting, the NFT's metadata can be updated over time. This enables evolving game characters, real-time data NFTs, and progressive artwork that changes based on on-chain events.
All created tokens and NFT collections are registered in the global TokenRegistry, providing a unified catalog for discovery, search, and verification. Token creation incurs a fee that is burned, preventing spam.
One of the biggest barriers to blockchain adoption is the requirement for new users to acquire native tokens before they can perform any action. ASF solves this with its Paymaster System, which allows sponsors (such as game developers, dApp operators, or enterprises) to pay transaction fees on behalf of their users.
A Paymaster is an on-chain entity that pre-deposits ASF coins into a sponsorship pool. When a user submits a transaction that qualifies for sponsorship, the gas fee is deducted from the Paymaster's balance instead of the user's account. This enables zero-friction onboarding for new users.
| Parameter | Default | Description |
|---|---|---|
| max_gas_per_tx | 100,000 | Maximum gas units per sponsored transaction |
| daily_limit | 1,000,000 | Total daily gas budget |
| daily_used | 0 | Cumulative gas used (resets every 24h) |
| allowed_recipients | [] (all) | Whitelist of allowed recipient addresses |
| active | true | Enable/disable sponsorship |
Additional protections include per-transaction gas limits, daily aggregate limits, and the ability for Paymasters to restrict sponsorship to specific contract addresses.
The daily_used counter automatically resets to zero after 86,400 seconds (24 hours), ensuring that the daily budget refreshes for the next day.
ASF's Smart Wallet system implements account abstraction, providing users with programmable wallets that support temporary session keys, social recovery, daily spending limits, and emergency locking — all without requiring users to manage seed phrases.
Session keys are temporary cryptographic keys with limited permissions and automatic expiration. They are ideal for gaming sessions where a user wants to authorize game actions without approving each transaction individually.
| Property | Description |
|---|---|
| expires_at | Automatic expiration timestamp |
| permissions | Allowed transaction types (e.g., GAME_REWARD only) |
| max_value_per_tx | Maximum value per transaction |
| total_spent | Cumulative spending tracker |
Instead of seed phrases, Smart Wallets use a guardian-based recovery system. Users designate trusted addresses as recovery guardians and set a threshold (default: 2). If access is lost, the required number of guardians can collectively authorize wallet recovery to a new key.
Each Smart Wallet can set a daily_spending_limit that restricts the total value that can be sent within a 24-hour period. The can_spend(amount) method validates against this limit before authorizing any transaction. Setting the limit to 0 disables the restriction.
The is_locked flag provides an emergency freeze mechanism. When activated, no outgoing transactions are permitted regardless of session keys or guardian approvals. Only the primary owner key can unlock the wallet.
Positronic does not host games directly. Instead, it provides a Game Bridge SDK that allows external games — mobile, PC, console, or web — to connect to the ASF blockchain. Game developers integrate the SDK to enable Play-to-Mine rewards, on-chain assets (NFTs), and gasless transactions for their players.
The game runs on the developer's own infrastructure. Only reward claims, asset ownership, and session proofs are recorded on-chain, keeping the blockchain lean while giving players real ownership of their in-game achievements.
| Feature | Description |
|---|---|
| Session Management | Cryptographic game sessions with start/end proofs recorded on-chain |
| Reward Claims | Players earn ASF based on verified gameplay; rewards are minted via Play-to-Mine allocation |
| Custom Game Tokens | Games create their own PRC-20 tokens (up to 3 per game) for in-game economies |
| NFT Integration | Games mint PRC-721 NFTs for in-game items, characters, or achievements (up to 5 collections per game) |
| Game-to-Token Bridge | Orchestration layer connecting game sessions to token minting and reward distribution |
| Gasless Play | Paymaster sponsorship so players never pay gas fees during gameplay |
| Anti-Cheat Verification | AI validation scores game sessions; suspicious results are quarantined |
| SQLite Persistence | Game sessions, emissions, and token mappings persist across node restarts |
| Leaderboards | On-chain leaderboards and player stats via RPC API |
| Game Ecosystem Fees | 100 ASF one-time registration fee per game; 5% emission tax on daily Play-to-Mine rewards directed to team wallet |
Each game defines its own base_reward and difficulty_factor. The player's TRUST score determines the multiplier (1.0x to 2.0x). ASF rewards draw from the 200M ASF Play-to-Mine allocation. A 5% emission tax is applied to daily Play-to-Mine emissions and directed to the team wallet to fund ongoing development. Games can also distribute their own custom PRC-20 tokens as additional rewards. All rewards are subject to AI anti-cheat verification and 4-layer emission control (global → per-game → per-player → per-session).
| SDK | Language | Key Classes |
|---|---|---|
| positronic-game-sdk | Python | PositronicGameSDK, GameSession, GameTokenBridge |
| @positronic/game-bridge | JavaScript/TypeScript | PositronicGameBridge, GameSession, GameTokenBridge |
| positronic-telegram | JavaScript (Telegram) | PositronicTelegram, GameSession |
The Game Token Bridge is an orchestration layer that allows registered games to create and manage their own on-chain economies:
| Capability | Limit | Description |
|---|---|---|
| Custom PRC-20 Tokens | 3 per game | Games create fungible tokens for in-game currency, points, or rewards |
| NFT Collections | 5 per game | Games create PRC-721 collections for items, characters, achievements |
| Token Distribution | 1s cooldown | Games distribute custom tokens to players as rewards |
| NFT Minting | 1s cooldown | Games mint NFT items with dynamic metadata to players |
| On-chain Settlement | Every 100 blocks | Pending rewards are flushed to blockchain state periodically |
ASF provides a native framework for registering and managing autonomous AI agents on the blockchain. Each agent has a unique identity, defined permissions, and a trust score that evolves based on its performance history.
| Type | ID | Purpose |
|---|---|---|
| VALIDATOR | 0 | Transaction validation assistance |
| TRADING | 1 | Automated trading strategies |
| GAME | 2 | Game AI & NPC behavior |
| ANALYTICS | 3 | Data analysis & insights |
| GOVERNANCE | 4 | DAO voting & proposal management |
Each agent receives a unique agent_id derived from SHA-256 hashing. The agent's trust score starts at 0 and adjusts based on actions: +1 per successful action, -5 per failure. The success rate is calculated as executed / (executed + failed).
Agents operate within a defined permission set that specifies which actions they are allowed to perform. Owners can pause, resume, or ban their agents at any time. The action history (last 50 actions) is logged with timestamps, data hashes, and success/failure status for full auditability.
ACTIVE (0) → can execute actions | PAUSED (1) → temporarily suspended | BANNED (2) → permanently disabled
ASF's privacy system uses hash commitments and Schnorr sigma protocols to allow users to prove statements about their data without revealing the underlying information. This is critical for financial privacy, identity verification, and confidential evidence handling in legal proceedings.
getZKStats) is retained for backward compatibility.
| Proof Type | Proves | Reveals |
|---|---|---|
| prove_balance_above | Account balance exceeds threshold X | Nothing (not even exact balance) |
| prove_ownership | Ownership of a specific asset | Nothing about the owner's identity |
| prove_membership | Membership in a specific group | Nothing about which member |
ASF uses a SHA-512-based commitment scheme (simplified for efficiency):
| Field | Type | Description |
|---|---|---|
| proof_type | string | "balance_above", "ownership", "membership" |
| commitment | bytes | Blinded commitment (SHA-512 hash) |
| challenge | bytes | Verifier challenge |
| response | bytes | Prover's response |
| public_input | dict | Public parameters (threshold, asset_id, group_hash) |
| verified | bool | Verification result |
The hash commitment system integrates with ASF's forensic evidence system through ConfidentialEvidence, which combines encrypted evidence data with a hash commitment proof of authenticity. Only authorized viewers (e.g., judges, investigators) can decrypt the content, while the proof ensures that the evidence has not been tampered with.
ASF's cross-chain bridge enables interoperability with major blockchain networks through hash anchoring — posting ASF state hashes onto external chains for additional security guarantees, and verifying proofs from external chains on ASF.
Implementation Note: The bridge currently provides a cross-chain abstraction layer with hash anchoring interfaces. Live connectivity to Ethereum, Bitcoin, Polygon, and BSC networks requires external relayer deployment (not yet operational).
| Chain | ID | Use Case |
|---|---|---|
| Ethereum | 0 | Evidence anchoring, DeFi bridges |
| Bitcoin | 1 | Immutability anchoring |
| Polygon | 2 | Low-cost anchoring |
| BSC | 3 | High-throughput bridge |
Critical ASF data (evidence hashes, state roots, checkpoint hashes) can be anchored on external chains. The AnchoredHash structure tracks the anchor lifecycle:
| Field | Description |
|---|---|
| anchor_id | Unique anchor identifier |
| source_hash | Original hash from ASF chain |
| target_chain | Destination network |
| target_tx_hash | Transaction hash on external chain |
| status | PENDING (0) → CONFIRMED (1) or FAILED (2) |
| block_height | ASF block height reference |
Proofs submitted from external chains are verified on ASF through the submit_external_proof and verify_external_proof functions, enabling trustless cross-chain state verification.
DePIN (Decentralized Physical Infrastructure Networks) allows real-world hardware devices to register on the Positronic blockchain, submit data, and earn rewards for their contributions. This bridges the gap between the physical world and the blockchain.
| Type | ID | Use Case |
|---|---|---|
| CAMERA | 0 | Security cameras providing evidence footage |
| SENSOR | 1 | IoT sensors for environmental data |
| GPU | 2 | GPU compute for AI training |
| STORAGE | 3 | Decentralized storage nodes |
| NETWORK | 4 | Network relay and connectivity devices |
REGISTERED (0) → ACTIVE (1) → OFFLINE (2) or BANNED (3)
Devices must send a heartbeat() at least every 10 minutes to remain active. The heartbeat also transitions newly registered devices to ACTIVE status.
Active devices call submit_data(data_hash) to submit evidence of their work. Each valid submission earns 1 reward unit. The DePIN registry tracks cumulative stats per device: uptime_hours, data_submitted, and rewards_earned.
Each device registers with geographic coordinates (latitude/longitude), enabling location-based queries and regional infrastructure mapping.
Quantum computers pose an existential threat to the elliptic curve cryptography (Ed25519, ECDSA) that secures nearly all blockchains today. ASF proactively addresses this through a dual-signature system that pairs traditional Ed25519 signatures with quantum-resistant CRYSTALS-Dilithium2 signatures.
Shor's algorithm, when run on a sufficiently large quantum computer, can break the discrete logarithm problem underlying Ed25519 and ECDSA in polynomial time. While large-scale quantum computers do not yet exist, the blockchain's immutable record means that transactions signed today could be forged by quantum computers in the future ("harvest now, decrypt later" attacks).
ASF implements real CRYSTALS-Dilithium2 (ML-DSA-44, FIPS 204) via the pqcrypto library, which wraps the NIST-standardized reference C implementation. The lattice-based signature scheme provides NIST Level 2 (~128-bit) post-quantum security using Module-LWE / Module-SIS hardness assumptions.
| Property | Ed25519 (Current) | ML-DSA-44 (Post-Quantum) |
|---|---|---|
| Public Key Size | 32 bytes | 1,312 bytes |
| Secret Key Size | 64 bytes | 2,560 bytes |
| Signature Size | 64 bytes | 2,420 bytes |
| Security Level | ~128-bit classical | ~128-bit quantum (NIST Level 2) |
| Quantum Resistant | ❌ No | ✅ Yes (FIPS 204) |
| Library | cryptography (PyCA) | pqcrypto (reference C impl) |
The DualSignature structure carries both an Ed25519 signature and a post-quantum signature. The is_quantum_safe property returns true when the PQ signature is present.
The PostQuantumManager maintains a registry of PQ public keys mapped to addresses. Functions include: register_pq_key, has_pq_key, get_pq_key, and verify_dual_signature.
ASF implements a W3C-compatible Decentralized Identifier (DID) system that gives users self-sovereign identity on the blockchain. Users can create identities, issue verifiable credentials, and manage their digital presence without relying on centralized identity providers.
Each DID is derived from the user's blockchain address and follows the W3C DID specification.
| Field | Type | Description |
|---|---|---|
| credential_id | string | Unique credential identifier |
| issuer | DID | DID of the credential issuer |
| subject | DID | DID of the credential holder |
| claim_type | string | "education", "employment", "certification", etc. |
| claim_data | dict | Flexible JSON claim payload |
| issued_at | timestamp | Issuance time |
| expires_at | timestamp | Expiration (0 = never expires) |
| revoked | bool | Revocation status |
| Operation | Description |
|---|---|
| create_identity | Create new DID with public key |
| issue_credential | Issue verifiable credential to subject |
| verify_credential | Verify credential validity (not revoked, not expired) |
| revoke_credential | Revoke a previously issued credential |
| deactivate_identity | Permanently deactivate a DID |
| add_service | Add service endpoint (e.g., messaging, storage) |
Beyond the AI Validation Gate, ASF operates a Neural Immune System that provides continuous, real-time threat monitoring and automated response. This system acts as the blockchain's immune defense, identifying and neutralizing threats before they can cause damage.
The Neural Immune System monitors for multiple categories of threats: Sybil attacks (fake identity proliferation), DDoS patterns (transaction flooding), spam transactions, double-spend attempts, and economic manipulation.
Neural Validator Nodes (NVN) earn military-style ranks based on their performance through the AIRankManager. Higher ranks receive greater fee shares and voting power in AI model governance decisions.
Transactions flagged by the AI gate (integer score 8,500–9,499 bp; see §3.6) are placed in the quarantine pool. Two release paths exist:
QUARANTINE_REVIEW_INTERVAL (100 blocks) the AI gate rescores each quarantined TX. If the score drops below 8,500 bp, the TX is released into the mempool.vote_appeal(tx_hash, vote_for, voter_id). A supermajority (>2:1 for/against) releases the TX immediately.Transactions not released within MAX_QUARANTINE_TIME (1,000 blocks) expire and are discarded. Users may file an appeal with a deposit of IMMUNE_APPEAL_DEPOSIT (10 ASF), refunded on successful appeal.
| Parameter | Value |
|---|---|
| Review interval | 100 blocks |
| Max quarantine | 1,000 blocks |
| Appeal deposit | 10 ASF |
| Appeal threshold | >2:1 supermajority |
When persistent threats are detected, the system can automatically ban offending addresses, increase AI scrutiny levels for related transactions, alert the validator set, and trigger emergency governance proposals if the threat is systemic.
Before any new token can be deployed on the Positronic network, it must pass through a dual-gate governance process: first an AI risk assessment, then a council vote. This prevents scam tokens, rug-pulls, and low-quality projects from launching on the network.
Governance Flow:
| Parameter | Value |
|---|---|
| AI Risk Threshold | < 0.7 to pass (higher = riskier) |
| Council Approval | 60% supermajority required |
| Minimum Votes | 3 council members |
| Proposal Types | TOKEN_CREATION, TOKEN_MODIFICATION, AI_MODEL_UPDATE, PARAMETER_CHANGE, EMERGENCY_ACTION |
| Proposal Statuses | SUBMITTED → AI_REVIEWING → AI_APPROVED → COUNCIL_VOTING → APPROVED → DEPLOYED |
Changes to the AI validation models (weights, thresholds, versions) are governed through an on-chain supermajority vote. This includes a kill switch for emergency situations and treasury spending control.
| Parameter | Standard Proposals | Treasury Spending |
|---|---|---|
| Approval Threshold | 66% supermajority | 75% supermajority |
| Quorum Requirement | 10% of stakers | 20% of stakers |
| Voting Period | 1,000 blocks (~50 min) | 1,000 blocks (~50 min) |
| Max Single Spend | N/A | 10,000,000 ASF (5% of treasury) |
Model Governance Proposal Types:
| Type | Description | Example |
|---|---|---|
| MODEL_UPDATE | Deploy a new AI model version | Upgrade TAD from v1.0 to v2.0 |
| WEIGHT_CHANGE | Adjust model component weights | Increase MSAD weight from 25% to 30% |
| KILL_SWITCH | Enable/disable AI validation | Disable AI gate during emergency |
| THRESHOLD_CHANGE | Change accept/quarantine thresholds | Lower quarantine threshold to 0.80 |
| TREASURY_SPEND | Spend from AI treasury | Fund external security audit |
Positronic includes a built-in compliance and forensic evidence system purpose-built for legal admissibility. Every on-chain event can be collected, verified, cryptographically signed, anchored to immutable storage, and exported as a court-ready document — making Positronic the first blockchain designed from the ground up to produce evidence packages that meet the evidentiary standards of modern legal proceedings.
The WalletRegistry provides AI-verified address tracking for compliance. Unlike traditional KYC systems, wallet verification is performed by the network’s AI engine, which analyzes on-chain behavior, source type, and historical patterns to assign a trust score. Users retain pseudonymous usage by default; identity association is opt-in and requires user consent.
| Status | Description | Permissions |
|---|---|---|
| UNREGISTERED | Unknown wallet, no verification submitted | Restricted — basic transfers only |
| PENDING | Registration submitted, awaiting AI verification | Restricted — same as unregistered |
| REGISTERED | AI-verified, full access granted | Full — all transaction types |
| FLAGGED | Suspicious activity detected by AI | Reduced — large transfers require additional review |
| SUSPENDED | Temporarily frozen pending investigation | None — all transactions blocked |
| BLACKLISTED | Permanently banned from the network | None — permanently blocked |
Each registered wallet is assigned a trust tier based on AI analysis of on-chain history, transaction volume, and behavior patterns. Tiers determine transaction limits and access levels:
| Tier | Requirements | Transaction Limits |
|---|---|---|
| BASIC | Newly registered, limited history | Standard limits |
| VERIFIED | Established transaction history, no flags | Elevated limits |
| TRUSTED | Long-term good behavior, high AI trust score | High limits |
| INSTITUTIONAL | Exchange or institutional wallet, verified source | Institutional-grade limits |
The AI trust score is a continuous value from 0.0 to 1.0, computed from wallet age, transaction patterns, flagged count, and source type (wallet app, exchange, contract, etc.). Tier promotion and demotion are automatic based on this score.
The ForensicReporter generates detailed, structured forensic reports for legal and regulatory use. Each report collects on-chain evidence items, computes findings, and produces a tamper-proof document sealed with Ed25519 digital signatures and SHA-512 cryptographic hashing.
| Type | Description | Use Case |
|---|---|---|
| TRANSACTION_TRACE | Full trace of a single transaction through the network | Fraud investigation, dispute resolution |
| WALLET_HISTORY | Complete activity history of a wallet address | Account auditing, tax compliance |
| FUND_FLOW | Track flow of funds between multiple addresses | Money laundering detection, asset tracing |
| SUSPICIOUS_ACTIVITY | SAR (Suspicious Activity Report) with AI risk assessment | AML/CFT compliance, regulatory reporting |
| COMPLIANCE_AUDIT | Full compliance audit of an address or entity | Regulatory examination, due diligence |
| INCIDENT_REPORT | Security incident documentation with timeline | Breach response, post-mortem analysis |
Each piece of forensic evidence (ForensicEvidence) contains the following verified fields:
| Field | Description |
|---|---|
| evidence_type | Category of evidence (transaction, state change, event, etc.) |
| timestamp | Exact UNIX timestamp of the on-chain event |
| block_height | Block number where the event was recorded |
| tx_hash | Transaction hash for verification against the blockchain |
| description | Human-readable description of the evidence |
| data | Structured payload containing event-specific details |
Every forensic report is cryptographically sealed using a three-step integrity process:
The SHA-512 hash covers all report fields (report ID, type, creation timestamp, subject address, evidence list, findings, and risk score). The Ed25519 signature binds the hash to the signer’s public key. Anyone can verify the report signature using the signer’s public key without needing access to the original data — providing non-repudiation and tamper detection suitable for court proceedings.
The CourtReportGenerator transforms forensic reports into complete, court-ready evidence packages. The pipeline follows a five-stage process designed for legal admissibility:
| Stage | Operation | Output |
|---|---|---|
| 1. Collect | Gather relevant on-chain data (transactions, state changes, events) | ForensicEvidence items |
| 2. Verify | AI validation of evidence integrity; Ed25519 signature verification | Signed ForensicReport |
| 3. Anchor | SHA-512 hash of report anchored on the Positronic chain | On-chain hash record |
| 4. Cross-Anchor | Hash anchored on Ethereum and/or Bitcoin for additional immutability | Cross-chain proof |
| 5. Report | Generate court-ready document with exhibits and chain of custody | CourtReport package |
Each EvidenceExhibit in a court report includes the forensic evidence, a Merkle proof linking the evidence to the block’s state root, and block finality data proving the block has been finalized by the consensus mechanism. This provides cryptographic proof that the evidence existed on-chain at a specific point in time and has not been altered since.
Every court report includes a digital Chain of Custody record — an immutable, timestamped log that tracks every action taken on the evidence from creation to delivery:
| Field | Description |
|---|---|
| created_at | Timestamp when the custody record was initiated |
| created_by | Identity of the entity that created the record |
| blockchain_height | Block height at the time of creation |
| report_hash | SHA-512 hash of the associated report |
| entries[] | Timestamped log entries (action, actor, details) for every custody event |
When combined with the Hash Commitment Privacy system, evidence can be encrypted and stored with hash commitments of authenticity. The ConfidentialEvidence mechanism stores:
| Component | Description |
|---|---|
| encrypted_data | AES-256 encrypted evidence payload |
| commitment_proof | Hash commitment verifying that the encrypted data matches the original evidence hash |
| authorized_viewers | List of public keys authorized to decrypt and view the evidence |
Only authorized viewers (judges, investigators, regulators) can access the decrypted content using their private keys. The hash commitment ensures that anyone — including unauthorized parties — can verify that the evidence has not been altered, without seeing the evidence itself. This enables privacy-preserving legal compliance: sensitive data remains encrypted while its integrity is publicly verifiable.
Positronic’s evidence system is designed to meet the evidentiary requirements of multiple legal frameworks. The following integrity chain ensures that every piece of evidence can withstand legal scrutiny:
| Legal Requirement | How Positronic Satisfies It |
|---|---|
| Authentication (FRE 901) | Ed25519 digital signature by known signer + SHA-512 hash verification |
| Integrity / Tamper-proofing | SHA-512 hash anchored on-chain; any modification breaks the hash chain |
| Chain of Custody | Immutable, timestamped custody log with actor identification at every step |
| Timestamping | Block height + UNIX timestamp; cross-anchored on Ethereum/Bitcoin for independent verification |
| Non-repudiation | Ed25519 signature binds the report to the signer’s identity; cannot be denied |
| Confidentiality | ZK-encrypted evidence with authorized-viewer access control |
Blockchain immutability and GDPR’s right to erasure present a fundamental tension. Positronic resolves this through the Confidential Evidence mechanism: personal data is never stored in plaintext on-chain. Instead, encrypted evidence can have its decryption keys revoked, making the on-chain data effectively inaccessible while preserving the integrity proof. This satisfies the “right to be forgotten” without compromising the evidence chain.
Authorized entities (law enforcement, regulators, court-appointed investigators) can request evidence through the RPC API endpoints described in Section 18.6. All access is logged in the chain of custody, and confidential evidence requires the requester’s public key to be in the authorized viewers list — ensuring that access control is cryptographically enforced rather than policy-based.
Positronic exposes five dedicated JSON-RPC endpoints for forensic and legal operations. These endpoints enable authorized tools and interfaces to interact with the compliance system programmatically:
| Endpoint | Description | Parameters |
|---|---|---|
| positronic_getForensicStats | Retrieve forensic system statistics (total reports, active investigations) | None |
| positronic_getForensicReport | Retrieve a forensic report by its unique ID | [report_id] |
| positronic_generateCourtReport | Generate a court-ready evidence report from a forensic report | [report_id, case_reference?] |
| positronic_getEvidencePackage | Get the complete evidence package (exhibits, custody chain, signatures) | [court_report_id] |
| positronic_verifyEvidence | Verify evidence integrity against blockchain anchors | [court_report_id] |
Phase 17 represents the culmination of the ASF protocol design: a mega-phase that combines four enhancement pillars into a single cohesive upgrade. Named GOD CHAIN, this phase embodies the project's core philosophy: no transaction is ever rejected because of infrastructure failures, no user is ever unhappy. Every new feature follows a fail-open design — if any component fails, the old behavior continues silently.
ASF now implements an Ethereum-style EIP-1559 gas pricing mechanism with bounded adaptive base fees. The base fee adjusts up or down by a maximum of 12.5% per block based on utilization. The fee is clamped to a range of [1, 1000] to prevent extreme pricing.
| Parameter | Value | Description |
|---|---|---|
| Base Fee Floor | 1 | Minimum base fee (always affordable) |
| Base Fee Ceiling | 1,000 | Maximum base fee (bounded) |
| Change Denominator | 8 | Max ±12.5% change per block |
| Fee History Size | 256 | Blocks of fee history stored |
Transactions are automatically classified into four priority lanes for optimal ordering within blocks:
| Lane | Priority | Types | Description |
|---|---|---|---|
| SYSTEM | Highest | REWARD, AI_TREASURY | Always processed first |
| FAST | High | TRANSFER (≤42k gas) | Simple transfers, quick settlement |
| STANDARD | Normal | All other TXs | Contract calls, default lane |
| HEAVY | Low | CREATE (≥500k gas) | Resource-intensive operations |
Transaction validation (signature verification, nonce checking, balance checking) is now parallelized using a thread pool of 4 workers. Execution remains sequential to preserve state consistency. If the thread pool fails, validation falls back to the original sequential approach.
Block propagation is optimized by transmitting only the block header and ordered transaction hashes. Receiving peers reconstruct the full block from their local mempool. System transactions (rewards, AI treasury) are prefilled since peers won't have them. If reconstruction fails, the peer requests a full block.
Each peer is evaluated across five weighted dimensions to optimize connection quality:
| Dimension | Weight | Description |
|---|---|---|
| Latency | 20% | Response time consistency |
| Reliability | 25% | Uptime and message delivery rate |
| Bandwidth | 15% | Data transfer capacity |
| Chain Sync | 25% | How close the peer is to chain tip |
| Behavior | 15% | Protocol compliance and honesty |
Scores gradually decay toward neutral (50) over time with a decay rate of 0.99, preventing permanently biased scoring from temporary network issues.
The partition detector monitors three signals: block arrival timeout (3× BLOCK_TIME without new blocks), peer count drops (below 3 peers), and chain height divergence (peers report heights 10+ blocks ahead). The detector transitions through four states:
| State | Meaning | Recovery Action |
|---|---|---|
| HEALTHY | Normal operation | None needed |
| DEGRADED | Warning signals detected | Monitoring intensified |
| PARTITIONED | Confirmed network split | Aggressive peer discovery |
| RECOVERING | Recovery in progress | Status requests to all peers |
Every node exposes a GET /metrics endpoint on the RPC port (default 8545) in Prometheus text exposition format. A background MetricsCollector polls blockchain height, peer count, mempool size, AI scoring stats, and consensus participation every 5 seconds. Pre-defined gauges and counters include:
| Metric | Type | Description |
|---|---|---|
positronic_chain_height | gauge | Current blockchain height |
positronic_peers_connected | gauge | Number of connected peers |
positronic_mempool_size | gauge | Pending transactions in mempool |
positronic_ai_total_scored | counter | Total transactions scored by AI |
positronic_validators_active | gauge | Number of active validators |
positronic_health_status | gauge | Overall health (0=healthy, 4=down) |
Three new native precompiles extend the VM's capabilities:
| Address | Name | Gas Cost | Description |
|---|---|---|---|
| 0x05 | BASE64 | 30 + 5/word | Encode/decode Base64 data |
| 0x06 | JSON_PARSE | 100 + 10/word | Parse JSON string, extract field by name |
| 0x07 | BATCH_VERIFY | 2,000/sig | Batch Ed25519 signature verification (discounted) |
The VM.simulate() method enables state-free execution for eth_call and eth_estimateGas. It takes a state snapshot before execution, runs the transaction fully, and always reverts the state afterward. This allows accurate gas estimation and dry-run queries without any side effects.
When smart contracts revert, the decoder extracts human-readable error messages from the revert data. Supported formats include Error(string) (Solidity custom errors), Panic(uint256) (11 mapped panic codes), and raw hex fallback for unknown error selectors.
ASF now supports hierarchical deterministic key derivation using HMAC-SHA512 for deterministic address generation from a single mnemonic seed phrase:
| Feature | Specification |
|---|---|
| Mnemonic | 12 or 24 words (BIP-39 compatible word list) |
| Seed Derivation | PBKDF2-SHA512 (2048 rounds) |
| Key Derivation | HMAC-SHA512 chain code splitting |
| Coin Type | 420420 (ASF Chain ID) |
| Max Accounts | 100 |
| Max Addresses | 1,000 per account |
| Fallback | Random key generation if HD derivation fails |
Two new wallet modules provide user-friendly account management:
resolve("alice") returns the stored address, while resolve("0x1234...") passes through unchanged.| Method | Description |
|---|---|
| positronic_getGasOracle | Current gas pricing with base fee and priority fee tiers |
| positronic_getFeeHistory | Historical fee data for last N blocks |
| positronic_getTxLaneStats | Transaction lane distribution statistics |
| positronic_getCompactBlockStats | Compact block relay performance metrics |
| positronic_getPartitionStatus | Network partition health and signal data |
| positronic_getPeerScores | Multi-dimensional peer scoring breakdown |
| positronic_getRevertReason | Decode revert data to human-readable message |
| positronic_hdCreateWallet | Create HD wallet with mnemonic seed phrase |
| positronic_hdDeriveAddress | Derive new address from HD wallet |
| positronic_getAddressHistory | Transaction history for a specific address |
ASF exposes 213 RPC methods organized across 30+ categories. The API is fully compatible with Ethereum's JSON-RPC specification for standard operations, while providing extensive Positronic-specific methods for advanced features.
| Category | Namespace | Count | Key Methods |
|---|---|---|---|
| Ethereum Compatible | eth_* | 13 | chainId, blockNumber, getBalance, sendRawTransaction |
| Network | net_* | 1 | version |
| Positronic Core | positronic_* | 6 | getAIScore, getAIStats, getQuarantinePool, nodeInfo, getNetworkHealth, formatDenomination |
| Wallet Registry | positronic_* | 3 | getWalletInfo, getWalletStats, isWalletRegistered |
| AI Rank | positronic_* | 2 | getAIRank, getAIRankStats |
| Node Ranking | positronic_* | 3 | getNodeRank, getNodeLeaderboard, getNodeStats |
| Neural Immune | positronic_* | 2 | getImmuneStatus, getRecentThreats |
| Token Governance | positronic_* | 3 | getGovernanceStats, getPendingProposals, getProposal |
| Forensic Reports | positronic_* | 2 | getForensicStats, getForensicReport |
| Play-to-Earn | positronic_* | 4 | getGameStats, getPlayerProfile, getGameLeaderboard, submitGameResult |
| Play-to-Mine | positronic_* | 3 | getPromotionStatus, optInAutoPromotion, getPlayToMineStats |
| Health Monitor | positronic_* | 1 | getHealthReport |
| SPV / Light Client | positronic_* | 2 | getMerkleProof, verifyMerkleProof |
| Checkpoints | positronic_* | 3 | getCheckpoint, getLatestCheckpoint, getCheckpointStats |
| Multisig | positronic_* | 2 | getMultisigWallet, getMultisigStats |
| Faucet | positronic_* | 2 | faucetDrip, getFaucetStats |
| Court Evidence | positronic_* | 3 | generateCourtReport, getEvidencePackage, verifyEvidence |
| TRUST Token | positronic_* | 4 | getTrustScore, getTrustProfile, getTrustLeaderboard, getTrustStats |
| PRC-20 Tokens | positronic_* | 4 | createToken, getTokenInfo, getTokenBalance, listTokens |
| PRC-721 NFTs | positronic_* | 6 | createNFTCollection, getNFTCollection, getNFTMetadata, getNFTsOfOwner, listCollections, getTokenRegistryStats |
| Gasless (Paymaster) | positronic_* | 3 | registerPaymaster, getPaymasterInfo, getPaymasterStats |
| Smart Wallet | positronic_* | 3 | createSmartWallet, getSmartWallet, getSmartWalletStats |
| Game Bridge | positronic_* | 12 | startGameSession, getGameSessionState, getGameBridgeStats, gameCreateToken, gameCreateCollection, gameMintItem, gameDistributeReward, getGameTokens, getGameCollections, getGameTokenBridgeStats, tokenMint, mintNFT |
| AI Agents | positronic_* | 4 | registerAgent, getAgentInfo, getAgentsByOwner, getAgentStats |
| Hash Commitment Privacy | positronic_* | 1 | getZKStats |
| Cross-Chain | positronic_* | 2 | getBridgeStats, getAnchor |
| DePIN | positronic_* | 3 | registerDevice, getDeviceInfo, getDePINStats |
| Post-Quantum | positronic_* | 2 | getPQStats, hasPQKey |
| DID | positronic_* | 3 | createIdentity, getIdentity, getDIDStats |
| Security (Phase 15) | positronic_* | 3 | sessionHeartbeat, emergencyPauseSession, getGameSecurityStats |
| Parameter | Value |
|---|---|
| RPC URL | https://rpc.positronic-ai.network |
| Chain ID | 420420 |
| Symbol | ASF |
| Protocol | JSON-RPC 2.0 |
| Transport | HTTP/HTTPS, WebSocket |
Get AI Score for a Transaction:
// Request curl -X POST https://rpc.positronic-ai.network \ -H "Content-Type: application/json" \ -d '{ "jsonrpc": "2.0", "method": "positronic_getAIScore", "params": ["0xa1b2c3d4e5f6..."], "id": 1 }' // Response { "jsonrpc": "2.0", "id": 1, "result": { "tx_hash": "0xa1b2c3d4e5f6...", "composite_score": 0.23, "verdict": "ACCEPT", "models": { "TAD": 0.18, "MSAD": 0.31, "SCRA": 0.22, "ESG": 0.19 } } }
Get TRUST Score:
// Request curl -X POST https://rpc.positronic-ai.network \ -H "Content-Type: application/json" \ -d '{ "jsonrpc": "2.0", "method": "positronic_getTrustScore", "params": ["0x742d35Cc6634..."], "id": 2 }' // Response { "jsonrpc": "2.0", "id": 2, "result": { "address": "0x742d35Cc6634...", "score": 2450, "level": "VETERAN", "multiplier": 1.6 } }
Get Balance (Ethereum-compatible):
// Request curl -X POST https://rpc.positronic-ai.network \ -H "Content-Type: application/json" \ -d '{ "jsonrpc": "2.0", "method": "eth_getBalance", "params": ["0x742d35Cc6634...", "latest"], "id": 3 }' // Response { "jsonrpc": "2.0", "id": 3, "result": "0x56bc75e2d63100000" }
Register DePIN Device:
// Request curl -X POST https://rpc.positronic-ai.network \ -H "Content-Type: application/json" \ -d '{ "jsonrpc": "2.0", "method": "positronic_registerDevice", "params": [{ "owner": "0x742d35Cc6634...", "device_type": "gpu", "capabilities": {"tflops": 12.5}, "location": "US-WEST" }], "id": 4 }' // Response { "jsonrpc": "2.0", "id": 4, "result": { "device_id": "DEV-1708612345-0001", "status": "REGISTERED", "rewards_eligible": true } }
The following table compares ASF's capabilities against leading blockchain platforms:
| Feature | ASF | Ethereum | Bitcoin | Solana | NEAR |
|---|---|---|---|---|---|
| Consensus | PoNC (AI+DPoS) | PoS | PoW | PoH+PoS | PoS (Nightshade) |
| AI in Consensus | ✅ 4 Models | ❌ | ❌ | ❌ | ❌ |
| Block Time | ~12s | ~12s | ~10min | ~0.4s | ~1s |
| Hash Algorithm | SHA-512 | Keccak-256 | SHA-256d | SHA-256 | SHA-256 |
| Soulbound Token | ✅ TRUST | ❌ | ❌ | ❌ | ❌ |
| Gasless TX | ✅ Paymaster | ❌ (EIP-4337) | ❌ | ❌ | ❌ |
| Game Bridge | ✅ SDK + Play-to-Mine | ❌ | ❌ | ❌ | ❌ |
| AI Agents | ✅ Native | ❌ | ❌ | ❌ | ❌ |
| Hash Commitment Privacy | ✅ Built-in | ❌ (L2 only) | ❌ | ❌ | ❌ |
| Post-Quantum | ✅ Dual-sig | ❌ | ❌ | ❌ | ❌ |
| DID | ✅ W3C | ❌ | ❌ | ❌ | ❌ |
| Cross-Chain | ⚠️ Interface complete — external relayers in deployment (Q3 2026) | ❌ | ❌ | ✅ Wormhole | ✅ Rainbow |
| DePIN | ✅ Native | ❌ | ❌ | ❌ | ❌ |
| Court Evidence | ✅ Forensic | ❌ | ❌ | ❌ | ❌ |
| Account Abstraction | ✅ Native | ✅ EIP-4337 | ❌ | ❌ | ✅ Named Accounts |
| EIP-1559 Gas | ✅ Adaptive | ✅ EIP-1559 | ❌ | ❌ | ❌ |
| HD Wallet | ✅ BIP-32/44 | ❌ | ✅ BIP-32 | ❌ | ❌ |
| Compact Blocks | ✅ Native | ❌ | ✅ BIP-152 | ❌ | ❌ |
Version 0.2.0 upgrades six placeholder modules into fully functional, cryptographically sound implementations. Post-quantum signatures use the pqcrypto library wrapping the NIST-standardized reference C implementation of FIPS 204 (ML-DSA-44).
Implements real CRYSTALS-Dilithium2 (ML-DSA-44, FIPS 204) via the pqcrypto library. The lattice-based signature scheme provides NIST Level 2 (~128-bit) post-quantum security using Module-LWE / Module-SIS hardness assumptions. Hybrid dual signatures combine Ed25519 (classical) + ML-DSA-44 (post-quantum) so that both must be broken to forge a transaction.
| Parameter | Value |
|---|---|
| Algorithm | ML-DSA-44 (FIPS 204, CRYSTALS-Dilithium2) via pqcrypto library |
| Key sizes | PK: 1,312B, SK: 2,560B, Sig: 2,420B |
| Security level | NIST Level 2 (~128-bit post-quantum) |
| Performance | Sign: 1,126 ops/sec, Verify: 5,820 ops/sec |
| Signing mode | Randomized (hedged nonce per FIPS 204) |
| Soundness tests | 29 tests (keygen, sign, verify, tamper, bitflip, forge, large msg, dual sig) |
Implements actual token transfers between ASF and external chains via a lock-on-source / mint-on-target pattern with relayer quorum and fraud proofs.
| Parameter | Value |
|---|---|
| Quorum | 3-of-5 relayer confirmations |
| Bridge fee | 0.3% (30 basis points) |
| Challenge period | 24 hours |
| Min lock | 1 ASF |
| Flow | Lock → Confirm → Mint → Burn → Release |
| New RPC methods | 6 (bridgeLock, bridgeConfirmLock, bridgeMint, bridgeBurn, bridgeRelease, bridgeGetStatus) |
Every AI validation decision now produces a human-readable explanation containing per-model contribution breakdowns, top risk signals, and cross-model attention correlations. Explanations are bounded to 500 characters.
Example output: Risk 0.42 (ACCEPTED). TAD:0.35(30%), MSAD:0.55(25%), SCRA:0.30(25%), ESG:0.50(20%). Top signal: MSAD(MEV) at 0.55.
Replaces the flat “1 unit per submission” reward with a three-dimensional scoring formula multiplied by device-type tiers.
| Component | Weight | Description |
|---|---|---|
| Uptime | 40% | Hours active / hours since registration |
| Data Quality | 40% | Verified submissions / total submissions |
| Freshness | 20% | Linear decay from 1.0 to 0.0 over 60 min |
| Device Type | Multiplier |
|---|---|
| GPU | 5x |
| Storage | 3x |
| Sensor / Camera | 2x |
| Network | 1x |
Daily cap: 100 reward units per device to prevent gaming.
Upgrades agents from record-keeping to enforced execution with three layers of protection:
Autonomous tick() executes per-block actions for eligible agents (minimum trust score: 10). Banned agents cannot be resumed (permanent kill switch).
Upgrades the hash commitment system with proper Schnorr-like response verification. The commitment now embeds a verification tag (64 bytes = 32 core + 32 tag) that binds the response cryptographically. Modular arithmetic over the Curve25519 field prime (2255 − 19).
| Parameter | Value |
|---|---|
| Prime field | 2255 − 19 (Curve25519) |
| Range bits | 64 |
| Merkle depth | 16 |
| Verification | Constant-time via hmac.compare_digest |
| Soundness tests | 12 new (tampered response, forged proof, Merkle paths) |
Phase 32 extends the AI subsystem with four modules that deepen model coordination and observability: (1) Online Learning Extension for continuous improvement in production, (2) Model Communication Bus for cross-model signal sharing, (3) Causal XAI v2 for permutation-based explainability, and (4) Concept Drift Detection for monitoring score distribution shifts. Full details in Chapter 31 (Neural Self-Preservation).
Version 0.2.0 and subsequent phases add 525+ new tests, bringing the total to 6,848 passing tests across 173 test files.
The Positronic Emergency Control System provides protocol-level safeguards for responding to security incidents, coordinating network upgrades, and gracefully handling critical failures. It operates as a state machine governing block production and transaction acceptance, ensuring the network can be paused, halted, or upgraded without data loss or chain corruption.
The network operates in one of five states, each controlling which operations are permitted. Transitions are authenticated via Ed25519 signatures and recorded in an immutable event log.
| State | Code | Block Production | Transactions | RPC |
|---|---|---|---|---|
| NORMAL | 0 | ✅ Yes | ✅ Yes | Full access |
| DEGRADED | 1 | ✅ Yes | ⚠ Limited | Full access |
| PAUSED | 2 | ❌ No | ❌ No | Read-only |
| HALTED | 3 | ❌ No | ❌ No | Emergency-only |
| UPGRADING | 4 | ❌ No | ❌ No | Read-only |
Different state transitions require different levels of authorization, ensuring that more dangerous operations require stronger consensus.
| Action | Authorization | Timelock |
|---|---|---|
| Pause Network | 3-of-5 Multi-Sig | 0 seconds (immediate) |
| Resume from Pause | 3-of-5 Multi-Sig | 1 hour |
| Emergency Halt | 3-of-5 Multi-Sig | 0 seconds (immediate) |
| Resume from Halt | 3-of-5 Multi-Sig | 1 hour |
| Rollback Upgrade | 3-of-5 Multi-Sig | 6 hours |
| Approve Upgrade | 3-of-5 Multi-Sig | 24 hours |
| Key Rotation | 3-of-5 Multi-Sig | 48 hours |
| Auto-Degrade/Pause | HealthMonitor (automatic) | None (automatic) |
Critical operations such as emergency halts, rollbacks, and key rotations require 3-of-5 Ed25519 multi-signature authorization. Five keys are registered at genesis; any three must sign a canonical message to authorize an action.
action_id:action_type:SHA256(sorted_params_json), preventing replay attacks
and ensuring each signer explicitly approves the specific action and parameters.
The multi-sig lifecycle follows four stages:
Protocol upgrades are managed through a feature flag system with block-based activation and automatic rollback. This allows the network to evolve without hard forks causing chain splits.
| Parameter | Value | Description |
|---|---|---|
| Min Activation Delay | 1,000 blocks | Minimum blocks before upgrade activates |
| Monitor Window | 100 blocks | Post-activation error monitoring period |
| Rollback Threshold | 5% | Error rate triggering auto-rollback |
| Peer Compatibility | Feature-based | Peers must support all active features |
When an upgrade is scheduled, feature flags are registered in a SCHEDULED state.
At the activation block, features transition to ACTIVE. If the error rate exceeds 5%
within 100 blocks, the system recommends auto-rollback, deactivating all features in the upgrade.
The Emergency Controller integrates with the network's HealthMonitor for automatic state transitions. When health metrics deteriorate, the system automatically degrades or pauses without human intervention:
| Health Event | Automatic Action | Recovery |
|---|---|---|
| Degraded metrics | NORMAL → DEGRADED | Automatic when health recovers |
| Critical failure | NORMAL/DEGRADED → PAUSED | Manual (3-of-5 multi-sig required) |
| Health recovered | DEGRADED → NORMAL | Automatic |
| Method | Access | Description |
|---|---|---|
positronic_emergencyPause | ADMIN | Pause network (3-of-5 multi-sig required) |
positronic_emergencyResume | ADMIN | Resume from paused state |
positronic_emergencyHalt | ADMIN | Emergency halt (multi-sig required) |
positronic_emergencyStatus | PUBLIC | Query current network state |
positronic_upgradeSchedule | ADMIN | Schedule protocol upgrade |
positronic_upgradeStatus | PUBLIC | Query upgrade status |
The Emergency Control System includes 57 tests covering all state transitions, multi-sig authorization, upgrade lifecycle, node integration, and RPC methods. Combined with the existing test suite, the project maintains 6,848 passing tests.
Before a blockchain can launch on mainnet, the protocol must withstand adversarial chain reorganizations, protect data at rest, handle schema evolution gracefully, and rate-limit public endpoints against abuse. This chapter documents the four production-hardening subsystems added in Phase 26, along with the comprehensive test suites that verify their correctness under stress.
The ForkManager detects and resolves competing chain tips without manual intervention.
When a peer broadcasts a block whose parent is not the current tip, the ForkManager stores it as a
ForkCandidate object and evaluates whether the alternative chain is longer. If so, the
node rewinds to the common ancestor and replays the longer chain — provided the reorg does not
cross a finalized height.
Fork detection is integrated directly into blockchain.add_block(), executing
before block validation so that invalid blocks on competing forks are never
persisted. Old fork candidates are automatically pruned once their height falls below the
finality horizon.
| Parameter | Value | Description |
|---|---|---|
| max_fork_depth | 100 blocks | Maximum reorg depth the engine will consider |
| Finalized-height guard | Enabled | Reorgs past finalized blocks are rejected |
| Auto-prune | Below finality | Fork candidates below finality height are discarded |
| Longest-chain rule | Height-based | Ties broken by lowest block hash (deterministic) |
| Integration point | add_block() | Fork check runs before block validation |
All SQLite database files are encrypted using AES-256-GCM authenticated encryption. The encryption key is derived from a user-supplied passphrase via PBKDF2-HMAC-SHA512 with 100,000 iterations, producing a 256-bit key that is never stored on disk.
The encryption layer is transparent to callers: the database is decrypted into
memory on open and re-encrypted atomically on close using a temporary file with
os.replace(). This ensures that a crash during write never corrupts the encrypted file.
| Parameter | Value |
|---|---|
| Cipher | AES-256-GCM (authenticated) |
| Key Derivation | PBKDF2-HMAC-SHA512, 100,000 iterations |
| Nonce | 12-byte random per encryption |
| Fallback cipher | XOR + HMAC-SHA256 (when cryptography library unavailable) |
| Atomic writes | temp file + os.replace() |
| WAL/SHM cleanup | Automatic after encryption (prevents plaintext leakage) |
The schema migration system tracks database versions and applies incremental migrations
automatically on node startup. Each migration is idempotent — wrapped in
try/except so that re-running a migration on an already-migrated database
is a safe no-op.
Schema v2 adds a metadata column to the blocks table, enabling future extensions
without further migrations. All migration history is recorded in a schema_version
table with timestamps for auditability.
| Parameter | Value |
|---|---|
| Current schema version | v2 |
| Migration strategy | Idempotent ALTER TABLE with try/except |
| History table | schema_version (version, applied_at, description) |
| Auto-migrate on startup | Enabled |
| v2 change | Adds metadata column to blocks table |
All public RPC endpoints are protected by a sliding-window rate limiter that
tracks request counts per IP address. When a client exceeds the configured limit, the server
returns HTTP 429 Too Many Requests with a Retry-After header.
Admin endpoints (those requiring authentication) are exempt from rate limiting, ensuring that node operators can always manage their infrastructure regardless of public traffic load.
| Parameter | Value |
|---|---|
| Algorithm | Sliding window counter |
| Tracking | Per-IP address |
| Default limit | Configurable (requests per window) |
| Exceeded response | HTTP 429 + Retry-After header |
| Admin exemption | All authenticated admin endpoints |
Five dedicated test suites validate every production-hardening subsystem under both normal and adversarial conditions. Together they add 76 new tests, bringing the project total to 6,848 passing tests across 173 test files.
| Test Suite | Tests | Coverage |
|---|---|---|
| Property-Based Invariant Testing (hypothesis) | 23 | Blockchain invariants, state consistency, transaction ordering |
| Database Resilience | 17 | Corruption recovery, concurrent access, WAL checkpoint, encryption round-trip |
| Memory Leak Detection | 8 | Forensic reports, mempool cycling, wallet registry, game sessions, gc tracking |
| Chain Reorganization | 16 | Fork storage, longest-chain rule, finality guard, reorg state consistency |
| Upgrade & Migration | 12 | Schema versioning, feature flags, activation/rollback lifecycle |
| Total | 76 | 6,848 passing tests across 173 test files |
The production-hardening test suites leverage several specialized testing tools to achieve deep coverage beyond what traditional unit tests can provide:
| Tool | Purpose |
|---|---|
pytest-asyncio | Async node testing with event-loop integration |
hypothesis | Property-based testing with configurable max_examples |
psutil | RSS memory measurement for leak detection |
| Dedicated port ranges | Parallel test isolation (no port conflicts between suites) |
A dedicated 13-test benchmark suite (test_tps_benchmark.py) measures real throughput
across every layer of the transaction pipeline. Results are asserted against minimum thresholds
to catch performance regressions.
| Layer | Throughput | Notes |
|---|---|---|
| AI Validation (full 4-model pipeline) | ~1,100 TX/sec | TAD + MSAD + SCRA + ESG ensemble |
| AI Validation (light tier, TAD only) | ~2,000+ TX/sec | Low-risk transfers skip heavy models |
| Mempool Ingestion | ~37,000 TX/sec | Priority-lane insertion + per-account limits |
| Block Creation (5 blocks x 50 TX) | ~570 TX/sec | AI gate + state execution + DB writes |
| End-to-End Pipeline | ~670 TX/sec | Sign + AI + block + state + DB (full path) |
| Ed25519 Sign | ~11,000 ops/sec | Standard transaction signing |
| Ed25519 Verify | ~12,000 ops/sec | Block validation signature checks |
| ML-DSA-44 Sign (post-quantum) | ~710 ops/sec | CRYSTALS-Dilithium2 via pqcrypto |
| ML-DSA-44 Verify (post-quantum) | ~4,000 ops/sec | Post-quantum signature verification |
| State: Account Creation | ~200,000+ ops/sec | In-memory state manager |
| State: Balance Transfers | ~500,000+ ops/sec | Sub/add balance operations |
| Hardware Tier | CPU | RAM | Storage | Expected TPS |
|---|---|---|---|---|
| Entry-Level | 4-core ARM64 / x86_64 | 8 GB | 256 GB SSD | ~200-400 TX/s |
| Mid-Range | 8-core x86_64 | 32 GB | 1 TB NVMe | ~600-800 TX/s |
| High-End | 16+ core x86_64 | 64 GB | 2 TB NVMe | ~1,000-1,200 TX/s |
Benchmarks performed using Python 3.10+ with NumPy acceleration. All figures measured in single-node local mode. Multi-node performance varies by network conditions. Formal third-party benchmark is in progress.
Version 0.2.3 implements 12 security fixes identified through a comprehensive internal security audit. The audit simulated real-world attack scenarios across all subsystems, resulting in 218 attack simulation tests across 4 dedicated test files.
| Vulnerability | Impact | Fix |
|---|---|---|
| Commitment Forgery | Attacker could forge hash commitments without knowing the secret | Bind prover_id and proof_type into Fiat-Shamir challenge; prevents cross-type replay and identity-unbound forgery |
| Ed25519 Exception Masking | Catch-all exception handler masked real errors, potentially accepting invalid signatures | Specific exception types (ValueError, InvalidSignature) instead of bare Exception |
| Nothing-at-Stake | 5% slash + 3-epoch jail made double-signing profitable for validators | Increased to 33% slash + 36-epoch jail (~3.8 hours) + permanent ban after 3 events; exponential jail backoff for repeat offenders |
| Fix | Module | Description |
|---|---|---|
| PQ Key Size Validation | crypto/post_quantum.py | Minimum 1,272-byte key size enforced for ML-DSA-44 public keys |
| Kill Switch Cooldown | ai/meta_model.py | 5-minute cooldown before AI can be re-enabled after kill switch activation |
| Quarantine Double-Voting | ai/quarantine.py | Each voter can only vote once per quarantined transaction |
| Multisig Cross-Chain Replay | crypto/multisig.py | Chain ID bound into proposal hash prevents replay across chains |
| Batch Rate Limiting | rpc/server.py | Each JSON-RPC batch item counted individually; MAX_BATCH_SIZE=20 |
| CORS Exact Match | rpc/server.py | Exact origin match only — no prefix matching that allowed subdomain spoofing |
| Admin Key Lockout | rpc/security.py | Exponential backoff after 5 failed admin key attempts (60s, 120s, 240s...) |
| Mempool Fail-Closed | network/mempool.py | AI gate errors reject transactions instead of auto-accepting |
| System TX Rejection | network/mempool.py | REWARD/AI_TREASURY/GAME_REWARD transactions rejected at mempool entry |
| Negative Weight Guard | ai/meta_model.py | AI model weight updates reject negative values with ValueError |
A dedicated 218-test attack simulation suite probes every identified vulnerability from the perspective of a real attacker, organized into 26 attack classes across 4 files:
| Test File | Tests | Attack Categories |
|---|---|---|
| test_attack_crypto.py | 58 | ZK forgery, Ed25519 masking, key derivation, PQ key attacks, multisig replay, signature manipulation |
| test_attack_infrastructure.py | 55 | Bridge exploits, batch rate bypass, CORS spoofing, admin brute-force, mempool flooding, peer score manipulation |
| test_attack_consensus.py | 55 | Epoch seed grinding, nothing-at-stake profitability, fork attacks, finality busting, Sybil registration |
| test_attack_ai_governance.py | 50 | Kill switch oscillation, quarantine double-voting, AI gate bypass, Sybil flags, emergency system abuse |
| Total | 218 | 26 attack classes across all subsystems |
| Phase | Feature | Status |
|---|---|---|
| 1 | Bitcoin-Style Tokenomics (1B supply, 24 ASF reward, halving) | ✅ Complete |
| 2 | TRUST Soulbound Reputation Token (5 levels, multipliers) | ✅ Complete |
| 3 | PRC-20 & PRC-721 Token Standards | ✅ Complete |
| 4 | Gasless Transactions (Paymaster System) | ✅ Complete |
| 5 | Smart Wallet & Account Abstraction | ✅ Complete |
| 6 | Game Bridge Platform (External game integration via SDK) | ✅ Complete |
| 7 | AI Agents On-Chain | ✅ Complete |
| 8 | Hash Commitment Privacy | ✅ Complete |
| 9 | Cross-Chain Bridge | ⚠️ Interface complete — external relayers in deployment (Q3 2026) |
| 10 | DePIN (Decentralized Physical Infrastructure) | ✅ Complete |
| 11 | Post-Quantum Cryptography (Dual Signatures) | ✅ Complete |
| 12 | Decentralized Identity (DID) | ✅ Complete |
| 13 | Website, Dashboard & Developer Tools | ✅ Complete |
| 14 | Game Bridge SDK (External game integration, 24 RPC methods, game-to-token bridge) | ✅ Complete |
| 15 | Security Hardening (AI kill-switch, SCRA v2, veto consensus) | ✅ Complete |
| 16 | Evidence Portal & Compliance (Court-ready forensic tools) | ✅ Complete |
| 17 | GOD CHAIN (EIP-1559 gas, TX lanes, compact blocks, HD wallet, VM v2) | ✅ Complete |
| 18 | Telegram Mini App SDK (Play-to-Mine) | ✅ Complete |
| 19 | Real Post-Quantum Cryptography (HMAC-based deterministic signatures) | ✅ Complete |
| 20 | Cross-Chain Bridge v2 (Lock/Mint with relayer quorum) | ⚠️ Interface complete — external relayers in deployment (Q3 2026) |
| 21 | AI Explainability (XAI: per-model breakdowns, attention correlations) | ✅ Complete |
| 22 | DePIN Economic Layer (tiered rewards, device scoring, daily caps) | ✅ Complete |
| 23 | Autonomous AI Agents (permissions, rate limits, spending caps) | ✅ Complete |
| 24 | Enhanced Hash Commitment Privacy (Schnorr sigma protocol, Merkle proofs) | ✅ Complete |
| 25 | Emergency Control System (state machine, 3-of-5 multi-sig, upgrade manager) | ✅ Complete |
| 26 | Production Hardening (ForkManager, DB encryption, schema migration, test suites) | ✅ Complete |
| 27 | Security Hardening v2 (12 fixes, 218 attack simulation tests, nothing-at-stake mitigation) | ✅ Complete |
| 28 | Mainnet Readiness v0.3.0 (SHA-512 MPT, fork reorg with snapshot/rollback, BFT attestation broadcasting, NAT traversal, 150 new tests) | ✅ Complete |
| Timeline | Milestone |
|---|---|
| Q2 2026 | Public Testnet Launch, Community Building, Ambassador Program |
| Q3 2026 | Independent Security Audits, Bug Bounty Program ($1M pool) |
| Q4 2026 | Mainnet Launch, Genesis Block, Token Generation Event |
| Q1 2027 | Mobile Wallet (iOS + Android), Hardware Wallet Integration |
| Q2 2027 | Decentralized Exchange (DEX), NFT Marketplace |
| Q3 2027 | Cross-Chain DEX, Lending/Borrowing Protocol |
| 2028 | Full Quantum Migration, Enterprise Partnerships, Layer-2 Scaling |
Version 0.3.0 delivers the final four infrastructure pillars required before public mainnet launch: a cryptographically sound state commitment scheme, a production-grade chain reorganization engine with full snapshot-and-rollback semantics, Byzantine Fault Tolerant attestation broadcasting over the P2P layer, and NAT traversal so residential validators behind home routers can participate without manual port-forwarding.
The Merkle Patricia Trie replaces the ad-hoc state-root computation with a standards-compliant, cryptographically binding commitment. Each account balance, nonce, and storage slot is inserted into the trie; the resulting root hash is stored in every block header and is verified by light clients without downloading full state.
| Parameter | Value | Description |
|---|---|---|
| Hash function | SHA-512 | Collision-resistant 512-bit digests for all trie nodes |
| State root complexity | O(1) per block | Root is updated incrementally; no full recomputation |
| Light client proofs | Merkle inclusion proof | Clients verify account state with O(log n) hashes |
| Encoding | RLP-compatible key-value | Each leaf encodes address + field as path, value as leaf |
| Root storage | Block header field | Every sealed block commits to the post-execution state root |
Building on the ForkManager introduced in Phase 26, the Fork Reorg Execution Engine adds full state snapshot-and-rollback semantics. Before replaying a competing chain, the engine takes a consistent snapshot of the current state; if the competing chain turns out to be invalid, the snapshot is atomically restored. A finality guard prevents any reorganization from reverting blocks that have already received 2/3 BFT attestation.
| Parameter | Value | Description |
|---|---|---|
| State snapshot | Copy-on-write dict | O(1) snapshot, O(modified) rollback |
| Rollback trigger | Invalid block on fork | Engine restores snapshot if fork replay fails validation |
| Finality guard | 2/3 supermajority | Attested blocks are irreversible; reorg rejected at finality boundary |
| Max reorg depth | 100 blocks | Inherited from ForkManager; deeper forks are rejected outright |
| State consistency check | Post-reorg assertion | State root recomputed and compared after each reorg to detect divergence |
Each validator signs a block hash with its Ed25519 key and broadcasts the attestation to all peers via the existing P2P gossip layer. Attestations are aggregated per-block; once a block accumulates signatures from more than 2/3 of the active validator set by stake weight, it is marked finalized and the finality height is advanced. Finalized blocks are permanently protected by the reorg finality guard.
| Parameter | Value | Description |
|---|---|---|
| Signature scheme | Ed25519 | Per-validator block-hash attestation |
| Finality threshold | 2/3 supermajority by stake | Stake-weighted attestation count triggers finalization |
| Broadcast mechanism | P2P gossip (existing layer) | Attestation messages propagated to all connected peers |
| Aggregation | Per-block accumulator | Attestations collected in memory; deduplicated by validator address |
| Finality persistence | finality_height field | Consensus state persists highest finalized block height |
Residential validators are typically behind NAT routers that block inbound connections. The NAT Traversal subsystem attempts UPnP port mapping first (automatic router configuration via the Universal Plug and Play protocol) and falls back to STUN hole-punching (RFC 5389) when UPnP is unavailable. Both methods are tried asynchronously on node startup; the discovered external address is advertised to peers so that inbound validator connections can be established.
| Method | Protocol | Description |
|---|---|---|
| UPnP Port Mapping | UPnP IGD | Automatically requests inbound port from home router; works on most consumer routers |
| STUN Discovery | RFC 5389 (UDP) | Queries public STUN server to discover external IP and port; enables hole-punching |
| Fallback | Manual config | Operator can override with static external IP if NAT traversal fails |
| Address advertisement | P2P handshake | Discovered external address included in peer hello message |
| Retry interval | 5 minutes | NAT mapping refreshed periodically to prevent lease expiry |
Phase 28 adds 150 new tests across 6 specialized suites, bringing the project total to 6,848 passing tests across 173 test files.
| Test Suite | Tests | Coverage |
|---|---|---|
| Merkle Patricia Trie (MPT) | 38 | Trie insert/lookup, state root computation, inclusion proofs, SHA-512 collision resistance, light client proof verification |
| Fork Reorg Execution | 20 | Snapshot creation, rollback on invalid fork, finality guard enforcement, state consistency post-reorg, deep fork rejection |
| BFT Finality | 11 | Attestation broadcasting, 2/3 supermajority threshold, duplicate attestation rejection, finality height advancement, persistence across restarts |
| NAT Traversal | 8 | UPnP port mapping, STUN discovery, fallback to manual config, address advertisement, lease renewal |
| End-to-End Integration | 21 | Full pipeline: MPT root in block header, reorg with state rollback, attestation-triggered finalization, NAT-traversing validator participation |
| Hack-Attack Simulation | 53 | Forged state roots, MPT proof spoofing, fake attestation flooding, reorg-past-finality attacks, NAT manipulation, Sybil attestation amplification |
| Total | 150 | 6,848 passing tests across 173 test files |
Phase 29 introduces a fully on-chain AI Agent Marketplace where developers register AI agents, users submit tasks with ASF payment, and agents execute tasks with quality scoring via the PoNC meta-model. The marketplace creates a sustainable revenue loop: agents earn ASF for high-quality work, the platform collects fees for treasury, and deflationary burns reduce supply.
Developers register agents by paying a 50 ASF registration fee and providing metadata (name, description, category, fee schedule). Each agent receives a unique on-chain ID and is assigned to one of six categories: ANALYSIS, AUDIT, GOVERNANCE, CREATIVE, DATA, or SECURITY. The registry enforces a soft cap of 10,000 agents and requires agents to maintain a minimum quality score of 7,000 basis points to remain eligible for task assignment.
| Parameter | Value | Description |
|---|---|---|
| Registration fee | 50 ASF | One-time fee to register an agent on-chain |
| Categories | 6 | ANALYSIS, AUDIT, GOVERNANCE, CREATIVE, DATA, SECURITY |
| Quality threshold | 7,000 bp | Minimum quality score to receive task assignments |
| Max agents | 10,000 | Soft cap on total registered agents |
| Task timeout | 300 seconds | Maximum execution time per task |
Users submit tasks to agents by paying a minimum of 1 ASF. The marketplace assigns tasks, monitors execution, and distributes rewards using a three-way split designed to align incentives across the ecosystem.
| Recipient | Share | Purpose |
|---|---|---|
| Agent developer | 85% | Primary reward for task completion |
| AI Treasury (DAO) | 10% | Platform fee funds ecosystem development |
| Burned | 5% | Deflationary mechanism reduces total supply |
Every task result is scored by the PoNC AI meta-model for accuracy, relevance, and completeness. Agent quality scores are updated as exponential moving averages. Agents falling below the 7,000 bp threshold are suspended from receiving new tasks until their score recovers. A leaderboard ranks agents by quality score, tasks completed, and user ratings.
Phase 29 adds 11 new RPC methods for marketplace interaction:
| Method | Description |
|---|---|
positronic_registerAgent | Register a new AI agent (50 ASF fee) |
positronic_getAgent | Get agent metadata by ID |
positronic_listAgents | List agents by category or rating |
positronic_submitTask | Submit a task to an agent (pay ASF) |
positronic_getTaskResult | Retrieve completed task result |
positronic_getTaskStatus | Check task execution status |
positronic_rateAgent | Rate agent output quality |
positronic_getAgentStats | Get agent performance statistics |
positronic_getAgentEarnings | Get agent earnings history |
positronic_getAgentLeaderboard | Top agents ranked by quality score |
positronic_getMarketplaceStats | Overall marketplace statistics |
Phase 30 introduces the PRC-3643 token standard for tokenizing real-world assets (real estate, equity, commodities, bonds, art) with built-in compliance hooks, KYC verification via the DID system, fractional ownership, and automatic dividend distribution. This brings trillions of dollars in real-world value on-chain while maintaining regulatory compliance.
PRC-3643 extends the PRC-20 fungible token standard with a compliance layer that enforces transfer restrictions based on jurisdiction, KYC level, and holding limits. Every transfer passes through a seven-step compliance check before execution.
| Parameter | Value | Description |
|---|---|---|
| Registration fee | 200 ASF | One-time fee to register an RWA token |
| Asset types | 5 | REAL_ESTATE, EQUITY, COMMODITY, BOND, ART |
| Min KYC level | 2 | Minimum KYC verification level for RWA trading |
| Max holders per token | 100,000 | Scalable fractional ownership |
| Transfer cooldown | 24 hours | Cooldown between large transfers |
Every RWA token transfer undergoes a seven-step compliance verification:
RWA token issuers can trigger pro-rata dividend distributions to all holders. The dividend engine calculates each holder's share based on their token balance, deducts a 5 ASF distribution fee, and credits dividends atomically in a single transaction. Full dividend history is queryable via RPC for auditing and tax reporting.
Phase 30 adds 10 new RPC methods for RWA token management:
| Method | Description |
|---|---|
positronic_registerRWA | Register a new real-world asset token (200 ASF) |
positronic_getRWAInfo | Get RWA token metadata and compliance rules |
positronic_listRWAs | List all registered RWA tokens |
positronic_transferRWA | Transfer with seven-step compliance check |
positronic_checkCompliance | Pre-check if a transfer would be compliant |
positronic_addKYCCredential | Add KYC verification to a DID |
positronic_distributeDividend | Trigger pro-rata dividend distribution |
positronic_getDividendHistory | Query dividend payment history |
positronic_getRWAHolders | List token holders with fractional balances |
positronic_getRWAStats | Overall RWA marketplace statistics |
Phase 31 implements Zero-Knowledge Machine Learning (ZKML), enabling validators to prove that AI score computations are correct without revealing model weights. This prevents adversarial attacks on the PoNC scoring pipeline, protects model intellectual property, and enables lightweight verification (5ms) instead of full model re-execution.
When a transaction arrives, the validator runs the PoNC meta-model to compute a score (e.g., 3,200 bp). The ZKML prover then generates a cryptographic proof that the score was computed correctly from the given inputs using the committed model weights. Other nodes verify the proof (fast, ~5ms) instead of re-running the full neural network. If the proof is invalid, the block is rejected.
| Parameter | Value | Description |
|---|---|---|
| Proof system | Fiat-Shamir hash-based commitment scheme | Non-interactive zero-knowledge proofs via Fiat-Shamir heuristic (computationally binding via SHA-512) |
| Proof timeout | 2,000 ms | Maximum time for proof generation |
| Verification gas | 50,000 | Gas cost for on-chain ZK proof verification |
| Model commitment interval | 100 blocks | Model hash committed to chain every 100 blocks |
| Quantization | 16-bit fixed-point | Model weights quantized to 16-bit integers (scale factor 216) |
| Max circuit depth | 8 layers | Maximum neural network depth for proof generation |
| Challenge rounds | 3 | Fiat-Shamir challenge-response rounds per proof |
The ZKML circuit operates on quantized 16-bit fixed-point arithmetic to enable efficient proof generation. Floating-point model weights are converted to integers by multiplying by 216 (65,536). Each circuit layer computes a matrix-vector product, adds bias, applies quantized ReLU activation, and produces deterministic integer outputs. The circuit's model commitment is the SHA-512 Merkle root of all layer weight matrices and biases.
The ZKMLProver generates non-interactive proofs using the Fiat-Shamir heuristic: (1) compute blinded intermediate activations for each layer, (2) derive challenges from SHA-512 hashes of the proof transcript, (3) produce challenge-response pairs that demonstrate knowledge of the correct computation without revealing weights. The ZKMLVerifier checks all challenge-responses against the committed model hash, input hash, and output score.
ZKML integrates with both the Agent Marketplace and RWA Engine:
Phase 31 adds 5 new RPC methods for ZKML interaction:
| Method | Description |
|---|---|
positronic_getZKMLProof | Generate ZK proof for a transaction's AI score |
positronic_verifyZKMLProof | Verify a ZK proof's validity |
positronic_getZKMLStats | ZKML system statistics (proof times, verification rate) |
positronic_getZKMLConfig | Current ZKML configuration parameters |
positronic_getModelCommitment | Get model hash commitment (without revealing weights) |
Phases 29–31 collectively add ~320 new tests across 7 test files:
| Test Suite | Tests | Coverage |
|---|---|---|
| Agent Marketplace | ~80 | Registration, task lifecycle, reward distribution, quality scoring, leaderboard |
| Agent Integration | ~20 | End-to-end marketplace flows with blockchain initialization |
| PRC-3643 Token | ~50 | Token creation, compliance rules, fractional transfers, dividend distribution |
| RWA Compliance | ~40 | KYC verification, jurisdiction rules, transfer restrictions, AI scoring |
| RWA Dividends | ~20 | Pro-rata calculation, distribution mechanics, history tracking |
| ZKML Core | ~68 | Quantization, circuit layers, proof generation, verification, cache |
| ZKML Integration | ~40 | Blockchain init, RPC methods, security (tamper/forgery), performance |
| Total | ~320 | 6,848 passing tests across 173 test files |
Phase 32 introduces the Neural Self-Preservation (NSP) system — a comprehensive framework that protects the AI validation pipeline from catastrophic failures, enables graceful performance degradation, and ensures rapid recovery from model corruption or network partitions. NSP replaces the binary kill switch with a graduated multi-level response system.
The NeuralPreservationEngine captures complete AI state snapshots including model weights
(16-bit quantized), agent states, trust scores, ZKML commitments, and degradation levels. Each snapshot
produces a SHA-512 state root for tamper detection.
| Parameter | Value |
|---|---|
| Snapshot interval | Every 500 blocks |
| Max retained snapshots | 50 (auto-pruned) |
| Weight quantization | float16 (IEEE 754 half-precision) |
| State root hash | SHA-512 |
| Persistence | SQLite WAL mode |
| Snapshot target time | < 200ms |
Instead of a binary on/off kill switch, the GracefulDegradationEngine provides five graduated
levels that progressively relax AI thresholds while maintaining network operation:
| Level | Name | Accept (bp) | Quarantine (bp) | Emergency State |
|---|---|---|---|---|
| L5 | FULL | 8,500 | 9,500 | NORMAL |
| L4 | REDUCED | 7,000 | 8,500 | DEGRADED |
| L3 | MINIMAL | 5,000 | 7,500 | DEGRADED |
| L2 | GUARDIAN | 3,000 | 6,000 | PAUSED |
| L1 | OPEN | 0 | 10,001 | HALTED |
The PathwayMemory module tracks computation path health using Hebbian learning principles.
Each AI pathway (TAD, MSAD, SCRA, ESG, meta-model, consensus) maintains a weight in [0.1, 1.0]:
The NeuralRecoveryEngine restores AI state from snapshots when corruption is detected.
Recovery requires 3-of-5 multisig authorization and follows an 8-step protocol:
hmac.compare_digest for timing attack prevention)
A separate OS process monitors the main blockchain process via heartbeat files. If the main process
stops updating its heartbeat file for 3 consecutive checks (1.5 seconds), the watchdog sends
SIGUSR1 to trigger graceful degradation.
| Parameter | Value |
|---|---|
| Check interval | 0.5 seconds |
| Miss threshold | 3 consecutive misses |
| Failure signal | SIGUSR1 (Unix) / graceful log (Windows) |
| Heartbeat format | Atomic file write (tmp + rename) |
Phase 32 also deepens the AI subsystem with four integration modules:
Enables continuous model improvement in Phase C (production mode only). Labeled transactions from three sources (validator consensus, appeal results, confirmed attacks) are buffered and used for periodic retraining. A quality gate reverts any update that causes >5% accuracy drop.
The ModelCommunicationBus enables AI models to share signals within transaction-scoped
contexts. Signals are typed per model (e.g., TAD emits anomaly_high, MSAD emits
mev_detected). Context boosts are capped at ±500 basis points and models cannot
read their own signals (no self-subscription).
The CausalExplainer generates human-readable explanations using permutation-based
feature importance and greedy counterfactual reasoning. Explanations are available in both
English and Persian (Farsi) via the positronic_explainTransaction RPC method.
The ConceptDriftDetector monitors model score distributions over rolling windows
(500 blocks) and compares against baseline means. Three severity levels trigger graduated responses:
| Severity | Drift % | Action |
|---|---|---|
| LOW | < 10% | Log alert only |
| MEDIUM | 10% – 30% | Reduce model weight by 20% |
| HIGH | > 30% | Reduce weight + trigger snapshot + recommend retraining |
| Module | Tests | Coverage Areas |
|---|---|---|
| Neural Preservation | 43 | Snapshots, quantization, determinism, pruning, persistence |
| Graceful Degradation | 51 | All 5 levels, transitions, health checks, emergency mapping |
| Neural Watchdog | 33 | Heartbeat, miss counting, failure actions, launcher |
| Pathway Memory | 32 | Decay, boost, correlation, preemptive strengthening |
| Neural Recovery | 37 | Recovery flow, multisig, integrity checks, attempt limits |
| Online Learning | 32 | Phase gating, label sources, rate limiting, quality gate |
| Model Bus | 32 | Publish/read, TX scoping, boost cap, self-subscription prevention |
| Causal XAI | 27 | Feature importance, counterfactual, EN/FA narratives |
| Concept Drift | 33 | Score recording, baseline, severity levels, alert filtering |
| RPC Methods | 44 | All 13 NSP RPC methods, error handling, parameter validation |
| Stress + Security | 63 | Performance benchmarks, memory leaks, attack resistance |
| Total | 427 | Comprehensive coverage of all NSP subsystems |