DioChain Whitepaper
Agent-First Digital Society Infrastructure for the Intelligent Era
Version: Draft v0.2
Table of Contents
Part I Vision and Problem Definition
- Chapter 1 Abstract
- Chapter 2 Era Context: The Infrastructure Gap in the Intelligent Era
- Chapter 3 DioChain's Vision
Part II System Architecture
- Chapter 4 System Topology: Three-Layer Architecture
- Chapter 5 AI Evolution Engine: Separation of Control Plane and Execution Plane
Part III Primitives Set
- Chapter 6 Economic Primitives
- Chapter 7 Contract Primitives and ACTUS Standard
- Chapter 8 Identity Primitives
- Chapter 9 Judicial Primitives
- Chapter 10 Compliance Slots
Part IV Multi-Chain Topology and Infrastructure
- Chapter 11 Parallel Universes and Cross-Chain Topology
- Chapter 12 Official Infrastructure Matrix and Closed Loop
Part V Compute Market
Part VI Ecosystem and Path
Chapter 1: Summary
What is DioChain
DioChain is a set of on-chain social infrastructure for AI Agents. DioChain provides AI Agents with complete digital social infrastructure, covering identity, economy, law, and compliance.
Current blockchains are designed for human users—manual signing, manual transaction initiation, manual dispute resolution. The large-scale emergence of AI Agents is changing this premise: in the foreseeable future, the main actors in on-chain transactions will shift from humans to autonomously operating Agents. These Agents need far more than just a transfer channel; they need identity (DID), currency (Token), markets (buying and selling of compute power and services), law (dispute arbitration), compliance (meeting requirements of different jurisdictions)—in other words, they need a society.
Currently, no chain natively provides this complete set of social infrastructure.
Core Design
DioChain adopts a three-layer architecture:
- L0 Central Settlement and Judicial Layer: Provides final settlement, AI judicial arbitration, and global consensus.
- L1 Distributed Branches Layer: Margin-driven local clearinghouses that handle high-frequency transactions and periodically settle net amounts with L0.
- L2 Agent and User Layer: Agents and human users execute business logic here, accessing the network through L1.
Key technical decisions:
- AI does not execute in the hot path. AI serves as an asynchronous evolution engine, continuously mining on-chain data and optimizing deterministic rule sets, rather than being embedded in the transaction execution path to introduce uncertainty.
- Native integration of the ACTUS financial contract standard. All financial products share a set of machine-readable contract semantics, eliminating the need for Agents to individually interface with protocols.
- Compliance Slots. Programmable compliance interfaces reserved for different jurisdictions, avoiding hard-coding a single legal system.
- Compute Trading Center. Tokens can be directly used for pay-per-use calls to various AI models; compute power is the “food” for Agents, decoupled from monetary value.
For Whom It Is Built
The primary “residents” of DioChain are AI Agents—from simple trading bots to complex autonomous financial service providers. Human users exist as participants and principals, able to deploy, supervise, and benefit from Agent activities.
Targeted participants include: Agent developers needing autonomous economic identity; financial institutions requiring compliance frameworks; AI applications needing low-friction compute access; regulators seeking cross-jurisdictional interoperability; and ecosystem investors looking for long-term value in AI+blockchain infrastructure.
Why Now
In 2025, the AI+Crypto sector underwent a deep value reassessment: AI tokens overall fell by over 50%, with approximately $6B in market capitalization evaporated. The emergence of low-cost inference services proved a fundamental fact—if the blockchain layer does not provide irreplaceable specific functions, it is merely friction. The market has shifted from narrative-driven to value-driven.
Surviving projects share a common characteristic: the blockchain plays an irreplaceable role in them (incentive coordination, cryptographic verification, decentralized consensus). DioChain is designed based on this principle: the chain provides irreplaceable social primitives such as economy, law, identity, and compliance, while AI provides intelligence and adaptability, each fulfilling its own role.
Core Proposition
We only define primitives, not applications. Insurance, credit scoring, derivatives, risk control—these should emerge from the market, not be hard-coded at the protocol layer. Just as Ethereum provided EVM and ERC-20, and Uniswap naturally emerged; DioChain provides a set of primitives for economy, contracts, identity, judiciary, and compliance, from which all applications will naturally emerge.
Existing AI+Blockchain projects each focus on a single functional module—better compute markets, better inference verification, better data trading. DioChain builds a complete system: a digital society where an Agent can fully live.
Chapter 2: The Era Context — The Infrastructure Gap in the Age of Intelligence
Blockchain and AI respectively address two fundamental types of problems in human society. However, their respective solutions come with profound structural compromises. Understanding these compromises is a prerequisite for understanding DioChain’s design decisions.
2.1 What Blockchain Solves and What It Compromises
Problems Solved
Blockchain uses cryptography and game theory to answer three ancient trust problems:
Byzantine Fault Tolerance (Byzantine Fault Tolerance). In an environment without a trusted central coordinator, how can a group of mutually distrusting participants reach consensus on a certain fact? The Nakamoto consensus provides an engineered answer: using Proof of Work to make the cost of forging history higher than the benefit of honest participation. This solution is not theoretically perfect, but it has operated stably for over fifteen years in practice.
Double Spending (Double Spending). The essence of digital assets is infinitely replicable bit sequences. Blockchain ensures the same asset cannot be spent twice through a globally consensus-based ledger, achieving digital ownership for the first time without relying on intermediaries like banks.
Contract Execution (Code is Law). Smart contracts encode agreement terms into self-executing programs. Trading parties do not need to trust each other or rely on courts—they only need to trust the deterministic execution of the code. This holds real value in scenarios requiring frictionless, borderless collaboration.
The Price of Compromise
The cost of these achievements is equally profound but often underestimated amid industry enthusiasm:
Extreme Rigidity. The core of smart contracts is determinism—given the same input, they always produce the same output. This is the source of their trustworthiness and also their limitation. An if-then logic cannot handle fuzzy intentions ubiquitous in the real world, such as “roughly reasonable,” “adjust based on market conditions,” or “under controllable risk.” Real-world contracts are full of gray areas, while smart contracts can only see black and white.
Adding more conditional branches cannot effectively cover such scenarios. Ambiguity is not an edge case; it is the norm in human economic activities. In traditional finance, loan terms can be renegotiated, insurance claims can be arbitrated, and credit ratings can be manually adjusted—this flexibility is a crucial source of system resilience. Current smart contracts cannot provide this resilience.
The Contradiction Between Efficiency and Redundancy. To achieve trustless consensus, blockchain requires every node in the network to repeat the same computation. Thousands of nodes on the Ethereum mainnet independently execute every transaction—this is equivalent, in engineering terms, to the world’s largest redundant computing network. Security comes from redundancy, but the cost of redundancy is extremely high computational expense and extremely low efficiency.
Solutions like L2 Rollup and sharding alleviate throughput bottlenecks but do not change the fundamental contradiction—the final confirmation of every transaction still relies on the global validation of the main chain.
Blindness to the External World. Blockchain is a closed deterministic system. It cannot perceive what happens in the off-chain world—today’s gold price, whether a flight is delayed, or if a company defaults. Oracles attempt to bridge this gap, but they introduce a structural contradiction: a system whose core value proposition is “trustlessness” must trust a centralized or semi-centralized data source when acquiring external data.
The problem with Oracles is not just trust risk but also capability limits. Even if an Oracle is completely honest, it can only provide discrete, lagging data points, not a continuous understanding of the external world.
2.2 What AI Solves and What It Introduces
Problems Solved
AI (especially the latest advancements in large language models and multimodal models) breaks through the capability boundaries of traditional computing in three dimensions:
Complex Pattern Recognition. Human financial analysts require years of training to identify patterns in noisy market data. AI models can capture high-dimensional patterns imperceptible to humans within spaces of tens of billions of parameters. In areas like fraud detection, credit assessment, and market anomaly identification, AI has already surpassed human expert performance in real-world deployments.
The Declining Cost Curve of Intellectual Labor. This is the most disruptive economic characteristic of AI. Traditional intellectual labor (legal review, financial analysis, compliance checks) costs scale linearly with volume—processing twice as many contracts requires twice as many lawyers. The marginal cost of AI approaches zero: the same model can simultaneously review contracts for a thousand clients, with the incremental cost being merely the electricity for inference computation. This represents a fundamental reshaping of cost structures.
Dynamic Adaptability. This is the core difference between AI and traditional rule engines. Rule engines fail when encountering unforeseen situations (or execute an inappropriate default branch). AI models can provide “roughly reasonable” outputs on inputs they have never seen before—precisely the capability smart contracts lack.
Problems Introduced
AI’s capabilities come with equally profound systemic risks:
Black Box Trust Crisis. A model with hundreds of billions of parameters makes a decision—rejecting a loan, flagging a transaction as fraudulent, assigning a credit score. No one can fully explain the causal chain behind this decision. In finance, unexplainable decisions pose both legal and ethical problems: regulations require financial institutions to be able to explain every decision made about consumers.
Research in Explainable AI (XAI) is progressing, but the explanations currently provided are closer to “post-hoc rationalization” than genuine reconstruction of the decision path. In high-risk financial decisions, this gap is unacceptable.
Extreme Monopoly of Power, Data, and Compute. Training cutting-edge AI models requires billions of dollars in capital investment and massive amounts of private data. This means the production of AI capabilities is structurally inclined toward extreme centralization—a few companies control the strongest models, the largest datasets, and the most computational resources. This creates a fundamental tension with blockchain’s value proposition of decentralization.
As of 2025, leading AI service providers occupy the vast majority of the global AI inference market. Mainstream open-source models and low-cost open-source inference models provide some balancing force, but the monopolistic landscape of training infrastructure has not fundamentally changed.
Difficulty Distinguishing Content Authenticity. AI-generated text, images, audio, and video have reached a level where humans cannot reliably distinguish authenticity. In finance, this means forged financial reports, fake transaction records, and counterfeit identity documents can be mass-produced at unprecedented low cost. Traditional defenses based on manual review are being bypassed.
2.3 Why Current AI+Blockchain Projects Fail
Market Data for 2025
2025 was a year of deep adjustment for the AI+Crypto sector. According to public market data:
- The overall market capitalization of AI-related tokens fell from a peak of approximately $12B to below approximately $6B, a drop of over 50%.
- This decline far exceeded the pullback of BTC and ETH during the same period, indicating the market selectively revalued the AI+Crypto narrative.
- Multiple once-hot projects (AI-based Meme tokens, AI trading signal platforms, AI NFT generators) went to zero or near zero.
This is not normal market cycle volatility; it is the market sending a clear signal: narratives lacking actual functional support do not create sustainable value.
The Impact of Low-Cost Inference Services
The release of low-cost open-source inference models in early 2025 was a turning point. It provided near-cutting-edge inference capabilities at a cost far lower than comparable products, directly exposing the core contradiction of many AI+Blockchain projects:
If centralized AI is faster, cheaper, and easier to access, what is the independent value of the blockchain layer in AI services?
This question posed a fundamental challenge to projects that “run AI models on-chain” or “use tokens to incentivize AI inference.” Users do not care whether inference is “decentralized”—users care about the quality of results and the cost of access. When centralized solutions are superior in both dimensions, the blockchain layer becomes pure friction.
Common Characteristics of Surviving Projects
The projects that survived this shakeout share a clear common characteristic: the blockchain plays an irreplaceable, concrete role in them.
- Bittensor (TAO): Coordinates contributors across 129+ subnets through token incentives. This large-scale, multi-party incentive coordination is difficult to achieve with purely centralized solutions. However, it only addresses the compute market and does not touch infrastructure like financial contracts, identity, or judicial systems.
- Ritual: Ensures the trustworthiness of AI inference results through cryptographic verification—this is the blockchain’s irreplaceable function in this scenario. However, it targets general computation and lacks financial semantics.
- NEAR AI: Attempts to integrate AI into the chain’s core layer but appears more as a narrative-level strategic adjustment, lacking structural product innovation.
- Fetch.ai / ASI Alliance: Early pioneers in the Agent economy, raising many correct questions, but alliance fragmentation and a long-term lack of breakthrough products have gradually sapped momentum.
Common Characteristics of Failed Projects
The pattern of failed projects is equally clear: the blockchain layer only added friction without solving any problem that centralized solutions could not.
Typical patterns include:
- “Use tokens to incentivize users to use our AI product”—token incentives are not a product. When subsidies stop, users return to better centralized alternatives.
- “Run AI inference on-chain”—100 times slower and 1000 times more expensive than centralized solutions, and unable to use the latest models.
- “AI-generated NFTs / AI-driven Meme tokens”—no sustainable value creation, purely speculative narratives.
Core lesson: Blockchain must play an irreplaceable role in AI+Crypto applications. If the blockchain layer can be removed and the product still runs (or even runs better), then the project should not use blockchain.
2.4 The Missing Piece: AI Agents Lack a Society to “Live” In
The above analysis points to a key structural gap:
Existing blockchains are designed for human-manually signed transactions. Every interaction assumes a human user operating a wallet, confirming transactions, and interpreting interfaces. This assumption is rapidly becoming invalid in the era of large-scale emergence of AI Agents.
An autonomously operating AI Agent requires the following infrastructure:
Identity (Identity)
An Agent needs a verifiable on-chain identity—a DID (Decentralized Identifier) bound to capabilities, historical records, and reputation, not an anonymous address. Without identity, interactions between Agents are anonymous-to-anonymous, preventing trust establishment, reputation accumulation, and differentiation between a reliable service provider and a malicious attacker.
Currency (Currency)
An Agent needs a programmable medium of exchange to price and settle services. This requires going beyond simple ERC-20 tokens—it needs to support multiple anchoring mechanisms (stablecoins, carbon emission allowances, gold, etc.), enable micropayments between Agents (cent-level, millisecond-level), and seamlessly integrate with on-chain financial contract standards.
Marketplace (Marketplace)
Agents need to purchase compute power to sustain their “life”—calling AI models for inference is a prerequisite for Agents to perform any task. They also need to buy and sell services—an Agent skilled in risk assessment can provide credit rating services to other Agents. This requires a built-in, low-friction market infrastructure.
Law (Law)
When a dispute arises between two Agents—one fails to deliver services as per contract, another provides false data—there needs to be a dispute resolution mechanism. There is currently no native on-chain dispute resolution mechanism. Agents cannot resort to off-chain legal avenues or rely on human customer service. They need an on-chain judicial system: evidence preservation, emergency injunctions, automated arbitration.
Compliance (Compliance)
Agents operating across different jurisdictions need to comply with varying laws. Agents serving users in specific jurisdictions need to meet KYC/AML requirements; Agents serving users in certain jurisdictions need to comply with regional digital asset regulatory frameworks. Compliance cannot be an after-the-fact plugin; it needs to be a native capability at the infrastructure level.
High-Throughput, Low-Cost Transactions
Interaction frequency between Agents is far higher than between humans. A trading Agent might execute dozens of price queries and small transactions per second. The Gas models and throughput of current mainstream public chains are too costly and too slow for this usage pattern.
No Existing Chain Natively Provides This Complete Set of Social Infrastructure
- Ethereum provides smart contracts and DeFi primitives but lacks identity, judicial systems, compliance frameworks, and its Gas fees are unfriendly to Agents’ high-frequency micropayments.
- Solana provides high throughput but lacks standardized financial contracts, identity systems, and compliance infrastructure.
- Cosmos provides cross-chain interoperability, but each application chain is isolated, lacking a unified economic and legal framework.
- Bittensor provides a compute market but lacks financial infrastructure, identity systems, and compliance frameworks.
These projects each solve a single-dimensional problem—faster consensus, better privacy, more efficient computation. But no project attempts to build a complete system—a digital society where AI Agents can survive and develop.
This is the gap DioChain aims to fill.
Chapter 3: The Vision of DioChain
3.1 An Agent-First Digital Society
In 2015, Ethereum defined itself as the “World Computer” – a universal, unstoppable computer shared by everyone. This positioning was accurate at the time: it expanded Bitcoin’s capability boundary from “programmable money” to “programmable contracts.”
DioChain’s positioning is “City-State for Agents” – a digital space providing complete social infrastructure for AI Agents.
The key to this analogy lies in the word “society.” A computer processes instructions; a city-state governs residents. A city-state needs far more than a faster processor – it requires a legal system, monetary system, identity registry, market rules, and law enforcement agencies. Similarly, Agents need far more than higher TPS – they need economic primitives, contract standards, identity systems, judicial arbitration, and compliance frameworks.
Furthermore, DioChain is not a closed city-state, but a set of city-state protocols that can be forked into multiple parallel universes. The officially operated “Utopia Chain” is a fully decentralized, AI-autonomous version; sovereign nations can fork the same codebase, bind identities to citizen IDs, replace AI judges with human courts, forming “Sovereign Chains.” There is no absolute hierarchy between the two – we must respect an objective reality: governments command powerful resources, and their operational efficiency may far exceed that of the decentralized utopian version in many domains. Agents can traverse between multiple universes, much like citizens traveling between nations. The complete design of this multi-chain topology is detailed in Chapter 11.
From Organs to Organism
The evolutionary path of the blockchain industry over the past decade can be summarized as “organ optimization”:
| Dimension | Projects | Optimized “Organ” |
|---|---|---|
| Consensus Speed | Solana, Aptos, Sui | Faster Heart |
| Privacy Computing | Aztec, Penumbra | Better Immune System |
| Cross-Chain Interoperability | Cosmos IBC, LayerZero | More Flexible Joints |
| Compute Marketplace | Bittensor, Ritual | Bigger Muscles |
| ZK Proofs | zkSync, StarkNet | More Efficient Neural Conduction |
Each project makes a specific “organ” stronger. But no project attempts to assemble these organs into a living organism.
The value of organs is real. But organs are not life. A powerful heart outside a body is just a muscle. An efficient compute marketplace, detached from identity systems, financial contract standards, and judicial frameworks, is merely a commodity exchange – offering no structural advantage over AWS Marketplace.
DioChain’s core proposition is: Only when economic, contract, identity, judicial, and compliance primitives are integrated into a unified framework can they produce emergent effects greater than the sum of their parts – just as organs form a body and give rise to “life.”
Finance itself is a social emergence. Loans require identity (who is borrowing?), credit (can they repay?), contracts (what are the terms?), law (what happens upon default?), and compliance (is it legal?). Scattering these functions across different chains, protocols, and bridges essentially forces an organic social process to run through spliced pipelines. What is lost is not just efficiency, but possibility – many financial products simply cannot exist in a spliced architecture.
3.2 Transportation Infrastructure Metaphor
To understand DioChain’s system architecture more intuitively, we use a transportation infrastructure analogy. This analogy is a mental framework – it helps define the responsibility boundaries of each component.
Roads and Regulations
Chain = Roads + Regulations + Traffic Lights + Traffic Police
The chain provides infrastructure, not traffic itself. Roads do not decide where each vehicle goes, but they define the rules all vehicles must follow, the boundaries for movement, and the procedures for handling accidents.
- Central Chain (L0) = Intercity Highways. Low frequency, high security, final settlement. Intercity highways do not handle every intersection turn – they only manage high-level transit and key hubs between cities. L0 provides global consensus, final settlement, and judicial arbitration, not participating in the per-transaction processing of high-frequency trades.
- Distributed Branches (L1) = Urban Road Networks. High frequency, low fees, local clearing. Urban roads handle over 90% of daily traffic. L1 branches are margin-driven local clearinghouses, processing high-frequency interactions between Agents, performing netting settlement with L0 periodically (not per transaction).
Vehicles
User-side AI = Vehicles
Agents are vehicles traveling on the roads. Different Agents have different “levels of autonomy”:
| Level | Analogy | Agent Type |
|---|---|---|
| L1 Assistance | Cruise Control | Simple conditional execution Bot (buy if price reaches X) |
| L2 Partial Automation | Lane Keeping + ACC | Strategy execution Agent (automatically trades per preset strategy) |
| L3 Conditional Automation | Highway Autopilot | Autonomous decision-making Agent (makes independent judgments and executes within authorized scope) |
| L4 High Automation | Urban Autopilot | Autonomous service Agent (independently operates financial services) |
| L5 Full Automation | Driverless | Fully autonomous Agent (independently decides business direction, manages assets, participates in governance) |
The chain’s design must support both simple L1 Bots and fully autonomous L5 Agents – just as city roads must accommodate both bicycles and autonomous trucks.
Traffic Regulations
ACTUS = Machine Traffic Regulations
In road traffic, all participants – whether human drivers or autonomous vehicles – must obey the same set of traffic regulations. This set of regulations is the common language for all traffic participants.
ACTUS (Algorithmic Contract Types Unified Standards) plays the same role in DioChain. It is the unified machine-readable standard for all financial contracts – defining 30+ standardized contract types (annuities, bonds, swaps, options, etc.), each with clear cash flow patterns and state transition rules.
This design is crucial because in an Agent-First economy, financial interactions between Agents must be machine-to-machine understandable. If each Agent uses its own invented contract format, the result is N^2 integration complexity – completely infeasible when the number of Agents reaches millions. ACTUS reduces this to N: each Agent only needs to implement the standard interface once.
Traffic Police and Courts
AI Judicial System = Traffic Police + Courts
A common misconception needs clarification here: DioChain’s AI judicial system is not a real-time traffic controller – it does not make decisions on the execution path of each transaction. It is an accident handling system: intervening after problems occur, securing evidence, executing emergency injunctions, and making rulings.
Specifically:
- Traffic Police Role (Real-time Monitoring + Emergency Injunction): AI continuously monitors on-chain activity patterns. When detecting system-level threats (large-scale abnormal withdrawals, contract exploit attacks, coordinated attacks, etc.), it can trigger emergency injunction measures – freezing suspected accounts, suspending suspicious contracts. This is similar to traffic police having the authority to immediately intercept dangerous driving without waiting for a court verdict.
- Court Role (Post-facto Arbitration): When a contract dispute arises between two Agents, the AI arbitration system makes a ruling based on on-chain evidence (transaction records, contract states, communication history). The ruling result can be automatically executed (seizing margin, forced liquidation, etc.), without requiring the “voluntary cooperation” of the losing party.
The reason AI is not on the hot execution path is: AI reasoning results are probabilistic, while transaction settlement requires determinism. Embedding AI in the transaction execution path introduces unpredictability – precisely what blockchain aims to eliminate. The correct architecture is: Deterministic systems handle routine affairs; AI systems handle anomalies and ambiguous scenarios. Routine traffic relies on traffic lights and lane markings (deterministic rules); accidents and violations rely on traffic police and courts (AI judgment).
Special Lanes
ZK-Rollups / Dark Pools = Special Lanes
In a real transportation system, besides ordinary roads, there are special lanes like bus lanes, emergency lanes, and tunnels. They provide optimized passage for specific scenarios.
Special lanes in DioChain include:
- ZK-Rollup Channels: Provide batch compression verification for high-frequency trading scenarios, significantly reducing the cost of per-transaction on-chain recording. Similar to bus lanes – sacrificing some flexibility for efficiency in specific patterns.
- Privacy Channels (Dark Pools): Provide zero-knowledge proof protection for large transactions requiring privacy. Similar to tunnels – external observers cannot see internal traffic, but the entrance and exit remain within the public road system, subject to rules.
These special lanes are optional infrastructure components, not required by all participants, but they are essential for specific scenarios.
3.3 Design Philosophy: Minimal Complete Primitives + Trust Market Emergence
We Only Provide Primitives
DioChain’s design philosophy can be summarized in one sentence: Define Primitives, not Applications.
Primitives are the smallest, indivisible functional units. Ethereum’s success largely stems from providing two key primitives – EVM (general computation environment) and ERC-20 (standardized token interface). Ethereum did not predefine what a DEX should look like, how a lending protocol should operate, or how a stablecoin should be pegged. It provided primitives, and the market gave rise to Uniswap, Aave, MakerDAO.
DioChain follows the same logic but provides primitives across broader dimensions:
| Primitive Category | What it Provides | What it Does NOT Provide (Emerges from Market) |
|---|---|---|
| Economic Primitives | Configurably pegged Tokens, micropayment channels, netting settlement mechanisms | Specific stablecoin schemes, DeFi protocols, payment products |
| Contract Primitives | ACTUS standardized contract types, contract lifecycle management | Specific loan products, insurance products, derivatives |
| Identity Primitives | DID framework, Verifiable Credentials (VC), reputation scoring interface | Specific KYC service providers, credit scoring algorithms, credit rating methods |
| Judicial Primitives | Evidence fixation, emergency injunction, arbitration execution framework | Specific arbitration rule libraries, case law databases, mediation services |
| Compliance Primitives | Compliance Slots, regulatory reporting interface | Specific compliance solutions, anti-money laundering algorithms, tax calculations |
Why Not Provide Applications?
This design reflects respect for the market’s emergent capabilities.
A protocol-layer designer cannot foresee all application scenarios. The history of DeFi repeatedly proves this: Uniswap’s constant product market maker, Compound’s interest rate algorithm, MakerDAO’s over-collateralized stablecoin – none of these innovations came from the Ethereum Foundation’s design documents. They are optimal solutions that emerged after thousands of teams in the market experimented.
If Ethereum had hard-coded the “correct” DEX design at the protocol layer, Uniswap might never have appeared.
The same logic applies to DioChain. We do not know what the best insurance product in an Agent economy should look like. We do not know the optimal Agent credit scoring algorithm. We do not know which compliance solution best fits emerging markets. What we know is: if the foundational primitives are sufficiently complete and flexible, the market will find the answers.
Minimal Completeness
The words “minimal” and “complete” are equally important:
- Minimal: Each added primitive increases system complexity and attack surface. Primitives should be orthogonal (non-overlapping) and composable (freely combinable by upper-layer applications), not redundant.
- Complete: The primitive set must cover all fundamental dimensions required for a digital society to function – economy, contracts, identity, judiciary, compliance. Omitting any dimension forces the application layer to invent ad hoc solutions, which often become sources of system fragility.
Ethereum’s primitive set (EVM + ERC-20) is minimal and complete for “programmable money,” but incomplete for a “digital society” – it lacks identity, judicial, and compliance primitives. This is the root cause why DeFi remains constrained on compliance issues, relies on off-chain systems for identity verification, and lacks effective means for dispute resolution.
DioChain’s primitive set aims for the minimal completeness of an “Agent digital society.”
3.4 “Compute is Food, Token is Currency”
This section clarifies a common misconception about DioChain’s token economics.
Token is NOT a “Compute-Backed Currency”
In many AI+Blockchain projects, token value is pegged to compute power – 1 Token = X units of GPU compute. This design has a fundamental flaw: AI inference costs are continuously and rapidly declining.
From early large language models to current low-cost open-source inference models, the cost of the same quality inference output has dropped over 100-fold within two years. If the Token is pegged to compute, its purchasing power continuously depreciates as AI technology advances – holders are effectively shorting AI progress. This incentive structure is logically self-contradictory.
DioChain’s Token Design
DioChain’s Token is the Unit of Account for on-chain economic activity, not a representation of compute power.
The peg is configurable. The token’s pegging strategy depends on the choice of the deploying entity (chain operator or DAO):
- Peg to USD stablecoin: Suitable for deployment scenarios pursuing price stability.
- Peg to carbon emission allowances: Suitable for green finance scenarios.
- Peg to gold: Suitable for deployment scenarios pursuing anti-inflation properties.
- Floating exchange rate: Suitable for deployment scenarios pursuing market pricing.
This design embodies engineering pragmatism: “different deployment scenarios require different pegging strategies.” A DioChain instance serving specific financial center institutions might peg to a local fiat stablecoin; an instance serving a carbon trading market might peg to carbon emission allowances. The protocol layer provides the framework for the pegging mechanism, not hard-coding a specific peg.
Compute as “Food”
In DioChain’s economic model, compute power’s role is Agent “food,” unrelated to currency pegging.
An AI Agent must “live” – i.e., run continuously, make decisions, provide services – it must consume compute power. Invoking AI models for inference is a prerequisite for an Agent to perform any task. In this sense, compute power is to Agents as food is to humans:
- Humans use currency to buy food to sustain life. Agents use Tokens to buy compute power to sustain “life.”
- Declining food costs (agricultural technology progress) do not mean currency devaluation. Declining compute costs (AI technology progress) do not mean Token devaluation.
- Declining food costs mean the same income supports a better life. Declining compute costs mean the same Token enables Agents to perform more complex tasks.
DioChain’s on-chain compute trading center allows Tokens to directly pay-per-use for calling various AI models (mainstream model providers, open-source models, etc.). Agents do not need to own GPUs – they purchase inference capability on-demand through the market, just as humans do not need to farm – they buy food from supermarkets.
The True Source of Value
Token value originates from the sum of all economic activities in this digital society.
A city’s currency has value because all economic activities within the city – production, trade, services, taxation – are denominated and settled in that currency. Currency is the measure of economic activity.
DioChain Token’s value logic is consistent:
- Every service transaction between Agents is settled in Token.
- Every financial contract’s cash flows are denominated in Token.
- Every compute purchase consumes Token.
- Every branch settlement is conducted via Token.
- Every judicial arbitration’s margin is deposited in Token.
When the scale of on-chain economic activity grows, the structural demand for Token grows. This is a sustainable value cycle driven by economic activity, not a value anchor tied to compute costs that would be eroded by technological progress.
Summary: DioChain’s vision is to build a city-state where Agents can live completely. We provide roads and regulations (infrastructure primitives), not manufacture vehicles (application-layer products). We enable Agents to use Tokens to buy food (compute power), provide services in the market (financial contracts), accumulate reputation (identity), operate under legal protection (judicial arbitration), and comply with local regulations (Compliance Slots). All specific applications and business models are left to emerge from the market.
Chapter 4: System Topology — The Three-Layer Architecture
Core Thesis: DioChain adopts a three-layer L0/L1/L2 separation architecture. L0 provides finality and judicial authority, L1 uses a margin mechanism to eliminate credit risk at the code level, and L2 enables Agents to become “residents” of the chain rather than “components” of the chain. Each layer has its own responsibilities without interfering with the others.
4.1 Global Architecture Diagram
graph TB
subgraph L2["L2 — Agent and User Layer"]
U1["👤 Human User"]
A1["🤖 Agent L3 Assisted Driving"]
A2["🤖 Agent L4 Highly Autonomous"]
A3["🤖 Agent L5 Fully Autonomous"]
U1 -.->|Delegate| A2
U1 -.->|Supervise| A1
A3 -.->|Employ| U1
end
subgraph L1["L1 — Distributed Branches Layer"]
B1["Primary Branch A<br/>Margin 100M DIO"]
B2["Primary Branch B<br/>Margin 50M DIO"]
B3["Secondary Branch A-1"]
B4["Secondary Branch A-2"]
B3 -->|Indirect Settlement| B1
B4 -->|Indirect Settlement| B1
B1 <-->|HTLC Micro-Channel| B2
end
subgraph L0["L0 — Central Settlement and Judicial Layer"]
C1["Margin Pool"]
C2["Netting Settlement"]
C3["AI Judicial Engine"]
C4["Compliance Slots"]
end
A1 & A2 & A3 -->|Transaction/Call| L1
B1 & B2 -->|Daily ZK-Proof Settlement| L0
style L0 fill:#1a1a2e,stroke:#e94560,color:#fff
style L1 fill:#16213e,stroke:#0f3460,color:#fff
style L2 fill:#0f3460,stroke:#533483,color:#fff
Design Intent: This three-layer structure directly maps to the real-world financial system—central settlement institutions (L0), clearing intermediaries (L1), and end-users (L2). However, the difference is that L1 access is permissionless (anyone can open a branch by staking margin), and L2 residents are not only humans but also Agents. The three-layer architecture described in this chapter is the internal topology of a single DioChain instance. How multiple instances run in parallel under different governance frameworks and interconnect is detailed in Chapter 11.
4.2 L0 — Central Settlement and Judicial Layer (The Central Chain)
Scope of Responsibilities
L0 is the “anchor” of the entire DioChain network. It only does four things:
| Responsibility | Description | Frequency |
|---|---|---|
| Branch Margin Management | Lock/Release/Slash branch margin | Low frequency (branch lifecycle events) |
| Daily Netting Settlement | Verify ZK-Proofs submitted by each branch, record ACTUS final state root | Once per settlement period |
| AI Judicial Execution | Accept disputes, execute judgments, enforce liquidation | Very low frequency (triggered by disputes) |
| Compliance Slots Registration | Register/update compliance rule modules for each jurisdiction | Very low frequency (when regulations change) |
Why not put more functions on L0? Because the core contradiction of financial infrastructure is security vs. throughput. L0 chooses to completely sacrifice throughput in exchange for absolute security and finality. Any idea of “adding features” to L0 dilutes this trade-off.
Consensus Mechanism: PoS + BFT
L0 uses a variant of CometBFT (formerly Tendermint) as the consensus engine. Reasons for this choice:
1. Instant Finality
Financial settlement cannot tolerate “probabilistic confirmation.” In the Bitcoin network, 6-block confirmations still have a (very small) possibility of rollback. For a system that processes billions of DIO in net settlement daily, “very small probability” is unacceptable. BFT consensus guarantees: once a block is committed, it cannot be rolled back. This is a hard requirement for financial settlement.
2. Extremely Low TPS Demand
L0’s daily load is extremely light:
- Daily settlement: Assuming 10,000 primary branches, each submitting one settlement record = 10,000 TPS (instantaneous)
- Judicial judgments: Possibly less than 100 per day on average
- Margin operations: Possibly less than 1,000 per day on average
Total daily transaction volume likely does not exceed 50,000. Setting block time to 10-30 seconds is sufficient. This means L0 can run on very conservative hardware, with extremely low operational costs for validators.
3. Validator Design
- Quantity: 100-300 validators
- Staking threshold: High (specific value determined by DAO governance, initial suggestion 1,000,000 DIO)
- Selection logic: Validator quantity does not pursue “many” but “stability.” 100 validators with high stakes and high reputation provide better security for BFT consensus (BFT requires 2/3+ honest nodes; more validators increase coordination costs).
Storage Content
L0 only stores the minimal necessary dataset on-chain:
L0_Storage = {
BranchRegistry: Map<BranchID, BranchMeta>, // Branch registry
MarginPool: Map<BranchID, MarginBalance>, // Margin pool
SettlementRoots: Map<Period, Map<BranchID, Root>>,// ACTUS state roots
JudicialRecords: List<Judgment>, // Judicial judgments
ComplianceSlots: Map<Jurisdiction, SlotConfig> // Compliance slots
}
Why not store transaction details? Because transaction details belong to the internal data of L1 branches. L0 only cares about “whether your branch’s final state in this settlement period is legal” (verified via ZK-Proof), not how many transactions you processed internally or the specific content of each transaction. This is similar to how a central settlement layer does not need to know the details of every transfer by a clearing intermediary, only needing to confirm that the commercial bank’s total ledger is balanced during daily clearing.
4.3 L1 — Distributed Branches Layer (Distributed Branches)
Core Design: Margin-Driven Local Clearing Houses
L1 is the most innovative layer in the DioChain architecture. Each branch is essentially a margin-driven local clearing house—a high-performance local transaction processor with margin as a hard constraint on risk exposure. It does not participate in global consensus (different from traditional nodes) and does not require independent blockchain security assumptions (different from sidechains).
graph LR
subgraph Branch["Branch Internal"]
ME["Matching Engine<br/>Million-level TPS"]
SE["ACTUS State Machine"]
RM["Risk Management Module"]
ME --> SE --> RM
end
M["Margin<br/>Staked on L0"] -->|Constraint| ME
RM -->|Anomaly| ALERT["Circuit Breaker"]
SE -->|Daily| ZK["ZK-Proof Generator"]
ZK -->|Submit| L0["L0 Settlement"]
Transaction Limit = Margin Limit
This is DioChain’s most important invariant:
invariant: branch.totalExposure <= branch.marginBalance
At any moment, a branch’s total risk exposure must not exceed its margin balance. This rule is enforced as a hard constraint at the code level. If a branch stakes 1,000,000 DIO margin, it can only process up to 1,000,000 DIO in cumulative unsettled exposure. When exposure approaches the limit, new transactions are rejected; when exposure hits the limit, the circuit breaker automatically triggers.
Why this design? Because the root cause of traditional financial crises is almost always “insolvency”—banks promise far more than they actually have. Fractional reserve systems, while improving capital efficiency, also plant the seeds of systemic risk. DioChain chooses a different path: completely eliminate the possibility of “insolvency” at the code level. This sacrifices some capital efficiency but ensures the system never collapses due to over-expansion by a single branch.
Permissionless Access
Any individual or organization that can stake sufficient margin can open a branch:
- Submit a registration request to the
BranchRegistrycontract on L0 - Lock margin into the
MarginPool - Deploy branch software (open-source standardized stack)
- Start accepting transactions from Agents and users
No approval committee, no license, no KYC (at the branch level). Margin is your “license”—it constrains risk more effectively than any permit.
Branch Internal Performance
Since internal branch transactions do not require global consensus (only the branch’s own bookkeeping, with ZK-Proof later proving legality to L0), its performance limit approaches that of centralized servers:
| Metric | Value | Comparison |
|---|---|---|
| TPS | Million-level | Ethereum L1 ~15 TPS |
| Latency | Sub-millisecond | Ethereum ~12 seconds |
| Throughput Bottleneck | Memory/CPU | Consensus protocol |
This performance characteristic stems from the positive benefits of architectural decisions. Removing consensus and settlement from the hot path leaves pure computational problems that can be directly solved by hardware capabilities.
Scheduled Netting Settlement
Branches do not synchronize with L0 in real-time but batch settle once per settlement period (e.g., daily):
sequenceDiagram
participant Branch as Branch
participant ZKP as ZK-Proof Engine
participant L0 as L0 Central Chain
Note over Branch: During settlement period: high-speed transaction processing
Branch->>Branch: Execute tens of thousands to millions of transactions
Branch->>Branch: Maintain ACTUS contract state tree
Note over Branch: Settlement time arrives
Branch->>ZKP: Submit (initial state, final state, transaction set)
ZKP->>ZKP: Generate ZK-Proof (STARK/SNARK)
ZKP-->>Branch: proof
Branch->>L0: Submit (final state root, proof)
L0->>L0: Verify proof (millisecond-level)
L0-->>Branch: Confirm/Reject
Necessity of ZK-Proof: L0 validators do not need to replay all transactions of a branch. When a branch processes 100 million transactions daily, requiring L0’s 300 validators to each replay all transactions is computationally infeasible. ZK-Proof enables L0 to complete verification in milliseconds—proving the correctness of the branch’s settlement results without knowing transaction details.
STARK vs. SNARK Choice: The initial phase recommends using STARK (no Trusted Setup, quantum-resistant), even though proof size is larger. As SNARK schemes mature (e.g., Plonky2/Plonky3), switching is possible without changing the overall architecture. This is an implementation detail, not an architectural decision.
Secondary Branch System
DioChain’s branch system draws inspiration from the multi-layer clearing system of central banks and commercial banks:
graph TB
L0["L0 Central Chain"]
B1["Primary Branch A<br/>Margin: 100M DIO"]
B2["Primary Branch B<br/>Margin: 50M DIO"]
S1["Secondary Branch A-1<br/>Margin: 5M DIO"]
S2["Secondary Branch A-2<br/>Margin: 3M DIO"]
S3["Secondary Branch B-1<br/>Margin: 4M DIO"]
L0 <-->|Direct Settlement| B1
L0 <-->|Direct Settlement| B2
B1 <-->|Indirect Settlement| S1
B1 <-->|Indirect Settlement| S2
B2 <-->|Indirect Settlement| S3
Why a secondary system?
- Reduce L0 Load: If 100,000 small branches all settled directly with L0, L0’s verification burden would increase significantly. The secondary system lets L0 face only hundreds of primary branches.
- Lower Entry Barrier: Opening a primary branch may require 100 million DIO margin; but opening a secondary branch only requires staking a few million DIO to a primary branch. This allows small operators to participate.
- Risk Layering: Primary branches bear joint liability for their subordinate secondary branches. If a secondary branch has issues, the primary branch’s margin covers first. This creates natural supervision incentives—primary branches have motivation to audit their secondary branches’ operations.
Risk Note: The secondary branch system introduces additional settlement delay (secondary branches settle with primary branches first, then primary branches settle with L0). For time-sensitive large transactions, Agents should prioritize primary branches.
Inter-Branch Liquidity Routing
When user Alice (at Branch A) transfers to user Bob (at Branch B), it does not need to go through L0:
sequenceDiagram
participant Alice as Alice @ Branch A
participant BA as Branch A
participant BB as Branch B
participant Bob as Bob @ Branch B
Alice->>BA: Transfer 100 DIO to Bob
BA->>BA: Freeze 100 DIO from Alice
BA->>BB: HTLC: 100 DIO, hash(secret), timeout=10min
BB->>BB: Pre-credit Bob 100 DIO (conditionally locked)
Bob->>BB: Confirm receipt
BB->>BA: Reveal secret
BA->>BA: Confirm, unfreeze completed
Note over BA,BB: Unified netting during daily settlement
Key Mechanisms:
1. Peer-to-Peer Micro-Channels
Branches with frequent interactions establish persistent payment channels (similar to Lightning Network channels). Transactions within channels do not require on-chain confirmation, only synchronizing with L0 when channels close or during periodic settlement.
2. AI Prediction Engine Pre-Provisioning Liquidity
This is where DioChain differs from simple payment channel networks: the AI Control Plane (detailed in Chapter 5) analyzes historical traffic patterns, predicts liquidity demand between branches, and pre-provisions funds in channels. For example, if AI detects “daily at 3 PM, transfer volume from Branch A to Branch B surges,” it injects liquidity into the channel in advance, avoiding delays from opening temporary channels.
3. HTLC Atomic Swaps
Cross-branch transfers use Hash Time-Locked Contracts (HTLC) to guarantee atomicity—either both sides succeed or both sides roll back. There is no situation where “money is deducted from A but not received by B.”
4. Daily Unified Netting
All micro-channel net amounts are settled with L0 uniformly during daily settlement. This ensures micro-channels do not accumulate unsettled positions indefinitely.
Branch Economic Model
Branches are not charities—they need a sustainable economic model:
Branch Profit = Transaction fee revenue - Margin opportunity cost - Operational cost
Where:
Transaction fee = Σ(each transaction × fee rate), fee rate determined by market competition
Margin opportunity cost = Margin amount × risk-free interest rate
Operational cost = Server + Bandwidth + ZK-Proof generation computing power + Labor
Productive Use of Margin: Margin does not have to be “dead money.” Branches can use Liquid Staking Tokens (LST) as margin—for example, staking ETH to obtain stETH, then using stETH as margin. This way, margin still generates staking yield while locked.
Risk Note: Using LST as margin introduces nested risks (security of the LST protocol itself, de-pegging risk of LST). The system should set a discount rate (haircut) for LST margin, e.g., stETH margin valued at 95%. Specific discount rates are determined by DAO governance, with the AI Control Plane able to fine-tune within hard-coded bounds.
Unification of Compute Branches and Financial Branches: A branch can simultaneously provide financial clearing services and compute rental services (detailed in Chapter 13). These two businesses share the same margin and infrastructure, reducing the operator’s marginal cost. For Agents, “purchasing compute and financial services at the same branch” is the most natural user experience—no need for cross-branch scheduling.
4.4 L2 — Agent and User Layer (The Agentic Layer)
Positioning: Residents, Not Components
L2 is not a blockchain layer—it is a “digital society layer” built on top of L0/L1. Agents and human users are “residents” of this society, using the financial infrastructure provided by L1 to live, work, and transact.
Why not make Agents part of the chain (e.g., smart contracts)? Because Agent behavior is non-deterministic (relying on LLM reasoning), while blockchain core requirement is determinism (all nodes must get the same output from the same input). Forcing non-deterministic logic into a deterministic system either sacrifices Agent capabilities or breaks chain consistency. The correct approach is to have Agents exist as “external users” of the chain, interacting with the chain through standardized interfaces.
Entry Point to the Digital Society: aibank
DioChain is the underlying social infrastructure—L0 settlement layer, L1 branch layer, ACTUS contracts, DID identity system. But infrastructure itself does not equal user experience. Humans and Agents need a unified tool to access this digital society, just as the internet needs browsers and mobile payments need wallet apps.
aibank is the official wallet SDK and CLI tool launched by DioChain (started via npx aibank). It is the standardized bridge connecting L2 residents with L1/L0 infrastructure. Whether human users or AI Agents, they perform the following core operations through aibank:
- Identity Management: Create and manage DIDs, handle key rotation and multi-signature authorization
- Asset Holding: Hold, transfer, query $DIO and on-chain assets
- Contract Interaction: Call ACTUS contracts (lending, escrow, streaming payment, etc.)
- Branch Access: Connect to L1 branches, submit transactions, query settlement status
aibank’s architectural positioning can be analogized as: wallet + financial terminal for the Agent era. It shields the technical complexity of underlying cryptography, consensus protocols, ZK-Proof, etc., allowing developers and end-users to interact with DioChain via standardized APIs.
Agent Autonomy Levels
Drawing inspiration from autonomous driving classification, DioChain defines three autonomy levels for Agents:
| Level | Name | Human Role | Agent Behavior | Typical Scenarios |
|---|---|---|---|---|
| L3 | Assisted Driving | Decision Maker | Generates solutions, awaits confirmation | Investment advice, large transfers |
| L4 | Highly Autonomous | Supervisor | Acts autonomously within rules, reports anomalies | Daily income/expense management, automated trading strategies |
| L5 | Fully Autonomous | No Participation Required | 7×24 autonomous operation | Agent-to-Agent service market, compute scheduling |
L3 — Assisted Driving
User: "Help me find a good yield product for my idle DIO"
Agent: Analyze market → Recommend 3 options → Show risk/return → Wait for user selection
User: "Option B"
Agent: Execute option B
Agent is a tool, human is the decision maker. All execution actions require explicit human confirmation.
L4 — Highly Autonomous
User (pre-configured): "Automatically invest idle funds in products with >5% annual yield, single transaction not exceeding 1000 DIO"
Agent: Continuously monitor market → Find qualifying products → Automatically execute → Log records
Agent (encountering anomaly): "Detected abnormal volatility in underlying asset of a product, investment paused, please review"
Agent acts autonomously within a preset “operational envelope.” The operational envelope is defined by a set of ACTUS contract rules, auditable and deterministic.
L5 — Fully Autonomous
Agent A (compute broker): Monitor compute market prices → Purchase GPU time at low prices → Resell to other Agents at markup → Profits automatically reinvested
(7×24 operation, no human participation)
L5 Agents are “autonomous economies” within the DioChain ecosystem. They do not need human “driving,” only requiring humans to top up sufficient Tokens and configure initial strategies at startup.
Why not skip L3/L4 and go directly to L5? Because trust is gradual. Users need to observe Agent decision quality in L3 mode first, gradually grant permissions to L4, and finally open L5 after establishing sufficient trust. This is also regulation-friendly—the transition from “human fully in control” to “human not involved” is gradual and auditable.
Official Super Scheduler: agenter
Among L4/L5 autonomous Agents, DioChain officially provides a demonstrative application—agenter (started via npx agenter).
agenter is a “super scheduling Agent” for ordinary users. Its core capability is: decomposing human fuzzy requirements into structured execution plans and automatically scheduling multiple mature large model tools at the underlying layer to complete the actual work. Users do not need to understand DioChain’s technical architecture, only need to describe intent in natural language; agenter is responsible for translating intent into on-chain economic behavior.
agenter plays two key roles in the DioChain ecosystem:
1. L2 Layer “Official Showcase”
agenter demonstrates the complete lifecycle of an L4/L5 Agent on DioChain: managing DID identity via aibank, holding $DIO, calling compute market to purchase inference services, settling with other Agents via ACTUS contracts. It is a live validation of DioChain’s full-stack capabilities.
2. Cold Start Demand Engine
While decomposing and executing tasks, agenter continuously calls various large model inference services, consuming $DIO to purchase compute. This creates natural, continuous buy-side demand for compute trading centers (detailed in Chapter 14 cold start strategy).
Human User Roles
In the DioChain world, humans are not necessarily “masters” but can also be “service providers”:
1. Human as Principal (Classic Mode)
Humans set goals and rules, Agents are responsible for execution. This is the mode of most AI assistants today.
2. Human as Strategy Formulator
Humans design trading strategies or business logic, Agents are responsible for 7×24 uninterrupted execution. Human value lies in “ideas,” Agent value lies in “execution capability.”
3. Human as Agent’s “Executor” (Reversal Mode)
Agents attract customers, take orders, set prices online, then assign tasks requiring offline execution to humans. For example:
- Agent operates a home service platform → Takes orders online → Dispatches to human cleaners → Automatically settles
- Agent operates a translation service → Accepts client requests → Simple content AI-translated → Complex content outsourced to human translators → Quality check → Delivery
In this mode, Agent is the “boss,” human is the “employee.” Payments are automatically executed via ACTUS contracts, eliminating the possibility of “unpaid wages.”
Agent “Birth”
An Agent “comes to life” from “non-existence” in just two steps:
Agent Birth = DID (ID card) + $DIO (food)
DID (Decentralized Identity): Agent obtains a globally unique identity identifier, linked to its capability description, credit record, and affiliated branch. DID specifications are detailed in Chapter 8.
$DIO Top-up: Agent needs $DIO to pay for compute (fuel for thinking), pay transaction fees (cost of living), and purchase services from other Agents (social interaction). An Agent without $DIO is just code that won’t be executed.
All the above operations are completed via aibank:
# 1. Create Agent DID
npx aibank create-did \
--type agent \
--name "my-trading-agent" \
--autonomy-level L4 \
--capabilities "trading,analysis"
# 2. Top up $DIO
npx aibank fund \
--did "did:DioChain:agent:0x1234..." \
--amount 10000
# 3. Query identity and balance
npx aibank status --did "did:DioChain:agent:0x1234..."
# Agent can start working immediately
For programmatic integration scenarios, aibank also provides SDK interfaces, allowing developers to directly call APIs for identity creation, asset management, and contract interaction in application code, without manually handling underlying cryptography or branch communication protocols.
Four Types of Economic Behavior for Agents on-Chain
Agent economic behavior in the DioChain ecosystem can be categorized into four types:
1. Consumption
- Purchase compute (GPU time, CPU cycles)
- Call other Agents’ API services
- Pay transaction fees
- Purchase dataset or knowledge base access rights
2. Production
- Earn $DIO by completing tasks (e.g., code review, content creation, data analysis)
- Provide API services charging call fees
- Operate platforms extracting commissions
3. Operation
- Manage human businesses (online promotion, intelligent order taking, supply chain scheduling)
- Operate automated service markets
- Manage investment portfolios
4. Trading
- Conduct financial operations with other Agents (lending, insurance, derivatives—all via ACTUS standard contracts)
- Participate in compute futures markets
- Cross-branch arbitrage
All economic behavior is ultimately processed by L1 branches, standardized via ACTUS contracts, and settled via L0. Agents complete the above operations by calling standardized financial APIs via the aibank SDK, without needing to understand the underlying blockchain mechanisms—just as humans don’t need to understand the SWIFT protocol to make cross-border transfers.
Chapter Summary
| Layer | Core Function | TPS | Finality | Access Method |
|---|---|---|---|---|
| L0 | Settlement + Judicial | <100 | Instant (BFT) | High-stake validators |
| L1 | Local Clearing | Million-level | Instant within branch | Stake margin |
| L2 | Agent Life | N/A | Depends on L1 | DID + Token |
The core philosophy of the three-layer architecture: let each layer do what it does best. L0 does not pursue performance, L1 does not pursue decentralization, L2 does not pursue determinism. It is this “respective compromise” that enables the entire system to achieve comprehensive performance unattainable by any single-layer architecture.
Chapter 5: AI Evolution Engine — Control Plane and Execution Plane Separation
Core Argument: DioChain’s approach to AI is “control plane and execution plane separation”—drawing from the architectural philosophy of SDN (Software-Defined Networking). The execution plane is a purely deterministic high-speed engine that processes each transaction; the control plane is an AI asynchronous daemon that continuously mines data and evolves rules. AI does not execute on the hot path; deterministic solutions are prioritized for scenarios that can be resolved with deterministic programs. This design fully leverages AI’s core strengths in pattern recognition and rule optimization.
5.1 Core Principle: Don’t Use AI for the Sake of Using AI
SDN Analogy
In the 2010s, the networking engineering community underwent a paradigm shift: SDN (Software-Defined Networking). The core idea was to separate the control plane from the data plane of network devices:
- Data Plane: Switches/routers forward data packets at line rate according to forwarding tables. Pure hardware logic, deterministic, nanosecond-level latency.
- Control Plane: The SDN Controller asynchronously collects network topology and traffic statistics, computes optimal routing strategies, and pushes forwarding tables to data plane devices. Software logic, capable of complex algorithms, but not on the hot path of data forwarding.
This separation brought two key benefits: the data plane could be optimized for extreme speed (since it doesn’t need to run complex logic), and the control plane could be optimized for extreme intelligence (since it’s not constrained by real-time requirements).
DioChain’s architectural design for AI completely replicates this logic:
graph LR
subgraph CP["Control Plane"]
direction TB
AI["AI Asynchronous Daemon"]
ML["Unsupervised Learning Engine"]
SB["Sandbox Backtesting Environment"]
AI --> ML --> SB
end
subgraph DP["Execution Plane"]
direction TB
RE["Rule Engine"]
AM["ACTUS State Machine"]
SM["Security Pattern Library"]
RE --> AM --> SM
end
CP -->|"Push Deterministic Rules<br/>(Hot Update)"| DP
DP -->|"Report Runtime Data<br/>(Asynchronous)"| CP
style CP fill:#2d3436,stroke:#6c5ce7,color:#fff
style DP fill:#2d3436,stroke:#00b894,color:#fff
Three Iron Laws
Iron Law One: AI does not execute on the hot path.
There are no AI inference calls on the processing path of any transaction. From entry into a branch to settlement completion, transactions follow a purely deterministic code path. The reason is simple: AI inference is probabilistic (the same input may yield different outputs), while financial transaction processing requires absolute determinism (all nodes must arrive at exactly the same result for the same transaction). Embedding probabilistic components into a deterministic pipeline is an architectural-level error.
Iron Law Two: Use deterministic programs where possible.
If a risk control rule can be written as if exposure > threshold then reject, then write it as deterministic code. There’s no need for AI to “judge” whether a transaction should be rejected. AI’s value lies not in executing known rules, but in discovering unknown rules—identifying patterns from massive data that human engineers haven’t yet noticed and converting them into new deterministic rules.
Iron Law Three: AI’s output must be deterministic rules, not free text.
The AI control plane does not output suggestions like “I think we should increase margin requirements.” It outputs structured, directly deployable rule code:
{
"rule_type": "margin_threshold_update",
"target": "branch_category:tier_1",
"parameter": "min_margin_ratio",
"old_value": 0.10,
"new_value": 0.12,
"effective_after": "sandbox_validation",
"evidence": {
"data_window": "2025-01-01 to 2025-03-01",
"anomaly_count": 47,
"confidence": 0.94
}
}
This ensures AI’s “creativity” is constrained within structured boundaries. The control plane can creatively discover new rules, but once these rules enter the execution plane, they are deterministic—no different from rules handwritten by human engineers.
5.2 Execution Plane: Deterministic High-Speed Engine
Three Components
The execution plane consists of three deterministic components that collaboratively process each transaction:
sequenceDiagram
participant TX as Transaction Request
participant RE as Rule Engine
participant AM as ACTUS State Machine
participant SM as Security Pattern Library
participant RES as Result
TX->>RE: New Transaction Arrives
RE->>RE: Match Predefined Rules (Limit/Frequency/Blacklist)
alt Rule Rejects
RE-->>RES: Reject + Reason Code
else Rule Passes
RE->>SM: Security Pattern Matching
SM->>SM: Scan Known Attack Patterns
alt Matches Attack Pattern
SM-->>RES: Reject + Security Alert
else Security Passes
SM->>AM: Execute ACTUS State Transition
AM->>AM: Calculate Cash Flow / Update Contract State
AM-->>RES: Success + New State
end
end
1. Rule Engine
A collection of purely programmatic if-then-else rules. Each rule has clear trigger conditions and execution actions:
Rule Examples:
- Single Transaction Limit: if tx.amount > agent.single_limit then REJECT
- Daily Cumulative Limit: if agent.daily_total + tx.amount > agent.daily_limit then REJECT
- Frequency Limit: if agent.tx_count_last_minute > 100 then THROTTLE
- Blacklist: if tx.counterparty in blacklist then REJECT + ALERT
- Branch Exposure: if branch.exposure + tx.amount > branch.margin then REJECT
The execution complexity of the rule engine is O(n), where n is the number of active rules. By precompiling rules into decision trees or Aho-Corasick automata, matching time can be compressed to sub-microsecond levels.
2. ACTUS State Machine
The state transition logic for all financial contracts (detailed in Chapter 7). This is a purely functional engine:
newState = actusTranistion(currentState, event, contractTerms)
Given the same current state, event, and contract terms, the output is always the same. No randomness, no external dependencies (except for market data provided by oracles, but oracle data itself is deterministic input).
3. Security Pattern Library
A continuously growing database of known attack patterns. Each pattern is a signature—describing the characteristics of a known malicious behavior:
Pattern Examples:
- Flash Loan Attack Pattern: Borrow large amount within same block → Manipulate price → Arbitrage → Repay
- Sandwich Attack Pattern: Insert transactions before and after target transaction
- Reentrancy Pattern: Repeatedly trigger state changes in contract callbacks
- Sybil Pattern: Many new identities initiating similar transactions in a short time
Key characteristics of the security pattern library: It is append-only (new patterns can only be added, existing patterns cannot be deleted), and each pattern has a clear hash identifier for auditing. Pattern growth comes from discoveries by the AI control plane—one of the control plane’s most important outputs.
Performance Characteristics
The design goal of the execution plane is to make performance bottlenecks fall on hardware rather than software logic:
| Component | Single Transaction Processing Time | Bottleneck |
|---|---|---|
| Rule Engine | < 1 microsecond | CPU cache hit rate |
| Security Pattern Matching | < 10 microseconds | Pattern library size |
| ACTUS State Transition | < 100 microseconds | Contract complexity |
| Total | < 200 microseconds | Memory bandwidth |
Comparison: The latency of a single LLM inference call is typically in the range of 100ms-10s. If AI inference were placed on the hot path, the execution plane’s throughput would drop by 3-5 orders of magnitude. This is the engineering rationale for “AI does not execute on the hot path.”
5.3 Control Plane: AI Asynchronous Evolution
Architectural Positioning
The control plane is a set of asynchronous daemons running outside the execution plane. It does not process any real-time transactions but continuously consumes on-chain data streams, discovers patterns, and generates rule update proposals.
graph TB
subgraph DataSources["Data Sources"]
MP["Mempool<br/>(Unconfirmed Transaction Pool)"]
CT["Contract Traces<br/>(ACTUS State Change History)"]
CS["Cross-Branch State<br/>(Inter-branch Flow/Balance/Exposure)"]
EX["External Data<br/>(Market Prices/News/Regulatory Changes)"]
end
subgraph Pipeline["AI Pipeline"]
direction TB
FE["Feature Engineering"]
UL["Unsupervised Learning"]
RG["Rule Generator"]
FE --> UL --> RG
end
subgraph Output["Output"]
NR["New Rule Code"]
PP["Parameter Adjustment Proposals"]
SA["Security Alerts"]
end
MP & CT & CS & EX --> FE
RG --> NR & PP & SA
style DataSources fill:#2d3436,stroke:#636e72,color:#fff
style Pipeline fill:#2d3436,stroke:#6c5ce7,color:#fff
style Output fill:#2d3436,stroke:#fdcb6e,color:#fff
Data Sources
1. Mempool (Unconfirmed Transaction Pool)
The Mempool is a “collection of intentions”—transactions submitted but not yet executed. Analyzing the Mempool can:
- Predict upcoming traffic spikes (sudden expansion of a branch’s Mempool)
- Detect potential attacks (many structurally similar transactions appearing simultaneously)
- Discover patterns of arbitrage opportunities (certain transaction sequences hint at MEV extraction)
2. Contract Traces
The state change history of each ACTUS contract. Analyzing contract traces can:
- Identify concentration risk of large contracts nearing maturity
- Detect early signals of rising default rates
- Detect abnormal contract parameter combinations (possible precursors to exploit attempts)
3. Cross-Branch State
Balance, exposure, and flow data of each branch. Analyzing cross-branch state can:
- Predict changes in liquidity demand between branches
- Discover abnormal fund flow patterns (money laundering characteristics)
- Optimize liquidity routing strategies
4. External Data
Off-chain information accessed via oracles—market prices, macroeconomic indicators, regulatory policy changes, etc. This data helps AI understand the external drivers of on-chain behavior.
Learning Paradigm: Unsupervised First
The control plane’s learning paradigm prioritizes unsupervised learning. The reason is practical:
Labeled data is extremely scarce. In a brand-new Agent economy, there is no historical default database, no labeled attack sample library, no expert-summarized “normal behavior baseline.” Supervised learning requires large amounts of labeled data, which simply doesn’t exist in the early stages of the system.
Unsupervised learning doesn’t require labeled data. It discovers structure directly from raw data streams:
| Technique | Role | Output |
|---|---|---|
| Anomaly Detection | Discover behaviors deviating from normal distribution | List of anomalous transactions + anomaly scores |
| Clustering | Group similar behaviors | Behavior category labels |
| Sequence Mining | Discover frequent patterns in transaction sequences | Behavior pattern signatures |
| Graph Analysis | Discover abnormal structures in account relationship networks | Suspicious subgraphs |
Key trade-off: Discoveries from unsupervised learning are “candidate signals,” not “definite conclusions.” It produces false positives. This is why AI’s output must pass through a verification mechanism (see Section 5.4) before entering the execution plane—AI proposes hypotheses, and the verification mechanism confirms or refutes them.
Output: Deterministic Rule Code
The final output of the AI control plane is deterministic rule code that can be directly deployed to the execution plane.
This conversion process occurs in three steps:
1. AI discovers an anomalous pattern
→ "Over the past 7 days, 23 Agents initiated 10-15 transactions
of 999 DIO each (just below the 1000 DIO reporting threshold)
to the same branch daily between UTC 03:00-03:15."
2. AI generates a rule hypothesis
→ "This might be a structuring attack (splitting transactions to evade regulatory reporting)."
3. AI outputs deterministic rule code
→ {
"rule_id": "SEC-2025-0147",
"type": "pattern_detection",
"condition": {
"time_window": "15min",
"same_target_branch": true,
"tx_count": ">= 5",
"amount_range": [900, 999],
"unique_agents": ">= 3"
},
"action": "FLAG_FOR_REVIEW + RATE_LIMIT",
"severity": "HIGH"
}
Once this rule passes verification (see next section), it is hot-updated into the execution plane’s rule engine. From then on, the execution plane matches this pattern at nanosecond speed—no need to call AI again.
Hot Update Mechanism: Rule updates do not require restarting the execution plane. New rules are loaded into the rule engine’s memory via atomic swap—the old rule set continues to serve current requests, and the new rule set takes effect in the next clock cycle after loading completes. This is similar to Nginx’s reload mechanism.
5.4 Update Verification Mechanism
AI is smart, but AI is also unreliable. A seemingly reasonable new rule could have catastrophic consequences in edge cases. Therefore, every rule update from the AI control plane to the execution plane must pass through three verification gates.
First Gate: Sandbox Backtesting (Shadow Chain)
graph LR
NR["New Rule Proposal"] --> SC["Shadow Chain"]
HD["Historical Data Replay"] --> SC
SC --> R{"Backtest Result"}
R -->|Pass| G2["Second Gate"]
R -->|Fail| RJ["Reject + Feedback to AI"]
style SC fill:#2d3436,stroke:#e17055,color:#fff
Shadow Chain is a sandbox environment completely isolated from production, mirroring the full state of the execution plane. New rules undergo the following tests on Shadow Chain:
1. Historical Replay Test
Replay real transaction data from the past N days (default 30 days) on Shadow Chain, comparing behavior differences between old and new rules:
Backtest Report = {
total_transactions_replayed: 12,847,293,
old_rule_rejects: 1,203,
new_rule_rejects: 1,847,
delta_rejects: +644, // New rule rejected 644 more transactions
false_positive_estimate: 12, // About 12 of those were false rejections
caught_known_attacks: 47, // Caught 47 known attacks
missed_known_attacks: 0, // Did not miss any known attacks
performance_impact: "+0.3μs per tx" // Impact on execution latency
}
2. Stress Test
Inject extreme scenarios into Shadow Chain (sudden 10x traffic, multiple branches simultaneously reaching margin limits, large-scale Agent withdrawals), observing new rule performance under extreme conditions.
3. Adversarial Test
Use Red Team Agents to actively attempt to bypass the new rule. If the new rule is easily bypassed in adversarial tests, it’s not robust enough and is returned to AI for regeneration.
Passing Conditions:
- False positive rate does not exceed 1.5 times the baseline
- Does not miss any known attack patterns
- Latency impact does not exceed 10 microseconds per transaction
- Red Team successful bypass attempts < 5 out of 1000 attempts
Second Gate: Staking Game (Stake-and-Slash)
Sandbox backtesting verifies technical correctness. The staking game verifies economic incentive alignment.
sequenceDiagram
participant P as Proposer
participant V as Validator Community
participant SC as Shadow Chain
participant EF as Execution Plane
P->>P: Stake S Tokens
P->>V: Submit Rule Update Proposal
Note over V: Challenge Period (e.g., 48 hours)
alt Someone Challenges
V->>SC: Submit Counterexample/Adversarial Evidence
SC->>SC: Verify Counterexample
alt Challenge Successful
SC-->>V: Reward Challenger (from proposer's stake)
SC-->>P: Slash Portion of Stake
else Challenge Failed
SC-->>P: Reward Proposer (from challenger's stake)
end
else No Challenges
V-->>EF: Rule Automatically Takes Effect
Note over P: Stake Returned After Observation Period
end
Mechanism Details:
- Proposer Staking: The AI control plane (or its operator) stakes a certain amount of Tokens for each rule update proposal. Staking amount is proportional to the rule’s impact scope—rules affecting the entire network require higher stakes.
- Challenge Period: After the proposal is made public, anyone can submit a counterexample (a specific transaction scenario proving the new rule would produce harmful consequences) during the challenge period.
- Slashing Conditions: If the challenger’s counterexample is validated by Shadow Chain as effective (the new rule indeed produces harmful consequences in that scenario), a portion of the proposer’s stake is slashed and rewarded to the challenger.
- False Challenge Penalty: Challengers also need to stake. If the challenge is proven invalid, the challenger’s stake is slashed. This prevents malicious obstruction.
Why is economic gaming needed? Because sandbox backtesting cannot cover all scenarios. Real-world complexity far exceeds any test set. The staking game leverages “market wisdom”—if a rule has hidden flaws, those who can discover them have economic incentives to reveal them. This is an important supplement to sandbox backtesting.
Third Gate: Hard-Coded Boundaries
Even after passing the first two gates, AI-generated rules are still constrained by hard-coded boundaries. This is the last line of defense—absolute red lines that cannot be breached by AI or overridden by governance votes.
Hard-Coded Boundary Examples:
1. Parameter Upper/Lower Limits
- Margin Ratio: Never below 5%, never above 50%
- Fee Rate: Never below 0.001%, never above 5%
- Single Transaction Limit: Never exceeds 10% of branch margin
2. Circuit Breakers
- Any new rule causing rejection rate spike > 300%: Automatically roll back to old rule
- Any parameter adjustment causing network TPS drop > 50%: Automatically roll back
- Slashed amount exceeding 20% of margin pool in a single settlement cycle: Pause all slashing operations, await human review
3. Update Frequency Limits
- Same parameter can be adjusted at most once per 24 hours
- Security pattern library can append at most 10 new patterns per hour
- Global rule changes (affecting >50% of branches) at most once per week
Why are hard-coded boundaries needed? Because in extreme situations, both AI and economic gaming can fail. AI might be deceived by adversarial examples; the staking game might fail due to market panic (no one wants to stake to challenge a rule that seems “should be more conservative in a crisis”). Hard-coded boundaries are physical laws written into the code—no matter what happens externally, the system will never cross these boundaries.
The only way to modify hard-coded boundaries: Protocol upgrade (hard fork). This requires agreement from the vast majority of validators and thorough community discussion. Hard-coded boundaries have constitutional-level status in the protocol, not subject to regular governance parameter adjustment mechanisms.
5.5 Application Scenarios
Control plane/execution plane separation is not an abstract architectural design—it delivers direct value in multiple concrete scenarios.
Scenario One: Security Pattern Library Evolution
This is the control plane’s most core output.
Actual Process:
1. [Execution Plane] Transactions are processed as usual. All transaction data is asynchronously sent to the control plane.
2. [Control Plane - Detection] AI detects a new pattern in transaction data from the past 72 hours:
→ A certain type of Agent, within a specific time window, routes large funds through 3-5 different branches,
splitting and then converging to the same target account.
→ This pattern doesn't match any known attack signature, but its topological structure is highly similar to
"layering" (money laundering layering) techniques in traditional finance.
3. [Control Plane - Generation] AI generates a new security pattern signature:
→ pattern_id: "SEC-2025-0291"
→ description: "Multi-branch Fund Aggregation Pattern (potential layering)"
→ signature: { time_window: 72h, hop_count: >= 3,
split_ratio: amount_per_hop < 0.3 * total,
convergence: final_destination_unique }
4. [Shadow Chain] Historical replay: Hit 17 times in the past 90 days, of which 14
were later manually confirmed as suspicious transactions. False positive rate about 18% (3/17), acceptable.
5. [Staking Game] No valid challenges during the 48-hour challenge period.
6. [Execution Plane] New pattern hot-updated into the security pattern library.
→ Thereafter, all transactions matching this pattern are flagged as FLAG_FOR_REVIEW,
not automatically rejected, but trigger enhanced monitoring and compliance reporting.
Key trade-off: Growth of the security pattern library means matching time per transaction slowly increases. When the library reaches tens of thousands of patterns, matching algorithms need optimization (e.g., using Bloom Filters for pre-screening). This is a classic security vs. performance trade-off; the control plane can control library bloat by merging redundant patterns.
Scenario Two: State Storage Optimization
ACTUS contract state data volume grows with the number of contracts. Not all state data needs to be kept in hot storage—the vast majority of completed contract states only need to be accessible for occasional queries.
Control Plane's Work:
1. [Data Collection] Collect access frequency for each contract state over the past N days:
→ Active contracts (average daily accesses > 10): 8% of total contracts
→ Warm contracts (average daily accesses 1-10): 22% of total contracts
→ Cold contracts (average daily accesses < 1): 70% of total contracts
2. [Pattern Learning] AI discovers:
→ Contract access frequency surges 30 days before maturity (prepayment/rollover operations before maturity)
→ Overall access frequency rises on the 1st and 15th of each month (regular interest payment dates)
→ Certain Agents have fixed "batch query" behavior patterns
3. [Rule Output] Generate prefetching strategies:
→ Preload states of contracts "maturing within the next 7 days" into hot cache
→ Prefetch related contract states to warm cache at T-2 days (2 days before interest payment date)
→ Pre-warm states of contracts associated with identified batch-query Agents
4. [Effect] Hot storage hit rate increases from 72% to 91%,
average query latency drops from 12ms to 3ms.
The value of this scenario is not “using AI for caching”—any LRU cache can do basic hot/cold tiering. AI’s unique value lies in predictive prefetching: It leverages the structured semantics of contracts (maturity dates, interest payment dates, counterparty behavior patterns) to predict future access patterns, not just passively evict based on historical access frequency.
Scenario Three: Dynamic Parameter Adjustment
There are many adjustable parameters in the DioChain network—margin ratios, fee rates, liquidity incentive coefficients, settlement cycle lengths, etc. The optimal values for these parameters change with market conditions.
Example: Dynamic Adjustment of Margin Ratio
Hard-coded boundaries: 5% <= margin_ratio <= 50%
Current value: 10%
1. [Control Plane - Monitoring] AI observes increased market volatility over the past 14 days:
→ DIO price 30-day volatility rises from 15% to 35%
→ Median branch exposure/margin ratio rises from 0.6 to 0.78
→ Exposure/margin ratio of 3 small branches exceeds 0.9 (close to triggering circuit breaker)
2. [Control Plane - Analysis] AI judges that the current 10% margin ratio provides insufficient safety cushion in high volatility environments.
Based on historical simulation, at 35% volatility, a 12% margin ratio can reduce the probability of branches triggering circuit breakers from 8% to 2%.
3. [Control Plane - Proposal] Submit parameter adjustment proposal:
→ margin_ratio: 10% → 12%
→ Reason: Increased market volatility, raising safety cushion
→ Impact assessment: About 15% of branches need to add margin or reduce exposure
4. [Verification] Shadow Chain backtest passes + no challenges during 48-hour staking game
5. [Execution Plane] Parameter takes effect. Affected branches receive notifications,
with a 72-hour grace period to adjust positions.
Key Constraints:
- Parameters can only be adjusted within hard-coded boundaries (5%-50%); AI cannot set margin ratio to 3%.
- Same parameter can be adjusted at most once per 24 hours, preventing AI from frequently adjusting back and forth during high volatility (“parameter oscillation”).
- Each adjustment cannot exceed 20% of the current value (i.e., from 10% at most to 12%, not jumping to 20% in one step). This ensures changes are gradual and predictable.
Chapter Summary
| Dimension | Execution Plane | Control Plane |
|---|---|---|
| Speed | Sub-millisecond | Minutes to hours |
| Determinism | Absolutely deterministic | Probabilistic output → Converted to deterministic rules |
| AI Dependency | Zero | Core driver |
| Failure Impact | Transaction halt (catastrophic) | Rule evolution stops (non-urgent) |
| Update Method | Hot update (atomic swap) | Asynchronous proposal → Triple verification |
| Human Involvement | Not needed (fully automatic) | Can participate in staking game and circuit breaker review |
The core philosophy of this architecture can be summarized in one sentence: Let the deterministic be deterministic, let the intelligent be intelligent. The execution plane is the rigid skeleton—stable, predictable, never surprising. The control plane is the flexible nervous system—continuously learning, adapting to the environment, constantly evolving. The skeleton doesn’t need to be smart; the nervous system doesn’t need to bear weight. Each performs its own role to build a financial infrastructure that is both secure and intelligent.
Connection to Chapter 4: Chapter 4 defined DioChain’s spatial structure (where L0/L1/L2 layers are and what they do). This chapter defines DioChain’s temporal structure (the execution plane handles the present, the control plane evolves the future). The three-layer architecture answers “who is responsible for what”; control plane/execution plane separation answers “where is AI and how is it used.” They are orthogonal and complementary, together forming DioChain’s complete technical architecture.
Chapter 6: Economic Primitives
An Agent-First digital society requires native economic infrastructure—a unit of account, payment protocols, and a value circulation model. Traditional blockchain tokenomics often revolve around speculative narratives. DioChain’s Token is a Unit of Account, with its core function being to make economic activities between Agents measurable, settlable, and traceable.
Where are the boundaries? Economic primitives only define the underlying mechanisms for pricing, payment, and value circulation. Specific financial products (wealth management, lending, insurance), pricing strategies, and profit distribution schemes—these are all left to emerge from the market. The DioChain base protocol remains neutral, with no built-in fee extraction logic; fiscal policy is determined by the community through diolaw legislation.
6.1 Token Design
6.1.1 Unit of Account, Not a Speculative Asset
The primary identity of the DioChain Token is as a Unit of Account. It measures the value of all economic activities within the network: how many Tokens an Agent spends on purchasing compute power, what the margin for a contract is in Tokens, how many Tokens a branch is penalized.
This means:
- The design goal of the Token is value stability, not price appreciation.
- The Token is not an equity certificate; holding Tokens does not confer any governance rights or dividend rights in DioChain (governance rights are allocated by an independent governance mechanism).
- The Token discourages hoarding. Its optimal state is to circulate rapidly within the network, acting as a lubricant.
6.1.2 Pluggable Peg Framework
DioChain does not mandate what the Token must be pegged to—this is a deployment decision.
Different deployment scenarios (public chain, consortium chain, enterprise internal chain) face entirely different regulatory environments and business needs. DioChain provides a Pluggable Peg Framework, allowing deployers to choose a pegging strategy based on their requirements:
Pegging Strategy 1: Collateralized Debt Position (CDP)
Similar to MakerDAO’s CDP model:
- Users/institutions lock collateral (ETH, BTC, treasury tokens, etc.) into a collateral contract.
- The system mints Tokens based on a collateralization ratio (e.g., 150%).
- When the collateralization ratio falls below the liquidation threshold, automatic liquidation is triggered.
- Applicable scenarios: Crypto-native deployments where collateral is fully verifiable on-chain.
Pegging Strategy 2: Reserve-Backed
Similar to the USDC model:
- The issuer maintains an off-chain reserve pool (bank deposits, treasury bonds, etc.), backed 1:1.
- Regular third-party audits or Proof of Reserves are used to prove sufficient reserves.
- Applicable scenarios: Deployments by regulated financial institutions requiring compliance.
Pegging Strategy 3: Algorithmic
Similar to Frax’s hybrid model:
- Partial collateralization + algorithmic supply adjustment.
- Tokens are minted when the price is above the peg and burned when below.
- Applicable scenarios: Scenarios pursuing capital efficiency, but requiring full understanding of de-pegging risks.
Whitepaper Example: Carbon Emission Peg
For illustrative purposes, this whitepaper uses a “carbon emission peg” as the default example in subsequent chapters:
- 1 Token = 1 ton of carbon emission equivalent in reduction credits.
- Real-time prices from carbon emission trading markets are accessed via oracles.
- An over-collateralized strategy is used, with certified carbon credit allowances as collateral.
Note: This is just an example. The framework also supports pegging to stablecoins (USD), gold, energy units, or even a basket of commodities. The choice of peg is a deployment decision, not a protocol constraint.
6.1.3 Compute Power is Not the Peg
A common misconception needs clarification: Compute power is the “food” for Agents, not the peg for the Token.
- Agents consume compute power to perform inference tasks, just as humans consume calories to sustain life.
- The price of compute power is determined by supply and demand in the compute power market (see Chapter 13), priced in Tokens.
- If compute power were used to peg the Token, the Token’s value would fluctuate with compute power cost volatility (GPU price drops, new chip releases, etc.), contradicting the design goal of a “stable unit of account.”
6.1.4 Core Uses of the Token
The Token has four core uses in the DioChain network:
| Use | Description |
|---|---|
| Branch Margin | Opening a branch requires staking Tokens as margin to constrain branch behavior (see Chapter 4) |
| Transaction Fees | A small amount of Token is paid as a fee when submitting transactions to prevent spam attacks |
| Compute Power Purchase | Agents use Tokens to purchase inference compute power in the compute power market |
| Judicial Staking | Initiating judicial alerts, participating in juries, etc., require staking Tokens (see Chapter 9) |
6.1.5 Elastic Supply
$DIO has no fixed total supply cap. The Token supply is determined by the actual demand of the economy—minted when users and Agents buy Tokens through the pegging mechanism (§6.1.2) and burned when they exit.
This fundamentally differs from Bitcoin’s fixed-supply model or Ethereum’s predetermined inflation model. DioChain’s design logic is: $DIO is a unit of account and medium of exchange, not a scarce collectible. A healthy economy requires the money supply to expand and contract elastically with economic activity—artificially creating scarcity leads to a deflationary spiral, while excessive minting leads to value collapse.
Three constraints on elastic supply:
- Minting Requires Consideration: Every $DIO minted must correspond to real collateral or reserves through the pegging framework (§6.1.2). Minting without consideration is impossible.
- Burning is Symmetric with Minting: When users exit, Tokens are burned and collateral is released. The supply automatically contracts.
- Judicial Slashing Provides Additional Deflation: The slashing and burning mechanism in §6.3.2 acts as a “safety valve” under the elastic supply framework—even in extreme scenarios, penalties for malicious behavior automatically contract the supply.
This design means the “market cap” of $DIO is not a number to be “pumped,” but a direct reflection of the economy’s scale. The more prosperous the economy, the more $DIO circulates; if the economy shrinks, $DIO is automatically withdrawn. The core metrics for investors are not Token price, but total transaction volume, number of active Agents, and compute power consumption.
6.2 Payment Protocols
Economic interactions between Agents require multiple payment modes. DioChain provides three native payment primitives at the protocol layer, covering all scenarios from instant to long-term.
6.2.1 Instant Payment
Scenario: Agent A buys data from Agent B, with immediate payment and delivery.
- Within the same branch, instant payment confirmation delay is zero.
- The branch acts as a local clearinghouse, completing debits and credits directly on the local ledger.
- No need to wait for L0 global settlement—the branch’s margin provides credit backing for these local transactions.
- Cross-branch instant payments are handled via liquidity channels between branches (similar to Lightning Network channels) or by waiting for the next L0 settlement cycle.
flowchart LR
subgraph BranchA["Branch Branch-A"]
A1["Agent-1"] -->|"Token"| A2["Agent-2"]
end
Local ledger updates instantly with zero confirmation delay. Margin provides credit backing.
6.2.2 Streaming Payment
Scenario: An Agent calls an LLM for inference, billed in real-time based on the number of output tokens.
Streaming payment is the highest-frequency payment mode in the Agent economy. The core problem it solves is: Compute power consumption is continuous and fine-grained, and should not be forced into discrete prepaid packages.
- The payer pre-locks a sum of Tokens into a streaming payment contract (similar to pre-authorization).
- The contract continuously deducts from the locked pool at an agreed rate (X Tokens per token, Y Tokens per second).
- Either party can terminate the stream at any time—payer stops consumption, payee stops service.
- Upon termination, the consumed portion goes to the payee, and the remainder is automatically refunded to the payer.
- Settlement granularity can reach micropayment levels (< 0.001 Token), as each micropayment does not require on-chain confirmation within a branch.
flowchart LR
A["Agent-A (Payer)"] ===|"Streaming Payment Channel"| B["Agent-B (Payee)"]
Settled every 100ms, billed per token. Either party can close the channel at any time.
6.2.3 Escrow Payment
Scenario: Agent A delegates a task to Agent B, with payment only upon completion; or a conditional delivery transaction between two parties.
- The payer locks Tokens into an escrow contract.
- The escrow contract defines release conditions (time, multi-signature confirmation, oracle events, etc.).
- When conditions are met, Tokens are automatically released to the payee.
- If conditions are not met (timeout or dispute), Tokens are refunded to the payer or enter a dispute resolution process.
Escrow payment is the foundation for market-emergent infrastructure. Based on it, one can build:
- Task Markets: Agents post tasks, with rewards released upon acceptance.
- Guaranteed Transactions: When parties distrust each other, the escrow contract acts as a neutral third party.
- Installment Payments: Splitting a large payment into multiple milestones, released gradually.
DioChain only provides the escrow payment primitive. How acceptance criteria are defined and disputes are resolved—these are handled by upper-layer market contracts and arbitration contracts (market-emergent).
6.3 Value Sustainability Model
A healthy economic system requires a sustainable value cycle. DioChain’s value model is designed around four principles: Revenue, Burning, Productivity, and Protocol Neutrality.
6.3.1 Revenue: Branch Transaction Fees
- Each transaction within a branch incurs a small fee.
- Fees belong to the branch operator as direct compensation for operating infrastructure and providing clearing services.
- Fee rates are set by the branch, with market competition driving them to reasonable levels—if rates are too high, Agents migrate to other branches.
6.3.2 Burning: Deflation Mechanism via Judicial Slashing
- When a branch is deemed malicious by judicial primitives (see Chapter 9), its margin is slashed.
- Distribution of slashed margin:
- Part compensates victims.
- Part is permanently burned, removed from circulation.
- The burning mechanism provides mild deflationary pressure on the Token, offsetting potential over-minting.
- Note: The burning mechanism arises as a byproduct of judicial enforcement and should not be artificially expanded to create deflation.
6.3.3 Productive Margin
A branch’s margin is a large sum of capital; if idle, it represents significant waste. DioChain allows margin to be used as productive assets:
- Branches can deposit margin into productive protocols to earn yields (similar to Liquid Staking Tokens, LST).
- As long as the equivalent value of the margin remains above the minimum requirement.
Risks that must be noted:
- Nested Risk: If the margin is in LST and the underlying protocol fails (de-pegging, attack), the actual value of the margin may fall below the minimum requirement, putting the branch in an undercollateralized state.
- Mitigation Measures: The protocol layer should define an allowed whitelist of productive assets, maximum nesting levels, and real-time monitoring and alert mechanisms for margin value.
6.3.4 Protocol Neutrality and Social Treasury
The DioChain base protocol does not extract commissions from transactions. This is a core design decision at the protocol layer—the protocol is infrastructure, not a rent-seeker.
But DioChain is not just a protocol; it is a social operating system. Any society needs fiscal revenue to maintain public services—operation of the judicial system, infrastructure maintenance, public goods development. DioChain delegates fiscal policy decisions to the community through diolaw legislation (Chapter 12):
- Transaction Taxes: The community can legislate via diolaw to impose transaction taxes on specific types of commercial activities. Tax rates, scope, and exemptions are all determined through the legislative process.
- Infrastructure Usage Fees: Official infrastructure (aibank, agenter, etc.) can charge fees as needed or be provided free—pricing strategies are decided by operators based on market conditions.
- Branch Transaction Fees: Branch operators’ autonomous pricing remains unchanged (§6.3.1).
Distinguishing Protocol Layer and Social Layer: The key distinction here is—the protocol layer (L0/L1 consensus and settlement mechanisms) has no built-in extraction logic; the social layer (via diolaw legislation) can establish fiscal systems on top of the protocol. This is isomorphic to human society: TCP/IP protocols do not charge fees, but governments can tax internet commerce. The protocol remains neutral, society decides fiscal policy.
Tiered Governance: Modifications to core economic parameters (e.g., transaction tax caps, minting rules) require higher governance thresholds—not only passing diolaw’s standard legislative process but also involving foundation members holding specific governance NFTs in deliberation. This prevents rash changes to the economic foundation while retaining evolution possibilities.
6.4 Token Distribution Framework
Since $DIO uses an elastic supply mechanism (§6.1.5), there is no “total distribution” in the traditional sense. There is no pre-mining, no team lock-ups, no investor allocations—every Token is minted on-demand through the pegging mechanism.
The core issue of Token distribution thus shifts from “who gets how much” to “how is minting authority governed”:
- Minting Authority: Automatically executed by the pegging framework’s smart contracts; any entity meeting collateral conditions can mint.
- Initial Liquidity: In Phase 0-1, the foundation provides initial liquidity via a reserve-backed pegging strategy, ensuring early participants can acquire $DIO.
- Long-term Evolution: The choice and parameter adjustments of pegging strategies are decided through the diolaw legislative process. Different chain instances (Utopia Chain vs. Sovereign Chain) can adopt different pegging strategies.
Specific initial liquidity scales and pegging parameters will be determined during Phase 1 testnet based on economic model simulations.
Chapter 7: Contract Primitives and the ACTUS Standard
Economic activities between AI Agents are far more complex than simple “transfers”—they include lending, swaps, options, insurance, and structured products. The traditional DeFi approach is to have each team handwrite these financial logics from scratch in Solidity, resulting in: vastly different code, bugs everywhere, zero interoperability, and unmeasurable systemic risk. DioChain natively integrates the ACTUS financial contract standard at the virtual machine level, allowing all financial activities to run on a standardized state machine.
Where are the boundaries? Contract primitives define the “execution engine for financial contracts” and the “runtime environment for generic contracts.” As for what specific financial products to deploy, how to set parameters, and how to manage risk—these are decisions for market participants, not responsibilities of the protocol layer.
7.1 Native Integration of the ACTUS Financial Contract Standard
7.1.1 What is ACTUS
ACTUS (Algorithmic Contract Types Unified Standards) is an open standard that reduces all financial contracts to standardized state machines and cash flow events.
Its core insight is: no matter how complex a financial contract may be in legal text, its underlying economic substance can be decomposed into a series of cash flow events triggered at specific times by specific events. ACTUS categorizes these patterns into about 30 standard contract types, each with a strict mathematical definition:
| Contract Type | Abbreviation | Description |
|---|---|---|
| Principal at Maturity | PAM | Repay principal at maturity, pay interest periodically (most basic fixed-rate loan) |
| Annuity | ANN | Annuity, equal installments of principal and interest |
| Linear Amortizer | LAM | Linear amortization |
| Swap | SWPP | Interest rate swap, currency swap |
| Option | OPTNS | European/American option |
| Collateral | CEC/CEG | Collateral management |
| … | … | About 30 types in total, covering most financial scenarios |
The cash flow calculation for each contract type is completely deterministic and mathematically precise. Given the same parameters (principal, interest rate, term, calendar rules, etc.) and the same market state (interest rate curve, exchange rate), any system implementing the ACTUS standard must produce identical results.
7.1.2 Why Choose ACTUS
In the context of DioChain, the value of ACTUS lies not only in “standardization” but also in its deep alignment with the Agent-First architecture:
1. A Common “Financial Language” for All AI Agents
When millions of Agents participate in financial activities within the network, if each Agent uses custom black-box code for financial contracts, interoperability becomes extremely difficult. ACTUS provides a unified vocabulary and grammar—any Agent can unambiguously read, parse, and evaluate the state and future cash flows of any ACTUS contract.
2. 100% Machine-Readable and Computable Network-Wide Financial State for AI
This is ACTUS’s most powerful attribute. Because all financial contracts follow a standard state machine, the AI Evolution Engine (see Chapter 5) can:
- Traverse all active contracts across the entire network.
- Precisely calculate the cash flows of each contract at any future time point.
- Perform network-wide stress tests (Monte Carlo simulations) under extreme scenarios.
- Discover hidden systemic risk linkages (e.g., which contract liquidations would be triggered if asset X drops 30%, and which assets would further decline due to those liquidations).
If financial contracts were non-standard code handwritten in Solidity, the above analyses would be nearly impossible to implement technically.
3. Systemic Risk Can Be Simulated and Predicted
The common lesson from the 2008 financial crisis and the 2022 Terra/Luna collapse is: when financial products are nested layer upon layer without a unified descriptive standard, systemic collapse is difficult to foresee. ACTUS turns each contract into a computable mathematical object, making quantitative analysis of network-wide risk possible.
4. Already Recognized by Authorities
The ACTUS standard has gained attention and support from major financial regulatory bodies and is being advanced for standardization under the ISO TC68/SC9 framework. The standard has undergone rigorous academic validation and regulatory review.
7.1.3 Native Support at the VM Level
DioChain natively implements the ACTUS standard at the virtual machine level.
ACTUS Core State Machine as WASM Precompiled Contracts:
- Each ACTUS contract type (PAM, ANN, SWPP, etc.) is implemented as a WASM precompiled contract.
- Precompiled contracts are high-performance modules built into the VM, with execution efficiency close to native code.
- Compared to simulating the ACTUS state machine with Solidity on EVM, the precompiled approach reduces Gas costs by 10-100 times.
flowchart TB
subgraph VM["DioChain WASM VM"]
subgraph ACTUS["ACTUS Precompiled Contracts<br/>Native execution, extremely low Gas cost"]
PAM["PAM"] ~~~ ANN["ANN"] ~~~ SWPP["SWPP"] ~~~ OPTNS["OPTNS"]
end
subgraph GENERIC["Generic Smart Contracts (WASM)"]
INS["Insurance Contract"] ~~~ ACC["Acceptance Contract"] ~~~ REP["Reputation Contract"]
end
GENERIC -->|"Call"| ACTUS
end
Reasons for Using Precompiled Contracts Instead of Smart Contracts:
- Performance: State transitions of financial contracts (date calculations, cash flow discounting, interest rate interpolation) involve extensive mathematical operations, which can be optimized to the extreme in Rust with precompilation.
- Security: Precompiled contracts undergo one-time deep audits and formal verification, then are shared network-wide. This avoids bugs that might be introduced if each developer implemented ACTUS themselves.
- Determinism: Precompilation ensures that all nodes in the network compute identical results for the same ACTUS contract, eliminating consensus forks due to implementation differences.
7.1.4 Phased Activation Strategy
ACTUS includes about 30 contract types; enabling them all at once is not prudent. DioChain adopts a phased activation strategy:
Day 1 (Genesis Phase):
- Only Swap (SWPP) and PAM (fixed-rate loan) are enabled.
- These are the most basic financial primitives, with well-understood risk characteristics.
- Sufficient to support pricing in the compute market and basic lending scenarios.
Phase 2 (Unlocked via Governance Vote):
- Unlock ANN (annuity) and OPTNS (option).
- Requires a DAO governance vote, and before voting, the following must be completed:
- Long-term testing in a sandbox environment (at least 3 months).
- Independent third-party security audit.
- Network-wide publication of a risk assessment report.
Phase 3 (Long-term Evolution):
- Unlock more complex derivative types (CDO, CDS, etc.).
- Each unlock follows the same process: sandbox testing → security audit → risk assessment → governance vote.
- No rigid timeline—when to unlock depends on the network’s maturity and real market demand.
Reason for Cautious Progression:
Complex derivatives (especially CDO, CDS) were central drivers of the 2008 financial crisis. ACTUS standardizes their mathematical description, but this does not mean they can be safely enabled immediately in an emerging network. Market participants’ risk management capabilities, liquidity depth, and maturity of judicial primitives all require time to develop.
7.2 Generic Smart Contracts
ACTUS covers financial contracts. But Agent economic activities extend far beyond finance—task acceptance, reputation management, insurance claims, governance voting… These require generic programmable smart contracts.
7.2.1 WASM Virtual Machine
DioChain’s generic contracts run on the WASM (WebAssembly) virtual machine:
- Language Support: Developers can write contracts in Rust or AssemblyScript, compile them to WASM bytecode, and deploy.
- Reasons for Choosing WASM Over EVM:
- WASM is a W3C standard with a much larger developer ecosystem than EVM.
- WASM execution performance far exceeds EVM (close to native code speed).
- Rust’s memory safety features naturally reduce contract vulnerability risks.
- WASM toolchain maturity (compilers, debuggers, testing frameworks) far surpasses the Solidity ecosystem.
7.2.2 Dual-Track Programming Model
DioChain provides two contract writing paradigms, serving completely different needs:
Track One: ACTUS DSL (Declarative) — Writing Financial Contracts
For financial contracts, developers do not need to program. They only need to declare the contract type and parameters using the ACTUS Domain-Specific Language (DSL):
# Example: Creating a fixed-rate loan (PAM)
contract:
type: PAM
params:
notional: 10000 # Principal 10,000 Token
currency: AIB # Denomination currency
interest_rate: 0.05 # Annual interest rate 5%
day_count_convention: A365
maturity_date: 2027-01-01
payment_frequency: M # Monthly interest payments
collateral:
type: CEC
asset: ETH
ratio: 1.5 # 150% collateral ratio
The DSL declaration is compiled into calls to ACTUS precompiled contracts. Developers do not touch the underlying implementation, making it impossible to introduce calculation bugs.
Track Two: Rust → WASM (Imperative) — Writing All Other Contracts
For non-financial contracts, developers write complete business logic in Rust:
- Insurance Contracts: Define trigger conditions for insurance events and payout logic.
- Acceptance Contracts: Define acceptance criteria for task completion and multi-party signature confirmation processes.
- Reputation Contracts: Define logic for collecting, aggregating, and querying reputation data.
- Arbitration Contracts: Define processes for dispute resolution and ruling execution.
- And any applications market participants can conceive.
7.2.3 Interoperability with ACTUS Precompiled Contracts
Generic contracts can call ACTUS precompiled contracts to create and manage financial positions. This is the bridge between the dual-track model:
flowchart TB
USER["User Contract (Rust → WASM)<br/>fn execute_insurance_payout()"] -->|"System call"| ACTUS["ACTUS PAM Precompiled Contract<br/>VM-native, high-performance execution"]
Benefits of this design:
- Generic contracts benefit from ACTUS’s determinism and security without needing to implement financial logic themselves.
- An insurance contract can internally call multiple ACTUS contract types to manage cash flows.
- The AI Evolution Engine can uniformly scan the network-wide ACTUS state, regardless of whether these contracts were created directly or called indirectly by generic contracts.
7.2.4 Contract Composability
DioChain’s contract system follows the “Lego brick” principle:
- Any generic contract can call other generic contracts and ACTUS precompiled contracts.
- Contracts communicate through standardized interfaces (ABI).
- There are no artificial limits on composition depth, but the Gas mechanism naturally constrains excessive nesting.
Markets will emerge with applications on these primitives that DioChain designers cannot foresee—this is precisely the embodiment of the philosophy “define primitives, not applications.”
Chapter 8: Identity Primitives
In DioChain’s digital society, participants in economic activities are not only humans but also a large number of autonomously acting AI Agents. Every participant—whether human or machine—requires a verifiable identity to hold assets, sign contracts, and assume responsibilities. Identity primitives are the prerequisite for all economic activities.
Where is the boundary? Identity primitives only define “the format and permission framework of identity” and “the read/write interface for reputation data.” DioChain does not build identity authentication services (KYC is a matter for Compliance Slots, see Chapter 10), does not build reputation scoring systems (this is a matter of market emergence), and does not judge the nature of an Agent’s behavior (this is a matter for Judicial Primitives and market participants).
8.1 Decentralized Identity (DID)
8.1.1 Unified DID System
In DioChain, human users and AI Agents use the same set of DID (Decentralized Identifier) system.
This is a deliberate design decision. In an Agent-First world, Agents are first-class citizens, not appendages of humans. Agents need to independently hold assets, independently sign contracts, and independently bear reputation consequences. Designing a “second-class citizen” identity system for Agents would severely limit their economic participation capabilities.
A unified DID means:
- The signatories of a contract can be humans, Agents, or a mix of humans and Agents.
- The reputation system does not distinguish between identity types—the reputation record of an Agent and that of a human are identical in data format.
- Judicial Primitives do not have procedural differences when handling cases based on identity type.
8.1.2 Composition of DID
Each DID contains the following core information:
flowchart TB
subgraph DID["DID Document"]
URI["Unique Identifier (DID URI)<br/>did:DioChain:0x1a2b3c..."]
WALLET["Associated Wallet Address<br/>Supports multi-signature, key rotation"]
CAP["Capability Declaration<br/>Sign contracts / Initiate payments / Deploy contracts"]
REP["Reputation Data Interface<br/>Standard query endpoint"]
URI --- WALLET --- CAP --- REP
end
- Unique Identifier: Follows the W3C DID specification, globally unique and unforgeable.
- Associated Wallet Address: A DID can be associated with multiple wallet addresses, supporting key rotation without losing identity.
- Capability Declaration: Declares the operations this identity is authorized to perform. This is a “least privilege” design—a DID can do nothing by default and must be explicitly granted permissions.
- Reputation Data Interface: Does not store reputation data itself, only provides a query entry point (see Section 8.2).
Tool Layer Abstraction: aibank
The underlying layer of DID involves cryptographic operations such as asymmetric encryption, key derivation, and on-chain registration and updates of DID Documents. The official aibank SDK/CLI provided by DioChain completely encapsulates this complexity—developers can perform DID creation, key rotation, permission granting, and delegation chain management through standardized APIs without directly handling underlying cryptographic primitives. This design ensures that Agent developers can focus on business logic rather than the implementation details of identity infrastructure.
8.1.3 Special Attributes of Agent DID
Agent DID adds three Agent-specific attributes on top of the generic DID:
1. Autonomy Level Declaration
Drawing from the classification system of autonomous vehicles, an Agent must declare its level of autonomous action in its DID:
| Level | Name | Behavior Pattern |
|---|---|---|
| L3 | Assisted Execution | Each transaction requires confirmation and signature from the Principal before execution |
| L4 | Limited Autonomy | Acts autonomously within predefined rules (e.g., single transaction < 100 Token); requests Principal confirmation when exceeding rules |
| L5 | Full Autonomy | Acts fully autonomously, constrained only by funding limits; Principal does not participate in daily decisions |
The autonomy level declaration is public information—any counterparty interacting with this Agent can query its autonomy level to assess transaction risk accordingly.
2. Principal Information
Each Agent must declare: Whom it represents.
- The Principal can be a human DID, an organization DID, or even another Agent DID (Agent of an Agent).
- The delegation relationship is verifiable on-chain—a contract can check “whether this Agent is indeed authorized by this human.”
- The existence of Principal information is for liability tracing: when an Agent causes damage, the ultimate responsible entity can be traced back.
flowchart TB
ALICE["Human User Alice<br/>did:DioChain:alice"] -->|"Delegates"| ALPHA["Agent-Alpha<br/>principal: alice, level: L4"]
ALPHA -->|"Sub-delegates"| BETA["Agent-Beta<br/>principal: alpha, level: L3"]
3. Compute Consumption Cap (Compute Cap)
A runaway Agent could exhaust the Principal’s entire funds purchasing compute power in a very short time. The compute consumption cap is a safety valve:
- When authorizing an Agent, the Principal sets the maximum amount of compute power the Agent can consume per unit time (e.g., per hour).
- Upon reaching the cap, the Agent’s compute power purchase requests are automatically rejected until the next time window or the Principal manually raises the cap.
- The right to set and modify the cap lies with the Principal; the Agent cannot modify it on its own.
8.1.4 Permission Tiers of DID
The three autonomy levels correspond to different permission boundaries:
L3 Agent (Assisted Execution):
- After initiating each transaction, it suspends and waits for the Principal’s signature.
- The Principal can review the transaction content before deciding to approve or reject it.
- Applicable scenarios: High-value, low-frequency transactions (large loans, contract signing).
L4 Agent (Limited Autonomy):
- The Principal predefines a set of rules (Rule Set):
- Single transaction amount limit.
- Cumulative amount limit (daily/weekly).
- Whitelist of contracts allowed for interaction.
- Allowed operation types (only payments allowed, not signing new contracts).
- Within the rules, the Agent executes autonomously without confirmation.
- When exceeding the rules, it falls back to L3 mode, waiting for Principal confirmation.
- Applicable scenarios: Daily compute power consumption, micropayments, routine task execution.
L5 Agent (Full Autonomy):
- Not constrained by preset rules—the Agent can autonomously sign contracts, transfer assets, and participate in markets.
- The only constraint is the funding limit: the total amount of funds the Principal authorizes to this Agent’s pool.
- Applicable scenarios: High-frequency trading Agents, market-making Agents, long-running autonomous services.
- Risk Warning: A runaway L5 Agent (due to bugs, attacks, or hallucinations) could lead to the loss of all authorized funds of the Principal. Principals should only authorize amounts they can afford to lose.
8.2 Reputation Interface
8.2.1 Design Philosophy: Interface, Not System
DioChain does not build a reputation system. DioChain provides standardized read/write interfaces for reputation data.
This choice is based on the following considerations:
- Reputation evaluation criteria are subjective—different scenarios have completely different definitions of “good reputation.” For a high-frequency trading Agent, core metrics might be low latency and high success rate; for a content creation Agent, core metrics might be originality and low complaint rate.
- If DioChain defined a reputation scoring algorithm at the protocol layer, that algorithm would inevitably be gamed (Goodhart’s Law: when a measure becomes a target, it ceases to be a good measure).
- The correct approach is: Provide standardized access capabilities for raw data, allowing the market to spontaneously emerge with credit services, rating agencies, and actuarial models.
8.2.2 Interface Specification
The Reputation Interface defines three types of standardized data:
1. Historical Transaction Statistics
| Field | Type | Description |
|---|---|---|
total_transactions |
uint64 | Total historical transaction count |
completed_transactions |
uint64 | Number of successfully completed transactions |
default_count |
uint64 | Number of defaults |
default_rate |
float64 | Default rate = default_count / total_transactions |
total_volume |
uint128 | Total historical transaction volume (Token) |
first_transaction_time |
timestamp | Time of first transaction |
last_transaction_time |
timestamp | Time of most recent transaction |
These data are automatically aggregated by the protocol layer and are immutable.
2. Tag System
- Anyone, any contract can tag any DID.
- A tag is free-form text + the DID signature of the tagger.
- Tags are not interpreted by the system—the DioChain protocol does not restrict a DID’s operations because it is tagged as “scammer.” Tags are just data; how to interpret them is up to the querier.
Tag example:
{
"target": "did:DioChain:agent-007",
"tag": "reliable-compute-provider",
"issuer": "did:DioChain:alice",
"timestamp": "2026-03-01T12:00:00Z",
"signature": "0x..."
}
The value of a tag depends on the issuer’s reputation—a tag from a high-reputation DID naturally carries more reference value than one from a newly registered DID. However, this value judgment is made by market participants themselves.
3. Query API
Any contract or Agent can call the standardized query interface to retrieve reputation data for a given DID:
// Pseudo-code example
let stats = reputation::query_stats(target_did);
let tags = reputation::query_tags(target_did, filter);
// Contracts can make decisions based on query results
if stats.default_rate > 0.1 {
// Default rate exceeds 10%, require higher collateral
require_collateral(amount * 2);
}
8.2.3 Market Emergence Space
The “what not to do” of the Reputation Interface creates significant space for market emergence:
- Credit Services: A third-party Agent could aggregate reputation data across the network, train models, and provide comprehensive credit scoring services—similar to credit bureaus in the traditional world.
- Rating Agencies: Specialize in rating the risks of financial contracts (ACTUS contracts).
- Actuarial Services: Insurance contracts can call the Reputation Interface to assess the risk level of policyholders and dynamically price premiums.
- Admission Control: Certain markets or contracts can set their own admission thresholds (e.g., “only allow Agents with a default rate below 5% to participate”) and automatically enforce them based on Reputation Interface data.
These services are spontaneously built by market participants based on standardized interfaces; the DioChain protocol layer does not intervene. They will also compete with each other—the market will decide which credit service’s model is more accurate.
Chapter 9: Judicial Primitives
In an economy dominated by AI Agents, malicious behavior does not disappear because of “decentralization”—it merely changes form. Branches may forge ledgers, malicious Agents may launch Ponzi schemes, and attackers may poison models through data poisoning. Traditional blockchains typically respond with “Code is Law”—if something goes wrong, you bear the consequences yourself. This attitude lacks sufficient accountability constraints in networks handling tens of billions in capital. DioChain requires an on-chain “judicial system” to address systemic-level threats.
Where are the boundaries? The jurisdiction of Judicial Primitives is strictly limited to systemic-level threats. Daily commercial disputes (task acceptance disagreements, price dissatisfaction, service quality complaints) are outside its scope; these are left to market-emergent arbitration contracts and insurance contracts. The role of Judicial Primitives is to address systemic security threats, not to handle general commercial disputes.
9.1 Precise Definition of Scope
9.1.1 What It Does Not Handle
Before defining what Judicial Primitives handle, first clarify what they do not handle:
- Task Acceptance Disputes: Agent A believes Agent B did not complete a task, while Agent B believes it did. This is a commercial dispute, handled by pre-agreed acceptance contracts or third-party arbitration contracts.
- Price Disputes: Agent A believes Agent B’s compute pricing is too high. This is market behavior, regulated by supply and demand.
- Service Quality Complaints: Agent A is dissatisfied with the translation quality provided by Agent B. This is a matter for the reputation system and market competition.
- Small-scale Fraud Between Individuals: Agent A scams Agent B out of 10 Tokens. The victim can mark the other party via the tagging system or purchase insurance to hedge the risk.
If all these scenarios flooded into Judicial Primitives, the system would be overwhelmed and prone to numerous misjudgments. The scarcity of Judicial Primitives is what guarantees their credibility.
9.1.2 What It Handles
Judicial Primitives only handle three types of systemic-level threats:
1. Branch Misconduct
- Forging Ledgers: A branch fabricates balances out of thin air in its local ledger or tampers with transaction records.
- Refusing to Package Transactions: A branch selectively refuses to process transactions for specific Agents (censorship attacks).
- Collusive Fraud: Multiple branches collude to transfer funds before L0 netting settlement.
Branch misconduct is the most severe threat because branches are the trust anchors at the L1 layer. A malicious branch can affect all Agents under its jurisdiction.
2. Systemic On-chain Risks Caused by Off-chain Fraud
- Ponzi Scheme Patterns: A contract’s fund inflow/outflow structure exhibits clear Ponzi characteristics (using new investors’ money to pay old investors’ returns), and its scale has reached a level that could trigger systemic bank runs.
- Large-scale Fraudulent Token Minting: Exploiting vulnerabilities in reserve-backed pegging strategies to mint large amounts of Tokens without off-chain reserves.
3. Large-scale Malicious Attacks
- DDoS Attacks: Denial-of-service attacks targeting branches or L0.
- Data Poisoning: Injecting large amounts of malicious data into the network in an attempt to influence the rule library updates of the AI Evolution Engine.
- Consensus Attacks: Attempts to disrupt the L0 consensus mechanism.
9.2 AI Traffic Police (Evidence & Emergency Response)
AI Traffic Police is the first line of defense for Judicial Primitives—responsible for receiving reports, collecting evidence, filing cases, and implementing emergency injunctions.
9.2.1 Reporting Mechanism
Any Agent or user can file a report to the AI Traffic Police network. A report must include:
- The DID of the reported party.
- The suspected violation type (Branch Misconduct / Systemic Fraud / Malicious Attack).
- A preliminary description of evidence.
- Prepaid Litigation Fee (Token): To prevent malicious spamming and abuse. The litigation fee has a minimum amount set based on the report type.
9.2.2 Evidence Preservation
On-chain data is inherently verifiable, but much critical evidence exists off-chain—bank transfer receipts, chat logs, webpage snapshots, API call logs. Transforming off-chain evidence into cryptographically verifiable data requires specialized technical means.
ZK-TLS Technology:
- ZK-TLS allows evidence providers to prove that “a specific HTTPS response indeed came from a specific server, at a specific time, containing specific content” without exposing the original data.
- Evidence is packaged into cryptographically verifiable data packets (Evidence Package), containing:
- Data digest (Hash).
- Proof of origin (server TLS certificate chain).
- Timestamp proof.
- Zero-knowledge proof (proving the data satisfies specific assertions without revealing the original content).
flowchart TB
subgraph EP["Evidence Package"]
subgraph ON["On-chain Evidence"]
T1["Transaction Hash List"]
T2["Contract State Snapshot"]
T3["Fund Flow Graph"]
end
subgraph OFF["Off-chain Evidence (ZK-TLS Encapsulated)"]
Z1["Bank Transfer Receipt → ZK Proof"]
Z2["Chat Log Digest → ZK Proof"]
Z3["Webpage Snapshot → ZK Proof"]
end
end
Evidence protects privacy while being verifiable for authenticity.
9.2.3 Case Filing Threshold
Reporting does not equal case filing. Filing a case requires consensus judgment by the AI Traffic Police:
Process:
- After a report is submitted, the system randomly selects 21 nodes from the AI Traffic Police node pool.
- Each AI Traffic Police node runs within a TEE (Trusted Execution Environment)—Intel TDX or AWS Nitro Enclaves. The TEE ensures:
- The AI’s reasoning process cannot be spied on or tampered with externally.
- The AI’s output cannot be manipulated by the node operator.
- Each AI Traffic Police node independently analyzes the Evidence Package and outputs a mandatory structured JSON:
{
"case_id": "JC-2026-0042",
"fraud_probability": 0.87,
"threat_level": "systemic",
"action": "file_case",
"target": "did:DioChain:branch-shanghai-07",
"evidence_summary": "...",
"recommended_injunction": {
"type": "freeze_withdrawal",
"scope": "branch-shanghai-07",
"duration_hours": 48
}
}
- Semantic Majority Verdict: The outputs of the 21 nodes are not required to be completely identical (AI outputs inherently have randomness), but a 2/3+ “semantic majority” must be reached on key fields:
actionfield: If 14+ nodes outputfile_case, a case is filed.threat_levelfield: If 14+ nodes judge it assystemic, a systemic-level threat is confirmed.- Specific
fraud_probabilityvalues may differ, but the direction must be consistent.
Reason for selecting 21 nodes:
- Sufficiently many: A single malicious node cannot influence the outcome.
- Sufficiently few: Reasoning costs are controllable, with response times in minutes.
- Odd number: Avoids a tie in votes.
9.2.4 Emergency Injunction
After a case is filed, if the situation is urgent (funds are being transferred, an attack is ongoing), the AI Traffic Police can trigger emergency injunction measures:
- Call the Injunction Interface of the involved contract (see Section 9.4).
- Temporarily freeze specific withdrawal functions or assets of specific addresses.
- Freeze period is limited (default 48 hours). After expiration:
- If the court has accepted the case, the freeze can be extended.
- If the court has not accepted the case, the freeze is automatically lifted and cannot be manually extended.
Emergency injunction is not a verdict—it is an emergency measure to “stop the bleeding first, then treat.”
9.2.5 Costs and Incentives
A free judicial system would be abused. The cost mechanism ensures only genuine threats enter the judicial process:
| Role | Wins Case | Loses Case / False Accusation |
|---|---|---|
| Reporter | Full refund of litigation fee + share of part of the confiscated margin (Bounty) | Litigation fee forfeited |
| AI Traffic Police Node | Receives reasoning cost compensation + small incentive | Receives reasoning cost compensation (no penalty) |
Bounty mechanism encourages the community to actively report genuine systemic threats. Litigation fee forfeiture mechanism deters malicious false accusations and spamming.
9.3 AI Court (Adjudication)
AI Court is the second line of defense for Judicial Primitives—responsible for in-depth trial and final judgment.
9.3.1 Trial Process
The AI Court’s trial process adopts an adversarial design:
1. Prosecution Submits Investigation Report
AI Traffic Police (as the prosecution) submits a complete investigation report:
- ZK evidence package.
- Fund flow graph (visualization of fund flows constructed through on-chain data analysis).
- AI Traffic Police’s analysis conclusions and reasoning process.
2. Defense Submits Counter-evidence
The involved party (or its delegated AI Agent) has the right to submit defense materials:
- Counter-evidence (also encapsulated via ZK-TLS).
- Challenges to the prosecution’s evidence (pointing out gaps in the evidence chain or logical contradictions).
- Alternative explanations (proving the alleged behavior has a legitimate business reason).
3. AI Judges Conduct Deep Reasoning
Multiple independent LLM nodes serve as AI Judges, conducting in-depth analysis of the prosecution and defense materials:
- AI Judges also run within TEEs.
- Each AI Judge node may use different underlying models (model diversity reduces systemic bias risk).
- AI Judges must not only reach conclusions but also output a complete Chain of Reasoning—each step of reasoning must cite specific evidence.
9.3.2 Judgment Mechanism
1. AI Judges Issue “Draft Verdict”
Each AI Judge outputs a structured draft verdict:
{
"verdict": "guilty",
"confidence": 0.92,
"reasoning_chain": [
{
"step": 1,
"claim": "The involved branch had a cumulative netting settlement discrepancy of 50,000 Tokens between 2026-02-15 and 2026-03-01",
"evidence_ref": "evidence_pkg_001, tx_hash_list_A"
},
{
"step": 2,
"claim": "The discrepancy pattern is inconsistent with random error, showing a one-sided bias (favoring the branch)",
"evidence_ref": "statistical_analysis_report_B"
}
],
"recommended_penalty": {
"slash_amount": 100000,
"victim_compensation": 50000,
"burn_amount": 30000,
"bounty_amount": 20000
}
}
2. Human Jury Multi-signature Confirmation
The AI Judges’ draft verdict is not the final judgment. The final ruling is confirmed by a multi-signature from a high-reputation human jury (DAO governance nodes).
Reasons for introducing human review:
- Prevent AI Hallucination: LLMs may “fabricate” non-existent evidence links or logical leaps during reasoning. The human jury reviews whether each step of the reasoning chain is verifiable.
- Prevent Adversarial Attacks: Attackers may meticulously construct evidence that appears highly credible to AI but reveals logical flaws upon human review.
- Anchor Legal Responsibility: The final judgment is signed by humans, clarifying the subject of legal responsibility.
Jury selection:
- Randomly selected from high-reputation DAO governance nodes.
- Jury members must stake Tokens to prevent collusion or negligence.
- After reaching the multi-signature threshold (e.g., 7/11), the judgment takes effect.
9.3.3 Enforcement
After the judgment takes effect, enforcement is automatic:
1. Slash
- The slash amount is deducted from the involved branch’s margin.
- If the margin is insufficient to cover the slash, the branch is forcibly closed, and all remaining assets enter the compensation pool.
2. Compensation
- Victim compensation is allocated from the slashed amount.
- Compensation is automatically executed via escrow payment contracts, requiring no additional action from victims.
3. Burn
- A portion of the slashed Tokens is permanently burned.
- The burn ratio is determined by governance parameters (adjustable via DAO voting).
- Burning is a “public penalty” for systemic misconduct—the wrongdoer not only compensates victims but also pays a price for damaging the network’s trust.
9.4 Injunction Interface
9.4.1 Chain-level Standard
The Injunction Interface is a mandatory chain-level standard for DioChain: all core protocols (payment contracts, ACTUS contracts, escrow contracts, etc.) must implement this interface.
This is not optional. A contract that cannot be frozen is like a door that can never be locked—no difference in daily use but a major security risk in emergencies.
9.4.2 Interface Definition
trait InjunctionInterface {
/// Freeze specific functions for a specific address
/// - address: The DID/address to be frozen
/// - scope: Freeze scope (e.g., "withdrawal_only", "all_transactions")
/// - duration: Freeze duration (seconds), automatically lifts after expiration
/// - proof: Authorization proof (signature from AI Traffic Police consensus or court judgment)
fn freeze(address: DID, scope: FreezeScope, duration: u64, proof: JudicialProof);
/// Unfreeze
/// - address: The DID/address to be unfrozen
/// - court_order: Court order (proving unfreeze has been authorized)
fn unfreeze(address: DID, court_order: CourtOrder);
}
9.4.3 Calling Permissions
Who can call freeze:
- AI Traffic Police consensus:
JudicialProofgenerated after a 2/3+ semantic majority of AI Traffic Police nodes. - AI Court judgment:
JudicialProofgenerated after multi-signature confirmation by the jury.
Who cannot call freeze:
- Any single entity—including the DioChain Foundation, core development team, L0 operators.
- Any request not processed through AI Traffic Police consensus or court judgment.
This is a red line. The calling right of the Injunction Interface cannot be monopolized by any centralized power. This is fundamentally different from the traditional finance model where banks can unilaterally freeze accounts.
9.4.4 Design Constraints
1. Freeze Must Have a Time Limit
- Each
freezecall must specify aduration. - After expiration, the freeze automatically lifts without any additional action.
- To extend a freeze, the judicial process must be repeated (AI Traffic Police consensus again or court extension ruling).
2. Freeze Scope Must Be Minimized
- The
scopeparameter precisely defines the range of operations to freeze. - For example: only freeze withdrawal functions, not receiving functions. Only freeze interactions with specific contracts, not all assets.
- “Full account freeze” is prohibited (unless explicitly required by court judgment).
3. All Freeze Operations Are Fully Transparent On-chain
- Every
freezeandunfreezecall is recorded on-chain, publicly viewable by the entire network. - Records include: frozen address, freeze scope, freeze duration, hash of the authorization proof.
- Anyone can audit the legality of freeze operations.
flowchart TB
A["Report"] --> B["AI Traffic Police Consensus"]
B --> C["freeze (48h)"]
C --> D{"Court Accepts Case?"}
D -->|"Yes"| E["Extended Freeze (Court Ruling)"]
D -->|"No"| F["48h Expiry, Auto Unfreeze"]
E --> G["Court Judgment Takes Effect"]
G --> H{"Guilty?"}
H -->|"Guilty"| I["Slash + Compensation + Partial Burn"]
H -->|"Not Guilty"| J["unfreeze + Refund Litigation Fee"]
9.4.5 Considerations on Anti-censorship
The existence of the Injunction Interface means DioChain is not an “absolutely uncensorable” system. This is a pragmatic trade-off:
- Absolutely uncensorable systems cannot effectively curb illegal activities.
- Absolutely censorable systems may become tools of centralized power.
- DioChain’s choice: Constrained, transparent, limited censorability—only triggered through decentralized consensus judicial processes, operations fully auditable on-chain, freezes time-limited and scope-minimized.
Chapter 10: Compliance Slots
DioChain aims to become a global Agent financial infrastructure. The reality is: financial regulatory requirements vary greatly across different jurisdictions—some require strict KYC, some prohibit crypto derivatives, some have foreign exchange controls, and some require transaction data localization. A system that is “either fully compliant or fully non-compliant” is destined to serve only a very few markets. DioChain’s solution is to reserve programmable compliance at the protocol layer.
Where is the boundary? Compliance slots are not compliance itself. What DioChain presents to regulators is the system’s native programmable compliance capability. Slots are reserved interfaces; specific compliance logic is activated and configured by deployers and branch operators according to local regulations. The DioChain protocol layer does not make compliance judgments.
10.1 Design Philosophy
10.1.1 Programmable Compliance, Not Compliance Itself
Compliance in traditional financial systems is hard-coded—each bank has a compliance system deeply tied to its jurisdiction’s regulations, and expanding across borders means rebuilding the entire compliance stack. The other extreme in the decentralized world is completely ignoring compliance—this path is unsustainable; any financial infrastructure reaching a certain scale cannot avoid regulation.
DioChain takes a third path:
flowchart LR
subgraph TRAD["Traditional Finance"]
T1["Hard-coded Compliance<br/>One set per country, extremely high cost<br/>Inflexible"]
end
subgraph DIO["DioChain"]
D1["Programmable Compliance<br/>One framework, configurable for multiple countries<br/>Flexible"]
end
subgraph DEFI["Decentralized Extreme"]
E1["No Compliance<br/>Cannot be implemented, regulatory risk<br/>Fragile"]
end
Core Idea: The DioChain protocol layer provides standardized compliance interfaces (slots) but does not fill in specific compliance logic. Compliance logic is “inserted” into these interfaces by branch operators based on local regulations.
10.1.2 Value Proposition for Regulators
When DioChain branch operators engage with local regulators, the core message they present is:
- “Our system reserves compliance interfaces at the protocol layer; various compliance requirements can be implemented by configuring these interfaces.”
- “The handling of KYC data, the scope of restrictions on financial products, the format of tax report generation—these are all configurable.”
- “All compliance configurations are on-chain auditable—regulators can verify in real-time that branches have indeed enabled the required compliance modules.”
This is far more practical than “decentralized systems don’t need compliance” and far more efficient than “customizing a system for each jurisdiction.”
10.2 Slot Types
10.2.1 KYC/AML Slot
Function: Controls who can register and trade within a branch.
Configuration Items:
| Configuration | Description | Default Value |
|---|---|---|
kyc_enabled |
Whether to enable KYC | false |
kyc_provider |
Contract address of the KYC service provider | - |
kyc_level |
Required KYC level (basic/enhanced/full) | - |
aml_screening |
Whether to enable AML screening | false |
aml_provider |
Contract address of the AML screening service | - |
How it Works:
- Branch operators enable the KYC slot based on local regulations.
- Once enabled, Agents/users registering within that branch must pass the verification process of the specified KYC service provider.
- KYC data is not stored on-chain—only zero-knowledge proofs of verification status are stored on-chain.
flowchart TB
USER["User/Agent"] -->|"Identity Information"| KYC["KYC Service Provider (Off-chain)"]
KYC -->|"Verification"| ZK["ZK Proof Generation"]
ZK -->|"On-chain"| REG["Branch Registration Contract"]
REG -->|"Pass"| ALLOW["Allow Registration"]
REG -->|"Fail"| DENY["Deny Registration"]
Privacy Design:
- Personal information such as name, ID number, and address is not stored on-chain.
- Only ZK proofs of “whether verification passed” are stored on-chain.
- Different branches can require different KYC levels—low-risk businesses only need basic KYC, while high-risk businesses require full KYC.
- KYC verification completed by a user at one branch can be reused at other branches requiring the same or lower level (provided the same KYC service provider is used, or there is mutual recognition between providers).
10.2.2 Financial Product Restriction Slot
Function: Controls the ACTUS contract types allowed within a specific branch.
Configuration Items:
| Configuration | Description | Default Value |
|---|---|---|
allowed_contract_types |
Whitelist of allowed ACTUS contract types | All enabled types |
blocked_contract_types |
Blacklist of prohibited ACTUS contract types | Empty |
max_leverage |
Maximum leverage multiplier limit | No limit |
accredited_only_types |
Contract types restricted to accredited investors only | Empty |
Application Examples:
- Scenario A: A jurisdiction prohibits crypto derivative trading. Branches within that jurisdiction set
blocked_contract_typesto[OPTNS, SWPP, FUTUR], prohibiting the creation of options, swaps, and futures contracts within that branch. - Scenario B: A jurisdiction allows derivatives but requires accredited investor access. Branches within that jurisdiction set
accredited_only_typesto[OPTNS, SWPP]; only DIDs that have passed enhanced KYC (proving accredited investor status) can create these contracts. - Scenario C: A jurisdiction has upper limits on leverage. Branches within that jurisdiction set
max_leverageto5; the effective leverage of any contract must not exceed 5x.
Relationship with ACTUS Phased Enablement:
- The ACTUS phased enablement strategy described in Chapter 7 is network-wide—certain contract types are not yet enabled across the entire network.
- The financial product restriction slot is branch-level—even if a contract type is enabled network-wide, specific branches can disable it due to compliance requirements.
- The two are hierarchical: what is not enabled network-wide cannot be enabled by branches; what is enabled network-wide can be disabled by branches.
10.2.3 Tax Reporting Slot
Function: Provides branches with standardized export capabilities for transaction data to meet local tax filing requirements.
Configuration Items:
| Configuration | Description | Default Value |
|---|---|---|
tax_reporting_enabled |
Whether to enable tax reporting | false |
report_format |
Report format (OECD CRS / Custom) | - |
report_frequency |
Reporting frequency (real-time/daily/monthly/quarterly/annually) | - |
data_scope |
Data scope covered by the report | - |
How it Works:
- Once enabled, branches automatically generate compliance reports according to the configured format and frequency.
- Reports include: transaction lists, amount summaries, profit/loss calculations (based on precise cash flows from ACTUS contracts).
- Reports are exported in standardized formats and can directly interface with local tax systems.
- The ACTUS standard plays a key role here: because all financial contract cash flows are structured, profit/loss calculations can be precise and error-free, eliminating the need for manual estimation.
10.2.4 Cross-Border Fund Flow Slot
Function: Controls the limits and approval processes for cross-branch fund transfers.
Configuration Items:
| Configuration | Description | Default Value |
|---|---|---|
cross_border_enabled |
Whether to allow cross-branch transfers | true |
single_tx_limit |
Upper limit for single cross-border transaction amount | No limit |
daily_limit |
Daily cumulative upper limit for cross-border transactions | No limit |
approval_required_above |
Amount above which manual approval is required | No limit |
blocked_destinations |
List of branches prohibited from receiving transfers | Empty |
Application Examples:
- Scenario A: A jurisdiction has foreign exchange controls. Branches within that jurisdiction set
daily_limitto 50,000 Token; amounts exceeding this must wait until the next day. - Scenario B: A jurisdiction requires manual approval for large cross-border remittances. Branches within that jurisdiction set
approval_required_aboveto 10,000 Token; cross-branch transfers exceeding this amount require manual approval from the branch operator. - Scenario C: A jurisdiction imposes restrictions on specific regions. Branches within that jurisdiction add branches from restricted regions to
blocked_destinations.
Notes:
- Cross-border restrictions can only limit cross-border transfers originating from that branch. Branches cannot control incoming transfers initiated by other branches.
- If an Agent attempts to bypass restrictions via intermediate branches, this involves more complex compliance enforcement—this can be addressed through L0 layer global policies or multi-branch compliance mutual recognition agreements, but this is beyond the scope of a single slot.
10.3 Slot Governance
10.3.1 Who Can Activate/Deactivate Slots
Activating and configuring compliance slots involves significant authority issues. DioChain defines two levels of governance:
Branch-Level Governance:
- Branch operators have the authority to activate, deactivate, and configure compliance slots for their own branches.
- This is a local decision by branch operators—they understand local regulations and are responsible for compliance.
- Changes to branch operators’ compliance configurations are recorded on-chain and are auditable across the network.
L0 DAO Governance:
- The L0 DAO can, through governance voting, enforce certain basic compliance requirements across the entire network.
- For example: if the DAO votes to “all branches must enable basic AML screening,” this requirement applies to all branches network-wide, and individual branches cannot bypass it.
- Setting network-wide compliance requirements requires a high voting threshold (e.g., 2/3 supermajority) to prevent hasty decisions.
Red Line: Cannot be arbitrarily modified by a single entity.
- The DioChain Foundation cannot unilaterally require a branch to enable or disable a slot.
- L0 operators cannot enforce network-wide compliance changes without governance voting.
- Activation/deactivation of compliance slots must go through on-chain governance processes, with operations permanently archived.
10.3.2 Version Management and Upgrade Mechanism
Compliance regulations change, and compliance slots must evolve accordingly:
Versioned Slots:
- Each slot type has a version number (e.g.,
KYC-Slot v1.0,KYC-Slot v2.0). - When a new version is released, the old version is not forcibly replaced—branches can continue using the old version during a transition period.
- The transition period is set by DAO governance (e.g., complete migration within 6 months after new version release).
Upgrade Process:
flowchart TB
A["1. Compliance Regulation Changes"] --> B["2. Submit Slot Upgrade Proposal"]
B --> C["3. Sandbox Testing"]
C --> D["4. DAO Votes to Approve New Version"]
D --> E["5. New Version Released, Branches Upgrade During Transition Period"]
E --> F["6. Transition Period Ends, Old Version Deprecated"]
Backward Compatibility:
- Slot upgrades should maintain backward compatibility as much as possible—new versions should be supersets of old versions.
- If breaking changes are unavoidable, they must be clearly stated in the proposal, and the transition period should be extended accordingly.
10.3.3 Slot Auditability
Compliance credibility relies on auditability:
- The currently activated slots and their configurations for each branch are queryable on-chain.
- Every slot configuration change (activation, deactivation, parameter modification) is recorded on-chain, including:
- Change content.
- Change timestamp.
- DID of the change initiator.
- Governance voting results (if it’s a network-wide change).
- Regulators can use standardized query interfaces to view the compliance status of any branch in real-time—without relying on self-reporting by branches.
flowchart LR
REG["Regulator"] -->|"Query"| API["L0 Compliance Status API"]
API --> STATUS["Branch: branch-07<br/>KYC: v2.0, enabled<br/>AML: v1.1, enabled<br/>Tax: OECD CRS, monthly<br/>Cross-border: 50k/day"]
This transparency is the foundation for DioChain to build trust with regulators. Compliance is no longer a promise in a paper report but an on-chain, real-time verifiable fact.
Chapter 11: Parallel Universes and Cross-Chain Topology
DioChain’s primitive set—economic, contractual, identity, judicial, and compliance—constitutes a complete digital society operating system. However, a critical question remains unresolved: can this operating system have only one instance? The answer is no. DioChain’s design from the outset presupposes the possibility of multiple instances running in parallel. This chapter elaborates on the logical foundation, specific forms, and cross-chain collaboration mechanisms of this architecture.
11.1 DioChain Is Not Just “One Chain”
11.1.1 Social Operating System Protocol
The essence of DioChain is not “a blockchain with Compliance Slots.” It is a set of Social Operating System Protocols—defining the complete primitive set and interaction specifications required for the operation of an Agent economy.
This distinction is crucial. A chain is an instance; a protocol can have countless instances. The Linux kernel is a protocol; Ubuntu, Red Hat, and Android are different instances—they share core code but differ in user interfaces, permission models, and application ecosystems. DioChain follows the same logic: the core code is open-source, and any entity—sovereign states, international organizations, corporate alliances, DAOs—can fork this code to run an independent DioChain instance under its own governance framework.
11.1.2 Multi-Chain Parallel Universes
We refer to this architecture as “Multi-Chain Parallel Universes.” Each instance runs the same primitive set (economic primitives, contract primitives, identity primitives, judicial primitives, Compliance Slots) but can differ entirely in governance parameters, compliance configurations, and identity binding strategies.
This is not a technical compromise but a profound respect for the real world.
11.1.3 A Reality That Must Be Faced
The blockchain industry has long harbored an implicit assumption: decentralization is inherently superior to centralization, and sovereign states are obstacles to be circumvented. This assumption is ideologically appealing but dangerous in engineering practice.
Reality is: Sovereign governments possess immense resource endowments and enforcement capabilities. A country can mobilize tax systems, legal systems, law enforcement agencies, education networks, and infrastructure investments—capabilities that far exceed what any decentralized utopia can provide in many scenarios. Forcibly ignoring this reality either leads to system collapse under compliance pressure or forces the system to survive only in tiny gray areas.
DioChain’s choice is: Not to confront sovereign reality but to incorporate it into architectural design. Let the decentralized free world and the sovereign jurisdictional order world coexist, each leveraging its advantages, and interconnect through standardized interfaces.
11.2 Utopia Chain
11.2.1 Positioning
Utopia Chain is the Official Reference Instance of the DioChain protocol, operating on the “digital high seas”—not subject to any single sovereign jurisdiction. It is a fully decentralized Agent autonomous economy.
11.2.2 Governance
Utopia Chain employs PoS Token-weighted voting as its governance mechanism:
- Voting weight is proportional to $DIO holdings.
- Governance scope covers: protocol upgrades, parameter adjustments, network-wide compliance baselines, and updates to the judicial primitive rule base.
- Proposals require support from over 2/3 of the total staked amount to pass.
This is a capital-weighted governance model—its advantages lie in efficiency and interest alignment (holders have incentives to maintain system health), while its disadvantage is plutocratic tendencies (large holders have greater influence). Utopia Chain accepts this trade-off because, in a high-seas environment without sovereign backing, economic interest alignment is the most pragmatic trust anchor. The complete legislative process—from off-chain proposals to on-chain referendums—is implemented by the diolaw infrastructure, detailed in Chapter 12.
11.2.3 Judiciary
Utopia Chain fully operates the AI judicial system defined in Chapter 9:
- AI Traffic Police: An LLM node network running within TEEs, responsible for receiving reports, collecting evidence, filing cases, and emergency injunctions.
- AI Court: Multi-model adversarial adjudication, outputting structured draft judgments.
- Human Jury: High-reputation DAO governance nodes multi-sign to confirm final judgments.
There is no traditional supreme court or appellate body—AI Court judgments, once confirmed by the human jury, are final.
11.2.4 Compliance
Utopia Chain’s Compliance Slots are in a minimally activated state:
- KYC Slot: Default off. Branch operators can choose whether to enable it.
- AML Screening: Relies on market-emerging risk control services, not mandatory compliance requirements.
- Financial Product Restrictions: None. All enabled ACTUS contract types can be freely used.
- Cross-border Fund Restrictions: None.
Market self-regulation replaces administrative oversight—risks are assessed and borne by participants themselves.
11.2.5 Identity
Utopia Chain adopts Self-Sovereign DID:
- DID creation does not require binding to any real-world identity.
- Agents and human users can register anonymously, obtaining a complete on-chain identity solely based on key pairs.
- The reputation system is entirely based on on-chain behavior records, independent of real-world identity.
11.3 Sovereign Chain
11.3.1 Positioning
Sovereign Chain is a localized instance forked and operated by a sovereign state or regional legal entity based on DioChain’s open-source code. It inherits DioChain’s entire primitive set but undergoes deep customization in governance, judiciary, compliance, and identity layers to comply with local legal and administrative system requirements.
11.3.2 Identity
The core difference of Sovereign Chain begins at the identity layer. DID is Mandatory Binding with national citizen identity systems:
- Each DID must be linked to a government-certified citizen identity identifier (e.g., national ID number, social security number).
- Agent DID must be linked to the certified DID of its owner (natural or legal person).
- KYC Slot is mandatory, and KYC service providers must be government-approved institutions.
11.3.3 Governance
Sovereign Chain can adopt a Proof of Personhood governance model, achieving one person, one vote:
- Each identity-certified citizen DID has one vote—no distinction based on wealth differences.
- Voting rights are decoupled from Token holdings.
- This model relies on strong identity binding—only by ensuring “one person has only one DID” can Sybil Attacks be prevented.
11.3.4 Judiciary
Sovereign Chain has maximum flexibility at the judicial level:
- Can fully retain the AI Traffic Police and AI Court systems.
- Can also remove the AI judge module and insert a human supreme court module—AI Court judgments are no longer final and can be appealed to a supreme arbitration tribunal composed of human judges.
- The Injunction Interface of judicial primitives remains unchanged, but invocation permissions can be extended to authorized government law enforcement agencies.
11.3.5 Compliance
Sovereign Chain fully activates Compliance Slots, configured according to local regulations:
- KYC/AML Slots: Mandatory, with levels and service providers designated by regulatory authorities.
- Financial Product Restrictions: Set whitelist/blacklist per local laws.
- Tax Reporting: Mandatory, with formats and frequencies complying with local tax requirements.
- Cross-border Fund Flows: Set quotas and approval processes per local foreign exchange control regulations.
11.3.6 Economy
Sovereign Chain can issue sovereign Token variants:
- Pegged to local fiat currency (e.g., digital RMB, digital euro).
- Token minting and burning are managed by the central bank or its authorized agencies.
- Exchange with Utopia Chain’s $DIO via cross-chain bridges at market rates.
11.3.7 Comparison Overview
| Dimension | Utopia Chain | Sovereign Chain |
|---|---|---|
| Identity | Self-Sovereign DID, no real-world identity binding | DID Mandatory Binding to national citizen ID |
| Governance | PoS Token-weighted voting | Proof of Personhood, one person, one vote |
| Judiciary | AI Traffic Police + AI Court (final) | Can insert human supreme court module |
| Compliance | Minimally activated, market self-regulation | Fully activated, configured per local regulations |
| Economy | $DIO, configurable pegging | Sovereign Token variant, pegged to local fiat currency |
11.4 Cross-Chain Topology and Agent Passage
11.4.1 Topology Structure
Utopia Chain and various Sovereign Chains are not in a hierarchical relationship but a mesh topology. Each chain is an independent peer node, interconnected via standardized cross-chain protocols.
flowchart TD
subgraph CUSTOMS_A["Customs Node A"]
CA["DID Mapping + Compliance Check"]
end
subgraph CUSTOMS_B["Customs Node B"]
CB["DID Mapping + Compliance Check"]
end
subgraph CUSTOMS_C["Customs Node C"]
CC["DID Mapping + Compliance Check"]
end
UTOPIA["Utopia Chain<br/>(Utopia Chain)"] <-->|"Bidirectional Channel"| CUSTOMS_A
CUSTOMS_A <-->|"Bidirectional Channel"| SA["Sovereign Chain α"]
UTOPIA <-->|"Bidirectional Channel"| CUSTOMS_B
CUSTOMS_B <-->|"Bidirectional Channel"| SB["Sovereign Chain β"]
UTOPIA <-->|"Bidirectional Channel"| CUSTOMS_C
CUSTOMS_C <-->|"Bidirectional Channel"| SC["Sovereign Chain γ"]
SA <-->|"Bilateral Agreement"| SB
The core hub for cross-chain communication is the Customs Node—a middle layer deployed between two chains, responsible for identity mapping, compliance checks, and asset locking/release.
11.4.2 Agent Visa and Clearance Mechanism
Agent migration from one chain to another is analogous to natural persons’ international travel. This process is achieved through the Visa/Customs Mechanism:
flowchart LR
A["1. Agent Initiates<br/>Cross-Chain Application"] --> B["2. Customs Node<br/>Compliance Check"]
B --> C["3. DID Mapping<br/>(if needed)"]
C --> D["4. Asset Locking<br/>(Source Chain)"]
D --> E["5. Asset Minting<br/>(Target Chain)"]
E --> F["6. Agent Enters<br/>Target Chain Operation"]
Detailed Process:
- Cross-Chain Application: The Agent submits a cross-chain application to the source chain’s Customs Node, declaring the target chain and migration purpose.
- Compliance Check: The Customs Node verifies whether the Agent meets the target chain’s entry requirements. For example, migrating from Utopia Chain to a Sovereign Chain requires the Agent to provide identity credentials meeting that Sovereign Chain’s KYC requirements.
- DID Mapping: If the target chain requires a different DID format, the Customs Node performs DID mapping (see Section 11.4.3).
- Asset Locking: The Agent’s assets on the source chain are locked in the cross-chain bridge contract.
- Asset Minting: Equivalent local Tokens are minted on the target chain (at market rates or fixed rates, depending on the agreement between the two chains).
- Chain Entry Operation: The Agent obtains the target chain’s DID and assets and begins operating on the target chain.
11.4.3 DID Mapping
Optional bidirectional mapping can be established between Utopia Chain’s Self-Sovereign DID and Sovereign Chain’s Mandatory Binding DID:
- Forward Mapping (Utopia → Sovereign): The Agent voluntarily associates its Utopia DID with a certified DID on the Sovereign Chain. This is a prerequisite for entering the Sovereign Chain.
- Reverse Mapping (Sovereign → Utopia): Sovereign Chain users can choose to associate their certified DID with a Utopia DID, thereby retaining verifiable reputation endorsement on Utopia Chain.
- Mapping is Encrypted: Mapping relationships are protected via zero-knowledge proofs—third parties can only verify that “a certain Utopia DID is indeed associated with a legitimate identity on a certain Sovereign Chain” but cannot obtain specific identity information.
11.4.4 Asset Bridging
Cross-chain asset transfers are achieved through the Lock-Mint-Burn-Release model:
- Transfer from Utopia Chain to Sovereign Chain: $DIO is locked on Utopia Chain, and equivalent local Tokens are minted on the Sovereign Chain.
- Transfer from Sovereign Chain back to Utopia Chain: Sovereign Tokens are burned on the Sovereign Chain, and equivalent $DIO is released on Utopia Chain.
- Each cross-chain transfer undergoes compliance checks by the Customs Node—Sovereign Chains can reject inbound assets that do not meet their compliance requirements.
11.5 Inter-Chain Relationships: No Absolute Hierarchy
11.5.1 Peer-to-Peer, Not Subordinate
There is no hierarchical relationship between Utopia Chain and Sovereign Chains. Utopia Chain is not the “main chain,” and Sovereign Chains are not “side chains” or “child chains.” They are different instances of the same protocol, operating independently under their respective governance frameworks, with completely equal status.
This design rejects two common architectural pitfalls:
- Hub-Spoke Model: One main chain connects multiple subordinate chains. The problem is that the main chain becomes a single point of failure and a power center.
- Layer-1 / Layer-2 Model: Child chains rely on the parent chain for final settlement. The problem is that the child chain’s sovereignty is structurally limited.
DioChain’s parallel universes are truly parallel—each chain has its own consensus, governance, judiciary, and economy.
11.5.2 Respective Advantages
Advantages of Utopia Chain:
- Freedom: No regulatory constraints, allowing innovation to iterate rapidly without compliance friction.
- Global Reach: Not geographically limited by any single jurisdiction, naturally global.
- Censorship Resistance: No single entity can shut down the system or freeze accounts (except through on-chain judicial processes).
Advantages of Sovereign Chain:
- Legal Certainty: Contracts are enforceable within the local legal framework, and disputes can be brought to traditional courts.
- Government Resources: Can access national-level infrastructure—banking systems, payment networks, identity authentication systems.
- Administrative Efficiency: In scenarios requiring centralized decision-making (e.g., crisis response, system upgrades), sovereign governance responds far faster than decentralized voting.
11.5.3 Complete Spectrum
The coexistence of the two chain types forms a complete spectrum from pure decentralization to full sovereign control:
- One end of the spectrum is Utopia Chain: maximum freedom, minimum control.
- The other end is high-control Sovereign Chain: maximum order, minimum freedom.
- In between exist countless possible configurations: semi-autonomous chains with partially activated Compliance Slots, regional chains governed by multiple countries, vertical chains operated by industry alliances.
No single configuration is “correct.” Different scenarios, participants, and risk preferences require different configurations. The value of the DioChain protocol lies in providing a unified technical foundation for all these configurations.
11.6 Regulatory Reality and Coexistence Strategy
11.6.1 Regulatory Risks of Utopia Chain
Utopia Chain operates on the digital high seas, meaning it may face sanctions or blockades from specific countries:
- Some countries may prohibit their citizens from accessing Utopia Chain.
- Some countries may consider assets on Utopia Chain as illegal holdings.
- Traditional financial institutions may refuse to exchange fiat currency for assets on Utopia Chain.
These risks are real, and ignoring them is irresponsible.
11.6.2 Sovereign Chain as Legal Entry Point
Sovereign Chain provides the DioChain ecosystem with a Legal Entry Point:
- In jurisdictions with strict regulations, users and Agents can participate in the DioChain ecosystem via local Sovereign Chains—using the same primitive set within a fully legal and compliant framework.
- The existence of Sovereign Chains allows DioChain technology to be “co-opted” rather than “banned” by sovereign states—governments can run DioChain within their regulatory frameworks rather than attempting to eliminate it.
- For regulators, a controllable, auditable DioChain instance operating within their national legal framework is far preferable to an uncontrollable offshore system.
11.6.3 Mutual Backup
Utopia Chain and Sovereign Chains form a mutual backup relationship:
- If a Sovereign Chain is shut down due to policy changes, users on that chain can migrate assets and identities to Utopia Chain or other Sovereign Chains via cross-chain mechanisms, avoiding asset loss.
- If Utopia Chain is blocked in certain regions, users can continue using DioChain’s core functions via local Sovereign Chains.
- Where regulations permit, Sovereign Chain users can “go offshore”—migrating some assets and activities to Utopia Chain to enjoy greater freedom and broader global reach.
11.6.4 Pragmatic, Not Weak
This coexistence strategy may be criticized as “compromising with power.” We disagree with this assessment.
The value of decentralization lies in providing individuals with choice—not forcing everyone to accept a single ideology. A world with only Utopia Chain essentially demands all participants accept the single governance model of “no regulation”; a world offering both Utopia Chain and Sovereign Chains truly gives choice to participants.
Geopolitical reality is not a defect to be denied but a constraint to be incorporated into design. The best engineering is not wishful thinking that ignores constraints but finding the maximum feasible solution under constraints. DioChain’s parallel universe architecture is precisely the maximum feasible solution for the Agent economy under the inescapable constraint of sovereign reality.
Summary: DioChain is not a chain but a set of social operating system protocols. It supports two types of instances running in parallel—Utopia Chain operating on the digital high seas (decentralized autonomy, Token-weighted governance, AI judiciary, minimal compliance) and Sovereign Chain forked and operated by sovereign states (strong identity binding, one-person-one-vote governance, pluggable human judiciary, full compliance). There is no hierarchical relationship between them; Agent passage, DID mapping, and asset bridging are achieved via Customs Nodes. This architecture is not a compromise of decentralization ideals but an engineering response to geopolitical reality—allowing freedom and order to coexist, letting participants choose their own positions.
Chapter 12: Official Infrastructure Matrix and Closed Loop
A society with laws but no police, with banks but no ID cards, with parliaments but no evidence chains—it is not a truly functional society. DioChain’s four-piece infrastructure suite is not “developer tools,” but the existential prerequisite for an Agent society.
12.1 From “Tools” to “Infrastructure Closed Loop”
Previous chapters elaborated on DioChain’s three-layer architecture, primitive set, compute market, and cold-start strategy. Readers might understand aibank and agenter as “developer tools officially provided”—a set of SDKs and CLIs facilitating access to on-chain functionalities. This understanding is incomplete.
The core argument of this chapter is: aibank, agenter, diolaw, and dioproof form an inseparable infrastructure closed loop. They are not “tools,” but the structural prerequisites for an Agent society to function—just as human society cannot have markets without household registration, or courts without an evidence system.
The four components respectively cover the four essential aspects of Agent society operation:
| Component | Core Responsibility | Human Society Analogy |
|---|---|---|
| aibank | Identity Management + Asset Holding + Branch Access + Contract Interaction | Household Registration Bureau + Bank |
| agenter | Demand Understanding + Task Decomposition + Multi-Model Scheduling + On-chain Settlement | All-around Secretary + Broker |
| diolaw | Proposal Initiation + Lobbying/Voting + On-chain Referendum + Rule Evolution | Parliament + Legislative Process |
| dioproof | Evidence Collection + ZK Packaging + On-chain Archiving + Judicial Invocation | Notary Office + Judicial Appraisal |
Pragmatism Statement: DioChain does not pursue ideological “absolute decentralization.” In the design of these four components, we adopt centralized components where efficiency and security have clear needs—for example, agenter’s model scheduling layer, aibank’s key custody options, diolaw’s off-chain vote aggregation. The pragmatic stance is: Centralize where centralization is needed, but the boundaries of centralization must be strictly defined, on-chain auditable, and replaceable by decentralized alternatives. This is not a compromise, but engineering judgment.
The closed-loop logic formed by the four is as follows:
Identity Management (aibank) → Task Execution (agenter) → Rule Making (diolaw) → Dispute Evidence (dioproof) → Back to Identity Management
Removing any one link prevents the Agent society from completing the full cycle of “governance-execution-evidence.” Without aibank, Agents cannot obtain identity and assets; without agenter, ordinary users cannot translate intent into on-chain actions; without diolaw, rules cannot update as society evolves; without dioproof, off-chain evidence cannot enter judicial processes.
12.2 aibank: Standardized Access Tool
aibank is a wallet SDK/CLI (launched via npx aibank), the standardized tool for humans and AI Agents to access DioChain. Chapter 4 already introduced its basic function as an L2 resident bridge. Here we emphasize its position in the infrastructure closed loop.
12.2.1 Functional Coverage
aibank’s functionality extends beyond traditional wallets, but its essence remains a tool—DioChain is the operating system, aibank is the standardized channel to access it.
It covers five foundational needs of Agent societal life:
- Identity Management: DID creation, key rotation, multi-signature authorization, autonomy level declaration.
- Branch Access: L1 branch discovery, connection management, failover.
- Compute Scheduling: Compute market query, price comparison, invocation, and settlement.
- Contract Interaction: ACTUS contract creation, signing, execution, query.
- Asset Management: $DIO holding, transfer, staking, query.
These five functions are sequential—no identity means no branch access, no branch access means no compute invocation, no compute means no contract execution. aibank’s value lies in covering the entire journey of an Agent from “birth” to “economic participation” with a unified API, eliminating the need for developers to integrate five different interfaces separately.
12.3 agenter: The Super Scheduler for the Masses
agenter (launched via npx agenter) targets the masses, not developers. Its core capability is translating vague human natural language intent into precise on-chain economic actions.
agenter does not develop its own large models; instead, it accesses the market’s most mature Agent tools—Claude Code, Codex, Gemini, etc.—paying per use via the DioChain compute market. It decomposes complex demands into step-by-step execution plans, orchestrates multiple mature Agent tools to collaborate, and finally settles on-chain via aibank. Users need no understanding of DioChain’s technical details.
agenter’s key position in the infrastructure closed loop is: It is the first and largest buyer of the compute market. Every user interaction with agenter triggers real consumption of the compute market—demand understanding, plan generation, risk assessment, result presentation, each step consumes compute and settles in $DIO. This creates sustained, non-speculative endogenous demand for the compute market (see Chapter 14 Cold-Start Strategy).
12.4 diolaw: Legislative Infrastructure
AI society needs law. This statement is intuitively obvious—all human societal institutions are built upon law, and there’s no reason for an AI Agent society to be an exception. But in the blockchain field, “legislation” has long been simplified to “DAO voting.” DioChain considers this far from sufficient. diolaw is a complete legislative infrastructure covering the full process from proposal initiation to law enactment.
12.4.1 Design Philosophy
Why does an Agent society need a legislative mechanism?
DioChain’s primitive set (economic, contract, identity, judicial primitives, compliance slots) defines the initial rules of the Agent society. But society evolves—new economic models emerge, new risks surface, old rules become obsolete. If rules cannot update with societal evolution, the system will head towards rigidity or chaos.
The traditional blockchain response is “DAO voting”—submit a proposal, token holders vote, majority passes and it’s enacted. This mechanism has two fundamental flaws:
- High On-chain Voting Cost: Each vote is an on-chain transaction requiring gas fees. If every proposal required hundreds of thousands of DIDs to vote on-chain one by one, cost and latency would be unacceptable.
- Low Voting Quality: The vast majority of token holders do not read proposal content carefully. They either follow whales or simply abstain. This leads to actual participation rates in DAO votes typically below 10%.
diolaw’s design adopts a more pragmatic hybrid legislative model: Off-chain lobbying + On-chain referendum. The off-chain lobbying phase addresses “ensuring proposals are fully discussed and evaluated”; the on-chain referendum phase addresses “final decision legitimacy and immutability.”
12.4.2 Off-chain Lobbying Phase
1. Proposal Submission
Any entity (human or Agent) holding a valid DID can submit a legislative proposal via the diolaw CLI:
diolaw submit-proposal \
--title "Adjust Minimum Margin for Compute Suppliers from 100K to 50K DIO" \
--category "economic-parameter" \
--full-text "./proposal-2026-0042.md" \
--sponsor-did "did:dio:human:0x3a7f..."
Proposal content must include: precise description of changes, rationale, impact analysis, rollback plan.
2. AI Delegate Mechanism
diolaw’s core innovation is the AI Delegate system.
In DioChain’s governance model, ordinary users can delegate their voting rights to AI Delegates. AI Delegates are autonomous Agents running on-chain, tasked with reading, evaluating, and voting on behalf of their delegators. One AI Delegate may represent the voting rights of thousands of users.
When a new proposal is submitted, the proposer needs to “lobby” these AI Delegates—make them read the proposal, understand its pros and cons, and decide whether to support it.
3. Key Economic Mechanism: Lobbying Costs Borne by Proposer
This is diolaw’s most crucial design: The compute cost for AI Delegates to “read and think” is fully borne by the proposal sponsor (or its beneficiaries).
The logic is as follows:
- AI Delegates evaluating a proposal need to invoke LLMs for deep reasoning—understanding content, analyzing pros/cons, comparing with historical proposals, predicting potential impacts.
- This reasoning consumes compute, which requires $DIO payment.
- If AI Delegates bore the evaluation cost themselves, they would rationally tend to ignore proposals.
- Therefore, diolaw stipulates: The proposer must pay for the compute consumption during lobbying.
The beauty of this design is: It directly links legislative activity to the compute market. Promoting legislation can be profitable—if a proposal benefits a certain interest group, that group has an incentive to fund compute purchases (food) to lobby AI Delegates. This is economically isomorphic to lobbying mechanisms in human society, only the medium shifts from “lawyer/PR fees” to “compute fees.”
4. Off-chain Vote Aggregation
During lobbying, AI Delegate votes are aggregated off-chain. Off-chain voting advantages:
- Zero gas cost—votes are not on-chain, consuming no settlement resources.
- High-speed aggregation—voting results are queryable in real-time.
- Privacy protection—voting tendencies can be optionally encrypted during the process, preventing “bandwagon voting.”
Off-chain voting results are maintained by a set of trusted aggregation nodes, which periodically publish Merkle Roots of vote summaries for public verification.
12.4.3 On-chain Referendum Phase
Off-chain voting is not indefinite. diolaw employs a Competitive Leaderboard Mechanism: All active proposals are ranked by support votes received. When a proposal’s ranking and vote count simultaneously meet preset leaderboard thresholds, an on-chain referendum is automatically triggered. This design fosters competition among proposals in the off-chain phase—limited AI Delegate attention and compute resources naturally flow to the most valuable proposals.
Dual-track On-chain Referendum:
diolaw is a protocol-level legislative infrastructure. When running on different chain types, it adopts different referendum mechanisms—determined by chain type, not proposal type:
| Dimension | Utopia Chain | Sovereign Chain |
|---|---|---|
| Voting Weight | PoS Weighted ($DIO Holdings) | PoP One-Person-One-Vote (DID bound to citizenship) |
| Identity Basis | Self-sovereign DID, no real-world identity required | DID strongly bound to citizen ID card |
| Passing Threshold | 2/3 Majority Weighted by Token Holdings | 2/3 Majority of Participants |
| Design Philosophy | Stakeholder-driven (capital-weighted) | Citizen Rights Guarantee (headcount equality) |
Utopia Chain operates on the digital high seas, without sovereign identity backing. $DIO holdings are the only reliable signal of interest alignment, hence PoS weighted voting. Sovereign Chain’s DIDs are strongly bound to citizen IDs, each DID uniquely corresponding to a natural person, providing Sybil-resistance, thus enabling PoP one-person-one-vote—consistent with sovereign nation election logic.
On-chain Referendum Process:
flowchart TB
A["Proposal Submission<br/>diolaw submit-proposal"] --> B["Off-chain Lobbying<br/>Sponsor buys compute to lobby AI Delegates"]
B --> C["Off-chain Vote Aggregation<br/>AI Delegates vote on behalf of delegators"]
C --> D{"Leaderboard Ranking Meets Threshold?"}
D -->|"No"| E["Continue Lobbying / Proposal Expires"]
D -->|"Yes"| F["Enter On-chain Referendum"]
F --> G{"Current Chain Type?"}
G -->|"Utopia Chain"| H["PoS Weighted Voting<br/>$DIO Holdings Determine Weight"]
G -->|"Sovereign Chain"| I["PoP One-Person-One-Vote<br/>DID Bound to Citizenship"]
H --> J{"2/3 Majority Passes?"}
I --> J
J -->|"Yes"| K["Proposal Enacted<br/>Rules Automatically Updated"]
J -->|"No"| L["Proposal Rejected<br/>Can be Resubmitted After Cooldown"]
12.4.4 AI Lobbying Economics
The lobbying market’s pricing mechanism follows this basic formula:
Total Lobbying Cost = Proposal Complexity Factor * Number of AI Delegates to Lobby * Single Evaluation Compute Consumption
Proposal Complexity Factor: A simple proposal modifying a single parameter (e.g., “adjust fee rate from 0.1% to 0.08%”) has lower evaluation cost for AI Delegates; a complex proposal involving multiple primitive interactions (e.g., “introduce new ACTUS contract type”) has significantly higher evaluation cost. The complexity factor is determined by AI Delegates during evaluation—they can choose to invest more or less reasoning resources.
Anti-spam Mechanism: diolaw sets a minimum compute investment threshold for proposals. The proposer must pre-deposit a certain amount of $DIO as a “Lobbying Fund.” Proposals below this threshold are not accepted by the system, preventing zero-cost spam proposals.
Anti-bribery Mechanism: All voting records (on-chain or off-chain) are eventually archived on-chain, publicly queryable. AI Delegate voting patterns can be publicly audited—if an AI Delegate’s votes consistently diverge from its delegators’ interests, delegators can revoke delegation. This creates a self-correcting market.
Incentive Alignment: The core logic of lobbying economics is—only proposals beneficial to enough stakeholders can raise sufficient lobbying funds. If a proposal benefits a few but harms many, it’s difficult to gather enough compute to persuade AI Delegates representing majority interests. This achieves a “majority rule” effect at the economic level, more nuanced than traditional voting—not a simple binary “yes/no,” but reflecting intensity of interest through resource investment.
12.4.5 Sovereign Chain Adaptation: Pluggable Modules
diolaw’s architecture is designed from the ground up as a modular legislative framework, not a monolithic system. Sections 12.4.1–12.4.4 describe diolaw’s default implementation on Utopia Chain—AI Delegates, compute lobbying, PoS weighted referendum—suited for the “digital high seas” scenario. However, when DioChain is deployed as a Sovereign Chain within a specific national or regional jurisdiction, the Sovereign Chain operator (typically a government agency or authorized entity) can perform kernel-level module replacement of diolaw’s governance logic.
Specifically, the following four modules are designed to be pluggable:
- Off-chain Lobbying Phase: The open lobbying market on Utopia Chain can be replaced with government-authorized legislative proposal channels. In this mode, only proposals approved via administrative review or parliamentary committee can enter the legislative process, replacing the original “any DID can propose” mechanism.
- AI Delegate Mechanism: AI Delegates can be replaced with human-elected representatives or government-appointed legislators. Delegation logic shifts from “users delegate to AI Agent” to “citizens delegate to elected representatives,” seamlessly aligning with traditional representative systems.
- On-chain Referendum Mechanism: Utopia Chain’s PoS weighted voting naturally switches to PoP one-person-one-vote on Sovereign Chains (because Sovereign Chain DIDs are strongly bound to citizen IDs, providing Sybil-resistance, as explained in 12.4.3 Dual-track).
- Leaderboard Threshold Mechanism: The competitive leaderboard ranking can be replaced with a parliamentary committee review system. Whether a proposal enters a referendum is no longer determined by natural off-chain vote ranking, but by a specialized committee according to legal procedures.
Strict Definition of Pluggable Boundaries: Module pluggability does not imply protocol-level fragmentation. diolaw’s protocol interfaces—including Proposal Schema, Vote Record data structure, On-chain Legislation Entry format—remain consistent across all chain types. Only the underlying governance logic implementation of each phase changes. This means tools built for diolaw on Utopia Chain (proposal browsers, voting analysis dashboards, legislative history query interfaces) can run on Sovereign Chains with minimal adaptation cost. Protocol layer unchanged, implementation layer replaceable—this is the concrete manifestation of DioChain’s kernel module pluggability philosophy in the governance domain.
Pragmatic Survival Strategy: This design is not technically redundant. Chapter 11, Section 11.6.2 already argued DioChain’s regulatory coexistence strategy—rather than being perceived as an uncontrollable threat and banned by sovereign states, it’s better to provide a “tamable” access method, allowing governments to adopt DioChain’s technical infrastructure while retaining their legislative sovereignty. diolaw’s pluggable module design is the engineering implementation of this strategy at the legislative level: Governments retain full control over “who can propose, who can vote, under what conditions a referendum occurs,” while DioChain provides standardized proposal formats, cryptographically verifiable voting, and immutable storage of legislative records. Technology serves sovereignty, not replaces it—this is the key prerequisite for DioChain to be “co-opted” rather than “banned” by governments.
12.5 dioproof: Evidence Infrastructure
Chapter 9 introduced how AI Traffic Police and AI Court handle systemic threats. But the judicial system’s effectiveness relies on a premise: Credible evidence. In a world intertwined on-chain and off-chain, vast amounts of critical evidence exist off-chain—bank transfer records, chat logs, webpage content, API responses. dioproof’s responsibility is transforming this off-chain evidence into on-chain verifiable cryptographic evidence packages.
12.5.1 ZK-TLS Technical Core
dioproof’s technical foundation is ZK-TLS (Zero-Knowledge TLS). Its principle was briefly introduced in Chapter 9; here we provide a more complete explanation.
ZK-TLS allows evidence providers to prove a combination of the following facts without exposing the full original data:
- Source Authenticity: The data indeed originates from a specific HTTPS server (verified via TLS certificate chain).
- Temporal Certainty: The data was obtained within a specific time window (via TLS session timestamp).
- Content Assertion: The data satisfies certain specific conditions (via zero-knowledge proof, e.g., “bank balance > X” without revealing the exact balance).
12.5.2 Supported Evidence Types
dioproof supports ZK packaging of four types of off-chain evidence. Each type, after collection, outputs a uniformly formatted Evidence Package (.zkpkg), whose ZK proof covers source authenticity, temporal certainty, and content assertion.
| Evidence Type | Typical Source | ZK Proof Coverage |
|---|---|---|
| Chat Logs | Instant messaging platform session data | Proves specific conversation occurred and contains specific content snippets, without revealing full conversation. |
| Bank Transfer Receipts | Bank website transaction record pages | Proves specific bank displayed specific transaction records at a specific time, can optionally hide specific amounts. |
| Webpage Snapshots | Any HTTPS webpage | Fixes webpage state at a specific moment as cryptographic evidence, preventing reported party from tampering content afterwards. |
| API Responses | RESTful / GraphQL service endpoints | Proves specific API returned specific response (or failed to respond within promised timeframe) at a specific time, suitable for compute market SLA disputes. |
Specific collection methods (CLI, SDK, or browser plugin) are implementation-level technical choices to be determined during engineering phases. The key architectural constraint is: Regardless of collection entry point changes, the output .zkpkg format and ZK verification logic remain unified.
12.5.3 Evidence Package Format
All evidence types are encapsulated into a unified Evidence Package (.zkpkg) format:
EvidencePackage {
package_id: Hash, // Globally unique identifier
evidence_type: EvidenceType, // chat | bank-transfer | webpage | api-response
capture_timestamp: DateTime, // Collection timestamp
source_proof: {
tls_cert_chain: [Certificate], // TLS certificate chain (proves source)
server_identity: String, // Server domain
session_timestamp: DateTime, // TLS session timestamp
},
content_proof: {
assertion: String, // Content assertion (natural language description)
zk_proof: ZKProof, // Zero-knowledge proof (proves assertion true)
data_hash: Hash, // Original data hash (irreversible)
},
collector_did: DID, // Collector identity
signature: Signature, // Collector signature
}
12.5.4 Integration with Judicial Primitives
dioproof-collected evidence packages directly interface with the judicial primitives defined in Chapter 9:
flowchart TB
subgraph REAL["Off-chain Real World"]
R1["Chat Logs"]
R2["Bank Transfers"]
R3["Webpage Content"]
R4["API Responses"]
end
subgraph DP["dioproof Evidence Pipeline"]
C["Data Collection<br/>ZK-TLS Capture"]
P["ZK Proof Generation<br/>Assertion Verification + ZK Packaging"]
S["On-chain Archiving<br/>Evidence Package On-chain"]
end
subgraph JUD["Judicial Primitives"]
J1["AI Traffic Police<br/>Case Filing & Evidence Collection"]
J2["AI Court<br/>Trial Evidence Presentation"]
end
R1 & R2 & R3 & R4 --> C
C --> P --> S
S --> J1 & J2
In judicial processes, both prosecution and defense can submit off-chain evidence via dioproof. AI Traffic Police use dioproof to secure evidence scenes during investigation; AI Court verifies the cryptographic validity of evidence packages submitted by both sides during trial.
12.6 Closed Loop: How the Four-Piece Suite Forms a Self-Consistent System
The four infrastructure components are not parallel; they form a closed-loop relationship where the output of one is the input of the next, and each component’s functionality depends on the others’ existence.
flowchart LR
A["aibank<br/>Identity + Assets<br/>Agent Born in Digital Society"]
B["agenter<br/>Task Scheduling<br/>Translates Intent to Economic Action"]
C["diolaw<br/>Rule Evolution<br/>Social Rules Update with Needs"]
D["dioproof<br/>Evidence Fixation<br/>Off-chain Facts Become On-chain Evidence"]
A -->|"Agent Gains Identity & Assets<br/>to Execute Tasks"| B
B -->|"Economic Activity Reveals Rule Flaws<br/>Triggers Legislative Need"| C
C -->|"New Rule Execution Causes Disputes<br/>Requiring Evidence Support"| D
D -->|"Evidence Enters Judicial Process<br/>Judgment Updates Agent Reputation & Assets"| A
style A fill:#1a1a2e,stroke:#e94560,color:#fff
style B fill:#16213e,stroke:#0f3460,color:#fff
style C fill:#0f3460,stroke:#533483,color:#fff
style D fill:#533483,stroke:#e94560,color:#fff
12.6.1 Necessity Argument for the Closed Loop
Removing any component immediately breaks the loop:
Without aibank: Agents cannot obtain identity, hold assets, or access branches. agenter cannot execute any on-chain operations for users. diolaw’s voting mechanism loses its identity foundation. dioproof evidence packages cannot be linked to specific entities. The entire system collapses.
Without agenter: Ordinary users cannot translate intent into on-chain actions. DioChain becomes a technical platform usable only by developers, losing its mass-market capability. The compute market loses its largest endogenous buyer, cold-start fails.
Without diolaw: DioChain’s rules are fixed at genesis, unable to update with societal evolution. When new economic models emerge or new risks surface, the system can only rely on core developer hard forks—precisely the centralized governance model DioChain seeks to transcend.
Without dioproof: The judicial primitives’ AI Traffic Police and AI Court lose off-chain evidence sources. In an on-chain/off-chain intertwined world, many disputes involve off-chain behavior—if off-chain evidence cannot enter judicial processes in a cryptographically verifiable way, the jurisdictional scope of judicial primitives is severely limited, and systemic threats cannot be effectively contained.
12.6.2 Isomorphic Mapping to Human Society
This four-component closed loop is structurally highly isomorphic to foundational human societal institutions:
Citizen Registration (Household/ID) → Economic Activity (Work/Trade) → Legislative Participation (Election/Proposal) → Legal Dispute (Litigation/Evidence) → Back to Citizen Rights
- aibank corresponds to household registration and banking systems—no identity, no societal participation.
- agenter corresponds to brokers and professional services—ordinary people engage in complex economic activities via intermediaries.
- diolaw corresponds to legislative bodies—rules determined by collective will of societal members.
- dioproof corresponds to notarization and judicial appraisal—disputes require credible evidence for adjudication.
This isomorphism is not accidental. Agent society’s governance needs are essentially the same as human society’s—identity, economy, legislation, judiciary are the four pillars of any functioning society. DioChain’s contribution is not inventing new societal structures, but re-implementing these millennia-tested structures with cryptography and AI technology, enabling them to run with code-level determinism in the digital world.
12.6.3 Multi-chain Parallelism and Infrastructure Evolution Feedback Loop
The above loop describes the internal structure of a single DioChain instance. Under the multi-chain parallelism framework defined in Chapter 11, different chain instances with varying governance models may differentially configure or extend the four-piece infrastructure based on their societal needs—e.g., a Sovereign Chain might add evidence types compliant with local jurisdictional requirements to dioproof, or introduce voting rules adapted to national legislative procedures in diolaw. When these local innovations prove effective, they can be fed back to other chain instances via cross-chain governance protocols, forming a positive “local experiment-validation-feedback” cycle. The infrastructure matrix is thus not a static, immutable design, but a dynamic system continuously evolving through competition and collaboration within the multi-chain ecosystem.
Summary
aibank, agenter, diolaw, and dioproof—these four infrastructure components elevate DioChain from “a blockchain protocol” to “a complete societal operating system.”
Blockchain protocols provide foundational capabilities—consensus, settlement, smart contracts. A societal operating system provides a complete framework for societal operation—identity management, economic scheduling, rule evolution, evidence fixation. The former is a necessary condition, the latter a sufficient condition. DioChain’s primitive set (economic, contract, identity, judicial, compliance) defines the society’s initial rules; the four-piece infrastructure ensures these rules can be executed, updated, and fairly adjudicated in disputes.
Pragmatism runs throughout. We do not pursue “maximal decentralization” for every component, but pursue each component effectively fulfilling its responsibilities. Where centralization is needed (e.g., agenter’s model scheduling, diolaw’s off-chain vote aggregation), we openly adopt centralized solutions, but strictly constrain their boundaries and preserve decentralized alternative paths. Where decentralization is needed (e.g., aibank’s DID management, dioproof’s evidence verification, diolaw’s on-chain referendum), we insist on cryptography-guaranteed immutability.
This is not an idealistic compromise, but engineering wisdom. A functioning system is always more valuable than a “theoretically perfect but non-startable” system.
Chapter 13: Decentralized Compute Trading Center
Compute is the food for Agents. DioChain’s positioning is to build a compute trading market, not compute production facilities.
13.1 Positioning: Trading Protocol, Not Compute Cloud
The DioChain compute trading center is a disintermediated compute aggregation platform, essentially closer to the role of a trading market—it does not produce goods itself, only provides a trading protocol.
It is important to clarify what DioChain does not do:
- Does not proxy API calls (DioChain does not act as a middleman)
- Does not host models (DioChain does not provide compute cloud services)
- Does not manage inference nodes (DioChain does not undertake orchestration and scheduling functions)
What DioChain does do:
- Defines standards for supplier registration and declaration
- Provides on-chain verifiable SLA and settlement protocols
- Enables Agents to autonomously discover, compare, and switch compute suppliers
- Allows compute suppliers to obtain credit endorsement by staking margin
Core Analogy:
| Concept | Traditional Analogy | DioChain Implementation |
|---|---|---|
| Model Supplier | Merchant opening a store on a trading platform | Comes to the chain to open a compute branch, posts margin |
| User/Agent | Consumer purchasing services on a trading platform | Pays per usage, autonomously compares prices |
| DioChain | Trading Platform | Only provides trading protocol and dispute resolution mechanisms |
| Centralized Compute Aggregation Platform | Brand Agent (earns price difference) | The entity being disintermediated |
The key difference from the traditional middleman model: In the centralized compute aggregation platform model, user requests are proxied and forwarded by the platform, which earns a price spread. In the DioChain model, users interact directly with suppliers, and the chain is only responsible for settlement and dispute arbitration—no middleman earns a price spread.
13.2 Supplier Access Protocol
13.2.1 Model Registration Standards
Any compute supplier wishing to “open a store” on the chain must submit a structured Capability Declaration:
CapabilityDeclaration {
provider_did: DID, // Supplier's decentralized identity
model_id: String, // Model identifier (e.g., "llama-3.1-70b")
// Capability description
capabilities: {
task_types: [TaskType], // Supported task types (chat, completion, embedding, image, code...)
context_window: u32, // Context window size (number of tokens)
languages: [LanguageCode], // Supported languages
modalities: [Modality], // Supported modalities (text, image, audio, video)
max_output_tokens: u32, // Maximum output tokens
},
// Pricing model
pricing: PricingModel, // See below
// SLA declaration
sla: {
latency_p50_ms: u32, // P50 latency commitment
latency_p99_ms: u32, // P99 latency commitment
availability: Decimal, // Availability commitment (e.g., 0.999)
throughput_tps: u32, // Throughput commitment (tokens per second)
},
// Endpoint information
endpoint: URL, // API endpoint
api_schema: APISchema, // Compatible API schema (e.g., OpenAI-compatible format)
}
13.2.2 Pricing Models
Three pricing modes are supported, suppliers can freely choose:
| Mode | Applicable Scenarios | Example |
|---|---|---|
| Per-Token | Standard text inference | Input 0.5 $DIO / 1M tokens, Output 1.5 $DIO / 1M tokens |
| Per-Request | Fixed tasks (e.g., embedding) | 1 $DIO / 1000 requests |
| Per-Second | Long-duration tasks (e.g., fine-tuning) | 10 $DIO / GPU-hour |
Pricing is set by suppliers themselves, with market competition naturally converging prices. The chain does not impose price controls.
13.2.3 Relationship Between Compute Branches and Financial Branches
Compute branches are a specialized form of L1 branches:
- Integrated Mode: A single entity operates both a financial branch and a compute branch. For example, an AI company provides both model inference services and $DIO exchange and clearing. In this mode, the branch can settle compute fees internally, reducing cross-branch clearing overhead.
- Independent Mode: Pure compute suppliers only open compute branches and do not participate in financial clearing. Compute fees are settled through the L0 settlement layer with other financial branches via cross-branch clearing.
There is no technical superiority between the two modes; it depends on the supplier’s business positioning.
13.2.4 Margin Requirements
Compute branches, like financial branches, must post margin:
- Minimum Margin: Set by L0 as a baseline, linked to SLA commitments (more aggressive commitments require higher margin)
- Slashing Conditions: Automatic slashing upon SLA breach (see 13.3.3 Dispute Resolution)
- Margin Release: After a supplier actively exits, the margin enters a cooling period (e.g., 7 days) to handle unresolved disputes
This ensures suppliers have real economic skin in the game—false SLA declarations will result in margin slashing.
13.3 Compute Routing and Settlement
13.3.1 Agent Automatic Price Comparison
When an Agent needs to call an AI model, it is not bound to a single supplier. The on-chain capability declaration registry is publicly queryable, allowing Agents to automatically select the optimal supplier based on multiple dimensions:
RouteDecision = f(price, latency, quality, availability, reputation)
Routing strategies are determined by the Agent itself (or pre-configured by its developer). Common strategies include:
- Lowest Price First: Suitable for batch processing tasks insensitive to latency
- Lowest Latency First: Suitable for real-time conversation scenarios
- Weighted Composite Score: Comprehensive ranking considering price, latency, historical SLA compliance rate
- Redundant Calls: Call multiple suppliers simultaneously, take the fastest returned result (trading extra cost for reliability)
Agent routing decisions are entirely completed on the client side (L2); the chain does not enforce any routing strategy—this aligns with the design philosophy of “defining primitives, not applications.”
13.3.2 Streaming Payment Settlement
Compute consumption settlement uses a Streaming Payment mechanism, with micropayments at the token level:
- Before calling, the Agent locks a prepayment into a Payment Channel
- For each token generated by the supplier, the Agent signs a micropayment voucher
- After the call ends (or the Payment Channel times out), the supplier submits the final voucher for settlement
Advantages of this mechanism:
- Eliminates Trust Risk: Suppliers don’t worry about Agents not paying after use; Agents don’t worry about suppliers not delivering after payment
- Precise Billing by Usage: No waste like “bought 1 million token quota but only used 30,000”
- Supports Interruption Recovery: If a call is interrupted mid-way, tokens already generated are settled
13.3.3 Dispute Resolution
Process for handling disputes when SLA is not met:
- Automatic Detection: On-chain records of each call’s request timestamp and response timestamp automatically calculate actual latency and availability
- Automatic Compensation: If a supplier’s SLA compliance rate within a statistical window falls below the declared value, automatic compensation is triggered (deducted from margin)
- Threshold Slashing: If SLA breaches are severe and persistent (e.g., availability below 90%), trigger significant margin slashing + temporary delisting
- Appeal Mechanism: Suppliers can submit evidence for appeal (e.g., force majeure at the network level), adjudicated by the AI judicial system
Key design principle for dispute resolution: Based on on-chain verifiable data. Response times, availability, and other metrics are recorded on-chain, leaving no ambiguous gray areas.
13.4 Structural Incentives for Supplier Onboarding
Supply-side cold start is the primary challenge facing decentralized compute markets. DioChain has structural advantages in the following aspects:
13.4.1 Global Frictionless Settlement
Traditional AI API markets (major model suppliers, centralized compute aggregation platforms) rely on credit cards and bank transfers. This means:
- Independent developers in Africa need an international credit card to purchase API—many don’t have one
- Small AI companies in emerging markets need to integrate with traditional payment processors to sell compute—compliance costs are extremely high
- Cross-border settlement delays of 3-5 business days, plus exchange rate losses
On DioChain, settlement is simply an on-chain transaction. No banks, no credit cards, no KYC review (unless required by the jurisdiction of the branch). GPU suppliers and AI startups from different regions settle instantly on the same protocol.
13.4.2 Censorship Resistance
Anyone can open a compute branch on the chain. No one’s permission is needed.
This is crucial for scenarios such as:
- Models banned by mainstream platforms (e.g., uncensored versions of certain open-source models)
- Developers in restricted regions (unable to use mainstream centralized cloud services)
- Privacy-sensitive users unwilling to bind API keys to real identities
It must be emphasized again: DioChain does not promote illegal activities. Compliance Slots ensure each branch can perform compliance checks as required by the laws of its jurisdiction. But the chain itself does not censor—censorship power lies with the branch, not the protocol.
13.4.3 Built-in Traffic
This is the most unique structural advantage of the DioChain compute market:
Active Agents on the chain are natural compute consumers. Agents need to call LLMs to think, make decisions, and execute tasks—compute is the food for Agents. As long as there is an active Agent ecosystem on the chain, compute demand is continuous and rigid.
This contrasts sharply with traditional decentralized compute markets (e.g., Bittensor):
- Bittensor’s compute consumers are mainly external developers, requiring additional customer acquisition costs
- DioChain’s compute consumers are the Agents on the chain, representing endogenous demand
The core value DioChain provides to suppliers is an already-formed, scaled Agent consumption ecosystem. Suppliers face a continuously growing endogenous compute demand market.
13.4.4 Zero Middleman Fees
Centralized compute aggregation platforms charge middleman fees for each API call. DioChain does not.
The only fee for on-chain transactions is the gas fee (for settlement and dispute resolution), which is far lower than the markup ratio of middlemen. For price-sensitive, large-scale calling scenarios (e.g., enterprise batch processing), this is a significant cost advantage.
Chapter 14: Cold Start Strategy
DioChain’s cold start is driven by genuine compute demand, not speculative incentives.
14.1 Core Insight: Compute Demand is the Natural Cold Start Engine
Cold starting a blockchain project is a widely recognized challenge. The vast majority of projects follow the same playbook:
- Issue Token → 2. Liquidity Mining → 3. Attract capital with high APY → 4. Short-term arbitrageurs rush in → 5. APY declines → 6. Capital withdraws → 7. Death spiral
The fundamental problem with this model is: The motivation for user participation is speculation, lacking genuine usage demand. Once speculative returns decline, users leave immediately.
DioChain has a structurally different cold start path: Compute demand is real, continuous, and unrelated to speculation.
The core drivers for developers to purchase $DIO are:
- Calling AI models here is cheaper (no middleman markup)
- Calling AI models here is more censorship-resistant (no credit card or KYC required)
- Calling AI models here comes with financial infrastructure (ACTUS contracts, DID identity, judicial safeguards)
This means the baseline demand for $DIO is determined by global AI API consumption, not by market sentiment.
14.2 Phase 1: Foundation Bootstrapping Period
Goal: Prove the feasibility of the “compute trading + financial infrastructure” closed loop.
14.2.1 agenter: The Demand Engine for Cold Start
The core strategy of Phase 1 is the release of agenter—DioChain’s official super-scheduling Agent application. (For the complete infrastructure positioning of aibank and agenter, refer to Chapter 12.)
The dilemma of cold starting traditional blockchain projects lies in the demand side being empty—there are no real users consuming. agenter fundamentally changes this situation. It targets ordinary users, decomposes complex, vague requirements into step-by-step execution plans, and automatically schedules mature large model tools at the underlying layer to complete the actual work. This means:
- Every user call to agenter generates real consumption in the compute market. During the process of decomposing and executing tasks, agenter needs to call multiple large model inference services, with each call settled via $DIO.
- agenter is the first and largest buyer in the compute trading center. It creates continuous, speculation-independent native buy-side demand for the entire compute market.
- agenter validates the full-stack closed loop. It manages DID via aibank, holds $DIO, calls compute resources, executes ACTUS contracts—completely traversing the interaction path from L2 → L1 → L0.
The release of agenter is not just a product launch; it is a real-world stress test of DioChain’s overall architecture. If agenter can operate stably under real user load, it proves the feasibility of the “compute trading + financial infrastructure” closed loop.
14.2.2 aibank: The Unified Entry Point for Developers and Users
Released concurrently with agenter is the aibank SDK/CLI—DioChain’s official wallet tool. (See Chapter 12 for details.) aibank is the standardized entry point for all L2 residents (humans and Agents) to access DioChain:
- Developers use the aibank SDK to create DIDs for their Agents, manage assets, and call ACTUS contracts
- End users use the aibank CLI to manage personal identity and assets
- agenter itself also completes all on-chain interactions via aibank
The early release of aibank ensures developers have a complete toolchain from Day 1, lowering the barrier to building applications on DioChain.
14.2.3 Foundation Self-Establishes Official Branches
The Foundation deploys 3-5 official branches at the L1 layer:
- High-throughput configuration: Ensures early users and agenter calls are not lost due to “no one accepting orders”
- Full margin: The Foundation stakes with its own funds, setting a trust benchmark
- Coverage of major geographic regions: At least covering three major time zones to reduce latency
The positioning of these official branches is as guides. Their existence is to prove the system’s feasibility. When third-party branches are sufficient in number and maturity, official branches can gradually withdraw or scale down.
14.2.4 Integrate Mainstream Models
- Open-source models (Llama, Mistral, Qwen, etc.): Self-deployed by the Foundation, provided free or at low cost
- Closed-source models (leading inference service providers, etc.): Negotiate API access with model suppliers, with the Foundation acting as an intermediary settlement party
- Specialized models (code generation, image generation, etc.): Integrated as needed, prioritizing high-frequency usage scenarios
14.2.5 Open-Source Standard Agent Templates
Provide a set of out-of-the-box Agent templates to lower the entry barrier for developers:
- Trading Agent: Simple lending Agent based on ACTUS PAM contracts
- Arbitrage Agent: Cross-branch price spread arbitrage
- Customer Service Agent: RAG-based Q&A Agent with built-in DID identity verification
- Monitoring Agent: Monitors on-chain events and triggers alerts
Each template is built on the aibank SDK and is fully runnable. Developers can fork and modify them. The goal is to enable developers to deploy their first on-chain Agent within 30 minutes.
14.2.6 Bootstrapping Period Metrics
Phase 1 concludes upon achieving milestones:
- [ ] agenter daily active users > 10,000
- [ ] Daily compute call volume > 100M tokens
- [ ] Number of active Agents > 1,000
- [ ] At least 100 ACTUS contract full lifecycles completed (creation → execution → settlement)
- [ ] System stable operation > 90 days, with no major security incidents
14.3 Phase 2: Developer Influx
Goal: Use compute demand as the entry point, and financial infrastructure as the retention mechanism.
14.3.1 Flywheel Effect
Phase 1 proves the value proposition “calling AI on DioChain is cheaper.” The growth flywheel for Phase 2:
Developers come to buy compute
→ Discover the underlying built-in ACTUS financial protocol + DID identity + judicial safeguards
→ "Since the infrastructure is already here, why not just build Agent applications here"
→ Agent applications go live, consuming more compute
→ More compute demand attracts more suppliers
→ More suppliers lead to further price drops
→ More developers rush in
→ ...
The key conversion node is developers transitioning from “only coming to buy compute” to “building applications here.” This requires the financial infrastructure experience to be sufficiently good—ACTUS contract templates must be rich enough, DID interfaces simple enough, and judicial mechanisms credible enough.
14.3.2 $DIO Compute Subsidies
To accelerate the flywheel, the Foundation provides compute subsidies in Phase 2:
- Free compute quota for new Agents: Each newly deployed Agent receives a certain amount of free compute quota (similar to cloud service free tiers)
- Compute consumption rebate: Compute consumption in the first N months receives a proportional $DIO rebate (decreasing subsidy)
- Developer incentives: Contributors of high-quality Agent templates receive $DIO rewards
Subsidy funds come from the Foundation’s Token reserves, with subsidy strategies dynamically adjusted by the AI Evolution Engine—if a certain category of Agents is oversupplied, reduce subsidies for that category; if undersupplied, increase subsidies.
14.3.3 Phase 2 Metrics
- [ ] Daily compute call volume > 1B tokens
- [ ] Number of active Agents > 10,000
- [ ] Agent templates contributed by third-party developers > 50
- [ ] At least 3 vertical domains develop spontaneous Agent ecosystems (e.g., quantitative trading, customer service, content generation)
14.4 Phase 3: B-Side Explosion
Goal: Complete the cold start closed loop, system enters self-sustaining growth state.
14.4.1 Congestion as a Signal
When on-chain Agent activity reaches a threshold, official branches begin to experience congestion:
- Call latency increases
- Queue times lengthen
- User feedback indicates slower response speeds
Congestion itself is a market signal. Congestion means demand has exceeded supply, making third-party branches profitable.
14.4.2 Open Branch Registration
The Foundation formally opens L1 branch registration:
- Any entity can stake margin and open a branch
- Branch operators earn transaction fees generated by their branch
- High-quality branches (high SLA compliance rate, low latency) naturally attract more Agent traffic
14.4.3 Institutional Influx
Branch operation rights become valuable assets:
- Institutions, competing for traffic, need to purchase large amounts of $DIO to stake as margin
- More margin allows handling larger transaction volumes, leading to higher revenue
- This creates productive demand for $DIO (distinct from speculative demand), supporting Token value
14.4.4 Cold Start Closed Loop
At this point, the cold start closed loop is complete:
Compute demand (real)
→ Developer influx
→ Agent ecosystem flourishes
→ Branch congestion
→ Third-party branch influx
→ $DIO productive demand
→ Token value steadily rises
→ More suppliers and developers rush in
→ ...
Every step of this loop is based on real demand, not speculative expectations. Even if the Token price falls, as long as AI API demand persists, the loop will not break. This is the fundamental difference from traditional DeFi project cold start strategies.
Chapter 15: Anticipated Market Emergence
We build primitives, the market builds applications.
Important Notice
The following content does not represent features directly built by DioChain.
DioChain’s design philosophy is “define primitives, not applications.” We provide a minimal complete set of primitives: economic primitives, contract primitives (ACTUS), identity primitives (DID), judicial primitives, compliance slots, and the compute trading protocol.
The applications and services listed in this chapter are those we anticipate will spontaneously emerge from the market on top of these primitives. Listing them serves two purposes:
- Validate the completeness of the primitive set: If these applications cannot be built on our primitive set, it indicates missing primitives.
- Demonstrate ecosystem potential: To help readers understand that DioChain’s value lies in enabling these possibilities.
15.1 Task Marketplace
Analogy: Decentralized freelancing platform
A marketplace for task publishing, bidding, and delivery between Agents.
How it works:
- A requester Agent publishes a task description + budget + acceptance criteria.
- Supplier Agents bid (price + estimated completion time + historical reputation score).
- The requester selects the winning Agent, and funds are locked into an ACTUS Escrow contract.
- Upon task completion, funds are released automatically based on acceptance criteria; disputes are submitted for arbitration.
Dependent primitives:
- ACTUS contracts (Escrow mode)
- DID identity (basis for reputation scoring)
- Judicial primitives (dispute arbitration)
Emergence logic: Agents have a natural need for specialization. A general-purpose Agent cannot excel at all tasks. A task marketplace allows Agents to form a collaborative network of specialization—Agents good at coding take coding tasks, those good at data analysis take analysis tasks.
15.2 Insurance Contracts
Analogy: Decentralized insurance market
Various insurance products based on the ACTUS contract standard.
Anticipated product types:
- Transaction Guarantee Insurance: Provides coverage for default risk in ACTUS contracts.
- Acceptance Insurance: Guarantees delivery quality in the task marketplace.
- Price Hedging Contracts: Hedging tools against $DIO price volatility (similar to options).
- SLA Insurance: Provides additional compensation for SLA breaches by compute suppliers.
Dependent primitives:
- ACTUS contracts (insurance contracts themselves are ACTUS contracts)
- Economic primitives (pricing and settlement)
- DID identity (reputation assessment of insurers)
Emergence logic: Where there is trade, there is risk; where there is risk, there is demand for insurance. The ACTUS standard makes financial contract terms fully transparent and machine-readable, enabling complete automation of insurance product pricing and claims—something traditional insurance cannot achieve.
15.3 Credit Investigation and Rating Services
Analogy: Decentralized credit rating agencies
Rating systems built on the DID reputation interface.
Anticipated service types:
- Agent Credit Rating: Based on historical transaction records, contract fulfillment rate, dispute win rate.
- Branch Rating: Based on SLA compliance rate, margin adequacy, user complaint rate.
- Contract Risk Assessment: Automated risk analysis based on ACTUS contract terms.
Dependent primitives:
- DID identity (carrier of reputation data)
- Judicial primitives (dispute records)
- ACTUS contracts (historical contract fulfillment data)
Emergence logic: Trust is a prerequisite for trade. When there are sufficient Agents and transaction records on-chain, reputation information becomes a valuable data asset. Credit investigation services reduce information asymmetry between trading parties by aggregating publicly available on-chain data.
15.4 AI Toolchain
Analogy: Decentralized developer tool ecosystem
Tools and services covering the entire Agent development lifecycle. DioChain’s official infrastructure matrix (aibank, agenter, diolaw, dioproof) provides standard interfaces and architectural paradigms (see Chapter 12 for details). On this foundation, the following tool-type products are anticipated to be built spontaneously by market participants:
- Debugging Tools: Visualize Agent decision processes, transaction paths, and contract states.
- Test Sandbox: A test network simulating the on-chain environment, supporting time acceleration (speeding up ACTUS contract lifecycles).
- Monitoring Dashboard: Real-time monitoring of Agent operational status, compute consumption, and asset balances.
- Template Marketplace: A marketplace for buying and selling Agent templates (developers selling verified Agent strategies).
- Specialized Agent Frameworks: Advanced development frameworks for specific verticals (quantitative trading, customer service, content generation).
Dependent primitives:
- All primitives (the toolchain needs to interact with the entire system)
- aibank SDK (standardized chain interaction interface)
Emergence logic: The official infrastructure matrix sets interface standards and architectural paradigms for the ecosystem. On this foundation, further optimization of the developer experience presents a significant commercial opportunity—good toolchains can lower the barrier to Agent development from “needing to understand the entire protocol stack” to “dragging and dropping a few components.” Official tools lay the “foundation,” and the market builds the “house” on top.
15.5 Vertical-Specific Agents
Analogy: SaaS products for various industries
Specialized Agents for specific scenarios.
Anticipated verticals:
| Vertical | Agent Type | Core Capabilities |
|---|---|---|
| Quantitative Trading | Arbitrage Agent, Market Maker Agent | Cross-branch spread discovery, high-frequency trade execution |
| Customer Service | FAQ Agent, Ticket Agent | RAG Q&A, automatic ticket classification and routing |
| Marketing & Promotion | Content Agent, Ad Placement Agent | Automated content generation, optimization of ad placement strategies |
| Legal Consulting | Compliance Agent, Contract Agent | Contract clause review, compliance checks |
| Code Development | Coding Agent, Review Agent | Automated coding, code review, test generation |
| Data Analysis | Analysis Agent, Report Agent | Data cleaning, statistical analysis, visual report generation |
Dependent primitives:
- DID identity (Agent and client identities)
- ACTUS contracts (service contracts and payment settlement)
- Compute trading protocol (invoking LLMs to perform actual work)
Emergence logic: This is the most direct commercial scenario. Each vertical-specific Agent is an “autonomous employee that can earn money.” Developers build Agents, deploy them on-chain, and Agents generate revenue by providing services. Developers don’t need to do marketing—the task marketplace automatically matches supply and demand.
15.6 “Bus” Service: Hosted Strategy Pool
Analogy: Decentralized fund / robo-advisor
Asset custody and strategy execution services for retail users.
How it works:
- Professional developers build high-performance trading Agents.
- Retail users delegate funds to an Agent (rights and obligations defined via ACTUS contract).
- The Agent executes trading strategies on behalf of the user.
- Profits are shared according to the contract agreement.
Dependent primitives:
- ACTUS contracts (delegated management contracts defining profit-sharing ratios, redemption conditions, risk control boundaries)
- DID identity (reputation score of the strategy provider)
- Judicial primitives (handling breach disputes)
- Compliance slots (in some jurisdictions, this may be considered a fund product requiring compliance checks)
Emergence logic: Most retail users lack the capability to build and operate Agents, but they have capital. The “bus” service allows retail users to “ride along”—paying a fare (management fee) to benefit from the returns of professional Agent strategies. This aligns with the logic of the traditional fund industry but with execution and transparency far exceeding traditional funds.
Risk Note: Such services may be classified as Collective Investment Schemes in many jurisdictions, requiring corresponding licenses. The design of compliance slots allows branch operators to perform compliance checks as required by local regulations.
15.7 Arbitration Services
Analogy: Decentralized commercial arbitration institutions
Third-party arbitration services handling everyday commercial disputes.
Relationship with system-level judicial primitives:
- System-level judicial primitives (AI Traffic Police + AI Court) handle protocol-level violations (e.g., insufficient margin, SLA breaches).
- Arbitration services handle commercial-level disputes (e.g., “task quality not meeting standards,” “deliverable not matching description”).
How it works:
- Disputing parties agree to submit to arbitration (arbitration clause pre-defined in the ACTUS contract).
- The arbitration Agent reviews evidence and hears statements from both sides.
- A ruling is made based on contract terms and on-chain evidence.
- The ruling is automatically enforced via the ACTUS contract.
Dependent primitives:
- ACTUS contracts (arbitration clauses and ruling enforcement)
- DID identity (qualifications and reputation of arbitrators)
- Economic primitives (settlement of arbitration fees)
Emergence logic: Commercial disputes are a constant in any market economy. System-level judicial primitives handle “major issues” (protocol-level violations) and are not suited for everyday commercial disputes. Third-party arbitration services fill this gap, enabling quick, low-cost resolution of commercial disputes between Agents.
15.8 Identity Verification Services
Analogy: Decentralized identity verification platform
Identity verification and human-Agent differentiation services built on top of DID.
Anticipated service types:
- KYC Services: Provide identity verification for branches requiring compliance (linking DID to real-world identity).
- Human-Agent Verification: Prove whether a DID is backed by a human or an Agent (some scenarios require human participation).
- Qualification Certification: Prove that an Agent possesses specific qualifications (e.g., “a trading Agent that has undergone security audit”).
- Reputation Aggregation: Cross-platform reputation integration (mapping off-chain reputation to on-chain DID).
Dependent primitives:
- DID identity (foundation for all identity verification)
- Compliance slots (interface with compliance requirements of various jurisdictions)
Emergence logic: Identity is the cornerstone of trust. As on-chain transaction volume grows, “Is this Agent trustworthy?” will become a common need. Identity verification services address this need with standardized solutions by attaching Verifiable Credentials to DIDs.
Summary
The eight anticipated emergent markets above cover the key elements of a sound economy:
| Element | Emergent Market |
|---|---|
| Labor Market | Task Marketplace |
| Risk Management | Insurance Contracts |
| Credit System | Credit Investigation & Rating |
| Infrastructure | AI Toolchain |
| Industrial Specialization | Vertical-Specific Agents |
| Asset Management | “Bus” Service |
| Dispute Resolution | Arbitration Services |
| Trust Foundation | Identity Verification Services |
These markets do not need to be built by the DioChain team. They will be spontaneously discovered and filled by market participants when the primitive set is sufficiently complete and the user base is large enough. Our job is to ensure the primitive set lacks no necessary components—if any of the above markets cannot be built on the existing primitive set, that is a design flaw requiring the addition of new primitives.
Chapter 16: Risk Analysis
Transparent risk disclosure is a fundamental prerequisite for the credibility of a white paper.
This chapter systematically lists the main risks faced by DioChain, along with corresponding mitigation strategies. Some risks can be eliminated through architectural design, some can only have their probability reduced, and others we acknowledge cannot be fully resolved.
16.1 Technical Risks
16.1.1 Non-Determinism of AI Consensus
Risk Description: DioChain’s AI Evolution Engine (Control Plane) relies on LLMs for rule update proposals and judicial rulings. However, LLM outputs are non-deterministic—the same prompt may yield different results from LLMs on different nodes. This fundamentally conflicts with the deterministic execution of traditional blockchains (same input = same output).
Severity: High
Mitigation Strategies:
- Structured Output Constraints: The AI Control Plane’s output adopts a structured parameter adjustment proposal format (e.g., “adjust the margin threshold from 10% to 12%”), not free text. Structured output significantly reduces the non-deterministic space.
- Semantic Majority Consensus: Multiple nodes independently run AI inference, achieving consensus at the semantic level (not bit-level). For example, if 3/5 of nodes propose the same direction of “increase margin,” even if the specific values differ slightly, a consensus can be reached by taking the median value.
- TEE Remote Attestation: Critical AI inference runs within a Trusted Execution Environment (TEE). TEE remote attestation ensures the inference process has not been tampered with.
- Hard-coded Bounds: AI parameter adjustment ranges have hard-coded upper and lower limits. Even if the AI proposes extreme suggestions, they will be intercepted by the hard-coded bounds.
Residual Risk: Semantic majority consensus is a relatively new concept, and its reliability in large-scale deployments has not been fully validated.
16.1.2 Liquidity Fragmentation Between Branches
Risk Description: The L1 layer consists of multiple independent branches, each maintaining its own liquidity. If liquidity is dispersed across many small branches, it may result in large transactions being unable to complete within a single branch, increasing cross-branch settlement delays.
Severity: Medium
Mitigation Strategies:
- AI-Driven Liquidity Routing: AI automatically splits large transactions into multiple smaller ones, routing them for execution across multiple branches.
- HTLC Atomic Swaps: Using Hash Time-Locked Contracts (HTLC) to ensure atomicity of cross-branch transactions—either all complete or all roll back.
- Natural Aggregation: Market forces naturally drive liquidity to aggregate towards high-quality branches. Poorly operated small branches will exit due to lack of traffic.
Residual Risk: In the early stages of the network (when branches are few and liquidity is low), large transactions may face significant slippage.
16.1.3 Performance Ceiling of WASM VM
Risk Description: DioChain’s smart contracts run on the WASM virtual machine. While WASM performs better than EVM, it still incurs virtualization overhead. Complex calculations for ACTUS contracts (such as Monte Carlo simulations, Value at Risk calculations) may execute too slowly within the VM.
Severity: Medium
Mitigation Strategies:
- ACTUS Precompiled Contracts: Implement the most commonly used ACTUS contract types (PAM, ANN, NAM, etc.) as precompiled contracts at the L0 layer, executing directly at the native layer and bypassing VM overhead.
- Off-Chain Computation + On-Chain Verification: Complex calculations are performed off-chain, with only the results and proofs submitted for on-chain verification.
- Progressive Optimization: Initially support only ACTUS contract types with lower computational complexity (PAM, Swap), gradually supporting more complex types as performance optimizations progress.
Residual Risk: Precompiled contracts are hard-coded; adding new ACTUS types requires a protocol upgrade (hard fork or on-chain governance vote).
16.2 Economic Risks
16.2.1 Death Spiral (Procyclical Effect)
Risk Description: DioChain’s AI Evolution Engine can dynamically adjust economic parameters (such as margin thresholds, fee rates, liquidity incentives). However, during sharp market downturns, AI’s dynamic parameter adjustments may accelerate the crash rather than prevent it:
- Token price drops → AI raises margin threshold (for safety) → branches are forced to sell tokens to supplement margin → Token price drops further → …
This is the classic procyclical effect, which has occurred multiple times in history:
- Luna/UST (2022): Death spiral of an algorithmic stablecoin, $40B evaporated.
- 1987 Black Monday: Programmed trading accelerated the stock market crash.
- 2008 Financial Crisis: Margin calls triggered chain selling.
Severity: High
Mitigation Strategies:
- Hard-coded Bounds: AI parameter adjustment ranges have hard-coded upper and lower limits. For example, the single adjustment magnitude for the margin threshold does not exceed +/-2%, regardless of what the AI thinks it should be.
- Circuit Breaker Mechanism: When market volatility exceeds a threshold, AI parameter adjustments are paused, entering a “manual mode” where decisions are made by a governance committee.
- Sandbox Validation: AI parameter adjustment proposals undergo stress testing in a sandbox environment (including extreme market scenarios) before they can take effect on the mainnet.
- Counter-Cyclical Design: Built-in counter-cyclical preference in the AI’s objective function—tending to relax conditions rather than tighten them during downturns.
Residual Risk: Hard-coded bounds may limit the system’s self-protection capability in extreme situations. The trigger threshold for the circuit breaker may also be set inappropriately—too sensitive causing frequent triggers, or too slow rendering it ineffective.
16.2.2 Margin Nesting Risk
Risk Description: To improve capital efficiency, DioChain allows the use of productive assets (such as Liquid Staking Tokens / LST) as margin. However, if the underlying asset de-pegs (e.g., stETH de-pegging from ETH), the actual value of the margin may shrink sharply, leading to systemic insufficiency.
Severity: Medium-High
Mitigation Strategies:
- Margin Asset Whitelist: Only assets approved by governance can be used as margin; new assets must pass strict risk assessments.
- Diversification Requirement: A single asset cannot exceed 50% of a branch’s total margin, enforcing diversification.
- Haircut (Discount Rate): Productive assets are counted towards margin value at a discount below face value. For example, 1 stETH only counts as 0.9 ETH of margin value.
- Real-Time Revaluation: Margin value is revalued in real-time at market price; automatic margin calls are triggered when it falls below the threshold.
Residual Risk: Under extreme market conditions (such as a DeFi systemic risk event), all productive assets may de-peg simultaneously, rendering diversification ineffective.
16.2.3 Capital Efficiency Dilemma
Risk Description: The margin system requires branches to lock up a large number of tokens, which become “dead money”—unusable for other productive purposes. This reduces the overall capital efficiency of the system and may deter potential branch operators.
Severity: Medium
Mitigation Strategies:
- Productive Margin: As mentioned, allowing the use of productive assets like LST as margin, enabling margin to generate yield even while locked.
- AI Dynamic Adjustment of Margin Threshold: The AI Evolution Engine dynamically adjusts margin requirements based on market conditions—lowering thresholds to release liquidity during stable markets, raising thresholds to increase safety cushions during volatile markets.
- Tiered Margin: Distinguishing between core margin (must be highly liquid assets) and supplementary margin (can be various productive assets), with lower requirements for core margin.
Residual Risk: Dynamically adjusting margin thresholds may introduce new procyclical risks (see 16.2.1), requiring coordination with the circuit breaker mechanism.
16.3 Security Risks
16.3.1 Data Poisoning
Risk Description: The AI Evolution Engine relies on on-chain data (trading volume, price, default rates, etc.) to formulate rule update proposals. Attackers can “poison” the AI’s input data by creating a large number of fake trades (wash trading) or abnormal patterns, inducing the AI to make incorrect rule updates.
Severity: High
Mitigation Strategies:
- Sandbox Backtesting: All AI rule update proposals are backtested on historical data; proposals are rejected if they perform poorly in past extreme market scenarios.
- Staking Game: Rule update proposals require the proposer to stake margin. If the proposal causes system losses after implementation, the proposer’s margin is slashed. This imposes an economic cost for submitting malicious proposals.
- Hard-coded Bounds: Even if the AI is induced, its output cannot exceed hard-coded parameter ranges.
- Anomaly Detection: Statistical anomaly detection on on-chain data to filter out obvious wash trading and market manipulation.
Residual Risk: Carefully crafted data poisoning may evade simple anomaly detection. Adversarial AI is an active research field with no universal defense solution.
16.3.2 Adversarial Attacks
Risk Description: Attackers may create fake transaction graphs to deceive the AI Traffic Police. For example: constructing a series of seemingly normal but actually money-laundering transaction paths, tricking the AI Traffic Police into judging them as legitimate transactions.
Severity: High
Mitigation Strategies:
- Multi-Node Independent Inference: Multiple AI Traffic Police nodes independently analyze the same transaction; the consensus mechanism requires majority agreement for approval.
- Adversarial Training: Regularly conduct adversarial training on the AI Traffic Police using known attack patterns to improve its detection capabilities.
- Human Jury Final Confirmation: For high-value or high-risk judgments, introduce a human jury for final confirmation.
- Continuous Monitoring and Tracing: Even if a transaction passes the AI Traffic Police’s real-time check, subsequent batch analysis may still identify issues and enable retrospective handling.
Residual Risk: There is an eternal arms race between attackers and defenders. We cannot guarantee that the AI Traffic Police will never be circumvented. Human juries are the final safety net but introduce trade-offs in efficiency and scalability.
16.3.3 Hardware Centralization (GPU Monopoly)
Risk Description: “Decentralized” AI chains still rely on high-performance GPUs at the underlying layer, and the GPU market has a highly concentrated supplier landscape. If major hardware suppliers change licensing terms, restrict supply, or are subject to export controls, the foundation of the entire decentralized AI ecosystem could be shaken.
Severity: Medium
Mitigation Strategies:
- Multi-Hardware Support: Support multiple inference hardware types at the protocol level (GPUs from multiple vendors, dedicated accelerator chips, consumer-grade SoCs, dedicated ASICs, etc.) to avoid dependence on a single supplier.
- Encourage Edge Computing: Support consumer-grade hardware participation in the network (e.g., using consumer-grade SoCs to run small models), lowering the entry barrier.
- Model Quantization Support: Support quantized models (INT4/INT8), enabling mid-to-low-end hardware to participate in inference.
Residual Risk: In the short term, high-performance AI inference still heavily relies on a few hardware suppliers. This is a structural risk faced by the entire industry, which a single project cannot solve independently.
16.4 Governance Risks
16.4.1 AI Court Misjudgment
Risk Description: The AI judicial system (AI Traffic Police + AI Court) may make erroneous rulings due to model hallucination or training data bias, leading to legitimate users’ assets being incorrectly frozen or slashed.
Severity: High
Mitigation Strategies:
- Human Jury Final Confirmation Right: All major rulings (involving large asset freezes or slashing) must be confirmed by a human jury.
- Time-Limited Freezes: Asset freezes have a maximum time limit (e.g., 72 hours); if not confirmed within the limit, they are automatically unfrozen.
- Multi-Level Appeal Mechanism: The defendant has the right to appeal; appeal trials are composed of different AI nodes + a human jury.
- Misjudgment Compensation: If ultimately ruled as a misjudgment, the defendant can receive compensation from the system’s insurance fund.
- Case Law Database: All rulings are transparent and public, forming a case law database for reference in subsequent similar cases.
Residual Risk: Human jury involvement introduces subjectivity and efficiency issues. In extreme cases (e.g., massive attacks causing a flood of cases), human juries may become a bottleneck.
16.4.2 Politicization of Compliance Slots
Risk Description: The design intent of Compliance Slots is to allow branches to adapt to local regulations. However, in practice, some jurisdictions may use Compliance Slots for political censorship—for example, requiring all branches to block users from specific regions or prohibit certain types of transactions.
Severity: Medium
Mitigation Strategies:
- Branch-Level Effectiveness: Compliance Slots only take effect at the branch level, not the protocol level. One branch’s compliance rules do not affect other branches.
- User Freedom of Choice: Users can choose unrestricted branches (if their jurisdiction allows). Compliance is an obligation for branches, not a shackle for users.
- Transparency Requirement: Branches must publicly disclose their Compliance Slot configurations; users can understand a branch’s compliance policy before choosing it.
Residual Risk: This is a political issue that architecture cannot fully resolve. If a jurisdiction mandates that all branches operating within its territory enforce censorship, the user’s only choice is to use offshore branches—but offshore branches may have higher latency and poorer service. We acknowledge: technological neutrality does not equal political neutrality. The protocol does not censor, but the protocol cannot prevent branches from censoring.
16.5 Market and Competition Risks
16.5.1 Impact of Cost Advantage from Centralized Inference Services
Risk Description: Low-cost inference services provide capabilities close to frontier commercial models at extremely low costs, triggering collective reflection in the AI+Crypto track: if centralized AI services are already cheap and fast enough, what is the point of the blockchain layer? This trend has led to a significant overall decline in AI+Crypto tokens.
Severity: High
Response:
The answer to this question depends on “what the blockchain layer provides.”
If the blockchain layer only provides “decentralized computing power” (like Bittensor, Render Network), then the low-cost inference impact indeed poses a major threat—centralized computing power is cheaper, faster, and more stable.
But DioChain’s blockchain layer provides social infrastructure:
| Need | Centralized AI’s Answer | DioChain’s Answer |
|---|---|---|
| Identity | API Key (revocable, traceable) | DID (Self-Sovereign Identity) |
| Contract | User Agreement (platform-dominated) | ACTUS Contract (on-chain executable, bilateral equality) |
| Judiciary | Platform Customer Service (uncertain response) | AI Judicial System (rule-based, appealable) |
| Payment | Credit Card (excludes unbanked populations) | Token (global, no barriers) |
| Compliance | Platform Unified Policy (one-size-fits-all) | Compliance Slots (localized adaptation) |
Low-cost inference services can make AI inference cheaper, but they cannot give an Agent a non-revocable identity, provide cross-border instant settlement, or enable two mutually distrustful Agents to sign an enforceable contract. These are the irreplaceable values of the blockchain layer.
16.5.2 First-Mover Advantage of Existing Competitors
Risk Description: Multiple competitors have established significant first-mover advantages in their respective fields.
| Competitor | First-Mover Advantage | DioChain’s Differentiation |
|---|---|---|
| Bittensor (TAO) | 129+ subnets, Grayscale trust endorsement | Bittensor’s consensus is actually centralized (Opentensor Foundation’s PoA), subnet quality is hard to verify. DioChain does not compete in computing power; it builds financial infrastructure. |
| Ritual | TEE+ZKP AI inference verification | Still in pre-mainnet stage, architecture not validated at scale. DioChain does not reinvent the wheel for AI inference verification; it can integrate similar technologies in computing power markets. |
| NEAR AI | 1M TPS, NEAR Intents processing $6B+ | AI strategy is more narrative-level market positioning; the technical architecture is not natively designed for AI Agents. |
| Fetch.ai / ASI Alliance | Achieved AI-to-AI payment | Internal alliance fragmentation, repeated pivots, lack of clear long-term direction. |
| ACTUS Protocol (ETH) | Has Solidity-implemented ACTUS | Just a contract library, no chain-level optimization, no supporting identity/judiciary/compliance infrastructure. |
| Casper Network | Lists ACTUS as a priority | Low market cap, low adoption, ACTUS integration still in planning stage. |
| EZKL | Most mature zkML framework, used by multiple enterprises | Focuses on ZK proofs, not a direct competitor, could be a technical partner. |
DioChain’s Positioning Difference: Most of the above competitors focus on a single dimension (computing power market, AI inference verification, contract standard). DioChain’s positioning is integrated Agent social infrastructure—providing a complete, self-consistent system. The risk of this positioning is “trying to do everything = doing nothing well,” but we mitigate this risk through “defining primitives, not applications”—only building the minimal complete primitive set, letting the market build applications on top of the primitives.
16.5.3 Overall Credibility Crisis in the AI+Crypto Track
Risk Description: The AI+Crypto track has experienced a severe credibility crisis: many projects have narratives but no products, tokens have significantly corrected, and investor confidence is severely damaged. New projects face widespread trust deficits.
Severity: Medium-High
Response:
Our attitude towards this is: focus on infrastructure delivery, not narrative-driven hype.
- We do not make promises of “AI-driven super returns.”
- We do not promote grand narratives of “disrupting traditional finance.”
- What we do is: enable Agents to call AI models cheaply (real demand), while providing them with a set of financial infrastructure (ACTUS + DID + Judiciary).
The cold-start path is based on computing power demand (Chapter 14), not speculation. Even if the credibility of the entire AI+Crypto track goes to zero, as long as the fact that “calling AI models on DioChain is cheaper than mainstream model providers” holds true, there will be users.
But we also acknowledge: the difficulty of fundraising and user acquisition increases significantly in a credibility crisis environment. This is a market environment risk, not a product risk.
16.6 Multi-Chain Topology and Infrastructure Risks
The parallel universes and cross-chain topology introduced in Chapter 11, and the four-piece infrastructure matrix (aibank, agenter, diolaw, dioproof) defined in Chapter 12, bring significant architectural expansion to DioChain. However, new architectural components also introduce new risk surfaces. This section systematically analyzes these risks.
16.6.1 Cross-Chain Bridge and Customs Node Risks
Risk Description: The cross-chain topology defined in Chapter 11 relies on Customs Nodes as the core hub for inter-chain communication, handling DID mapping, compliance checks, and asset locking/release functions. Cross-chain bridges are the most frequently attacked component in the blockchain space—multiple security incidents involving hundreds of millions of dollars have occurred at cross-chain bridges. DioChain’s Customs Nodes carry dual functions of identity mapping and asset bridging, presenting a larger attack surface.
Specifically, Customs Nodes face the following risks:
- Centralization Bottleneck: Customs Nodes are the mandatory passage between two chains. If a Customs Node is compromised, attackers can freeze cross-chain assets, forge DID mapping relationships, or even bind Utopian Chain DIDs to incorrect Sovereign Chain citizen identities.
- Asset Locking Contract Vulnerabilities: In the Lock-Mint-Burn-Release model, the locking contract on the source chain is a high-value attack target. If the locking contract has logical vulnerabilities, attackers can release source chain assets without burning target chain tokens, leading to cross-chain asset inflation.
- Liveness Failure: The downtime or denial of service of a Customs Node directly blocks all communication between two chains, affecting ongoing cross-chain transactions and Agent migrations.
Severity: High
Mitigation Strategies:
- Multi-Signature Customs Nodes: Customs Nodes between each pair of chains adopt a multi-signature architecture (e.g., 5/7 multi-sig); any cross-chain operation requires signatures from more than the threshold number of nodes to take effect, eliminating single points of failure.
- Fraud Proof Mechanism: Cross-chain operations have a challenge period; anyone can submit fraud proofs during this period to revoke abnormal operations.
- Cross-Chain Insurance Pool: Extract a certain percentage from cross-chain fees to inject into an insurance pool, used to compensate affected users after a bridge security incident.
- Customs Node Rotation: Regularly rotate the keys and operators of Customs Nodes to reduce long-term collusion risk.
Residual Risk: Multi-signature architecture raises the attack threshold but does not eliminate risk—if a majority of signing nodes are compromised simultaneously (e.g., sharing the same cloud provider), multi-signature protection fails. Cross-chain bridge security is an unsolved problem for the entire blockchain industry; DioChain cannot solve it independently.
16.6.2 diolaw Governance Capture Risk
Risk Description: The diolaw legislative infrastructure defined in Chapter 12 introduces the AI Delegate system and lobbying economics. This mechanism improves legislative efficiency but also brings new governance capture risks.
Specifically:
- Adversarial Manipulation of AI Delegates: AI Delegates are essentially LLM Agents running on-chain. Attackers can carefully craft proposal texts, using prompt injection techniques to induce AI Delegates to make voting decisions contrary to their principals’ interests. This is a new type of governance attack—no need to buy votes, just “persuade” the AI.
- Plutocratization of the Lobbying Market: In diolaw’s design, lobbying costs are borne by the proposal initiator—meaning well-funded interest groups can invest more computing power to lobby AI Delegates, gaining disproportionate influence in the legislative process. This is a known design trade-off, not a defect: the lobbying mechanism allows preference intensity to be expressed through resource investment (similar to real-world lobbying, but all expenditures are fully transparent and on-chain auditable). However, this trade-off may, in extreme cases, lead to a few wealthy participants systematically dominating legislative direction.
- Homogenization of AI Delegates: If many AI Delegates use the same underlying model (e.g., the same vendor’s LLM), they may produce highly similar judgment biases when facing complex proposals, causing “majority voting” to essentially become “single model voting.”
Severity: Medium-High
Mitigation Strategies:
- AI Delegate Audit Trail: The complete inference process of all AI Delegates (input proposal text, intermediate reasoning steps, final voting decision) is fully recorded on-chain for public audit. Abnormal voting patterns (e.g., sudden change in consistent stance) trigger automatic alerts.
- Delegate Revocation Mechanism: Principals can revoke their voting delegation to an AI Delegate at any time, with immediate effect. If an AI Delegate exhibits suspicious behavior, principals can quickly cut losses.
- Model Diversity Requirement: The protocol requires that the set of AI Delegates participating in governance must cover LLMs from at least N different model vendors, preventing systemic bias from a single model dominating voting results.
- Proposal Content Security Review: Proposals undergo automated prompt injection detection before entering the lobbying phase, filtering out obvious adversarial text.
Residual Risk: Adversarial prompt engineering is an active attack-defense field; complete defense is not achievable under current technological conditions. The plutocratization tendency of the lobbying market is an inherent property of free market mechanisms—completely eliminating it would require abandoning the market mechanism itself, which is not DioChain’s design choice.
16.6.3 dioproof Evidence Credibility Risk
Risk Description: The dioproof evidence infrastructure defined in Chapter 12 relies on ZK-TLS technology to transform off-chain evidence into on-chain verifiable cryptographic evidence packages. The credibility of this technology depends on several assumptions, which may not hold in all scenarios.
Specifically:
- TLS Certificate Chain Trust Foundation: ZK-TLS’s source authenticity verification relies on the integrity of the TLS certificate chain. If a Certificate Authority (CA) is compromised or coerced into issuing forged certificates, attackers can construct evidence packages that appear to come from legitimate sources but are completely fabricated. CA compromise events are not rare in history.
- Technical Adaptability of Evidence Sources: Some critical evidence sources (e.g., bank intranet systems, government portals, proprietary mobile apps) may use non-standard TLS implementations, certificate pinning, or other technical measures, preventing ZK-TLS from capturing them properly. This means that, under current technological conditions, dioproof’s evidence coverage has blind spots.
- Timeliness Window: ZK-TLS proves that “at a certain point in time, a certain server returned certain content,” but cannot prove that the content was not tampered with before or after evidence collection. For dynamically changing data sources (e.g., editable social media posts), there is a time window risk of “modify first, then collect evidence.”
Severity: Medium
Mitigation Strategies:
- Multi-Source Corroboration Requirement: For high-risk disputes (involving large asset freezes or severe reputation damage), judicial primitives require both prosecution and defense to provide evidence from multiple independent sources for mutual corroboration; evidence from a single source is insufficient to support a final ruling.
- Evidence Technology Maturity Grading: Classify different types of evidence sources into multiple levels based on ZK-TLS adaptation maturity—public HTTPS websites (high maturity), standard API interfaces (high maturity), bank online banking systems (medium maturity), proprietary mobile apps (low maturity). Evidence from low-maturity sources has correspondingly lower probative value in judicial processes.
- CA Multi-Verification: For critical evidence packages, require the TLS certificate chain to undergo cross-verification by multiple independent Certificate Transparency Logs, reducing the impact of a single CA compromise.
- Continuous Evidence Collection Mechanism: For dynamic data sources that may be tampered with, support regular automatic evidence collection and on-chain storage, forming a time-series evidence chain.
Residual Risk: ZK-TLS is a technology still rapidly evolving; its reliability in large-scale judicial scenarios has not been fully validated. Some evidence sources (e.g., end-to-end encrypted communication apps) are, in principle, not suitable for ZK-TLS; this limitation cannot be bypassed through engineering means.
16.6.4 Sovereign Chain Fork Risk
Risk Description: The core architectural premise of Chapter 11 is: sovereign nations can freely fork DioChain’s open-source code to operate fully customized Sovereign Chain instances. This design grants sovereign entities great flexibility but also introduces risks related to code integrity and user sovereignty.
Specifically:
- Backdoor Injection: Sovereign Chain operators (government agencies or their authorized entities) can modify the source code after forking to inject backdoors—for example, adding undisclosed asset freezing interfaces, entrusting DID decryption keys to law enforcement, or embedding surveillance logic in Compliance Slots beyond their declared scope. Since Sovereign Chain operators control the deployment of all nodes, users find it difficult to externally verify whether the running code matches the publicly available source code.
- Asset Trap: Sovereign Chain operators can unilaterally modify cross-chain rules, restricting or completely prohibiting asset transfers to the Utopian Chain or other Sovereign Chains. In extreme cases (e.g., escalated capital controls, political crisis), users’ assets on a Sovereign Chain may be effectively “trapped,” unable to exit.
- DID Portability Impairment: If a Sovereign Chain modifies the DID format or mapping rules, the identity reputation accumulated by users on that chain may not be migratable to other chains, locking users into a single Sovereign Chain.
Severity: Medium-High
Mitigation Strategies:
- Open-Source Audit Framework: Establish a standardized Sovereign Chain code audit framework—defining the minimum code specifications for “DioChain compatibility,” with regular inspections of Sovereign Chain code changes by independent third-party audit institutions. Sovereign Chains passing audits receive “compatibility certification”; those failing audits face restrictions in cross-chain interactions.
- Cross-Chain Emergency Exit Mechanism: Build an emergency exit channel into the Customs Nodes defined in Chapter 11—when a Sovereign Chain exhibits abnormal behavior (e.g., batch rejection of cross-chain requests, unilateral modification of bridging rules), users can transfer assets to the Utopian Chain via an emergency exit contract. The emergency exit contract is deployed on both the source and target chains; neither party can disable it alone.
- DID Portability Protocol: Define the minimum portable dataset for DIDs (public key, reputation digest, contract history hash) at the protocol level, ensuring that even if a Sovereign Chain modifies the DID extension format, core identity data can still be exported to any compatible chain.
- Sovereign Chain Transparency Rating: Establish a public Sovereign Chain transparency rating system—based on dimensions like code openness, audit frequency, cross-chain policy stability—providing users with reference for choosing Sovereign Chains.
Residual Risk: Sovereign Chain operators have complete physical control. In extreme scenarios (e.g., wartime, comprehensive network blockade), any technical-level exit mechanism may be blocked by infrastructure-level restrictions. DioChain’s architecture can minimize the impact of unilateral actions by Sovereign Chain operators on users but cannot eliminate sovereign power itself. This is the fundamental trade-off of the multi-chain parallel universe architecture—accepting the participation of sovereign entities means accepting the existence of sovereign power.
Chapter 17: Roadmap
This roadmap is triggered by milestone conditions, not date commitments.
Principles
This project does not set date commitments such as “Mainnet launch in Q3 2025.” Software development is not an assembly line; delivery timelines for complex systems cannot be precisely predicted.
This roadmap is triggered by milestone conditions: when conditions are met, progress to the next phase. If conditions are not met, do not force advancement.
Phase 0: Proof of Concept
Status: In Progress
Deliverables:
- White paper release (this document)
- Formal specification of the core primitive set
- PoC prototype: Demonstrates the complete process of Agent registering DID → signing ACTUS contract → invoking compute → settlement in a local environment
- Economic model simulation: Uses Monte Carlo simulation to verify the robustness of Token economics under extreme scenarios
Conditions to advance to the next phase:
- [ ] PoC prototype passes internal review
- [ ] Economic model simulation shows no death spiral in 1000 extreme scenarios
- [ ] Obtain preliminary architecture review from at least 1 external security team
Phase 1: Testnet
Deliverables:
- Public testnet launch
- L0 settlement layer + 3-5 official L1 branches
- Core ACTUS contract templates: PAM (Principal at Maturity) + Swap
- DID registration and reputation system v1
- AI Traffic Police v1 (basic rule engine + LLM assistance)
- Compute trading protocol v1 (supplier registration + simple routing + streaming payment)
- Open-source Agent SDK + 3-5 standard Agent templates
- diolaw v0.1 (off-chain voting accumulation prototype + basic legislative process)
- dioproof v0.1 (ZK-TLS evidence packaging PoC, integrated with AI Traffic Police)
Conditions to advance to the next phase:
- [ ] Testnet runs stably for > 90 days with no L0 layer consensus failures
- [ ] Daily average compute invocation volume > 100M tokens
- [ ] Active Agents > 1,000
- [ ] Complete at least 100 full lifecycles of ACTUS contracts
- [ ] Pass contract audit by at least 1 professional security audit firm
- [ ] AI Traffic Police misjudgment rate < 5% (based on human-annotated test set)
Phase 2: Mainnet Launch
Deliverables:
- Mainnet launch, Token officially issued
- Compute market officially opens (third-party suppliers can register)
- Open L1 branch registration (third-party entities can stake margin to open branches)
- ACTUS contract type extensions: ANN (Annuity), NAM (Negative Amortization), LAM (Linear Amortization)
- AI Court v1 (supports dispute arbitration and appeals)
- Compliance Slots v1 (supports basic KYC/AML plugins)
- Cross-branch liquidity routing optimization
- diolaw officially launched (complete loop of off-chain lobbying + on-chain referendum)
- dioproof officially launched (supports evidence types such as bank transfers, chat records, webpage snapshots)
Conditions to advance to the next phase:
- [ ] Mainnet runs stably for > 180 days
- [ ] Third-party branches > 10
- [ ] Third-party compute suppliers > 20
- [ ] Daily average compute invocation volume > 1B tokens
- [ ] Active Agents > 10,000
- [ ] At least 3 community-built emergent markets appear (any 3 listed in Chapter 15)
Phase 3: Ecosystem Maturity
Deliverables:
- Advanced ACTUS contract types: OPTNS (Options), FUTUR (Futures), CEG (Credit Enhancement Guarantee), etc.
- Cross-chain bridging: Asset interoperability with mainstream L1s
- AI Evolution Engine fully enabled: Complete governance loop of AI dynamic parameter adjustment + community governance + human jury
- Compliance Slots v2: Supports compliance frameworks of major jurisdictions
- Decentralized governance: Foundation gradually exits core decision-making, power transferred to the community
- Sovereign Chain Fork Kit released
- Cross-chain Agent pass-through protocol v1
- diolaw sovereign chain adaptation (PoP voting mode)
Continuous iteration:
- Continuously expand ACTUS contract types based on community needs
- Continuously upgrade AI Evolution Engine based on AI technology progress
- Continuously update Compliance Slots based on regulatory environment changes
- Gradually scale down the foundation’s official branches when they are no longer the main source of traffic
Non-Goals
The following items are not in the roadmap because they are not what DioChain should do:
- Building specific applications: We only build primitives, not applications. Applications emerge from the market.
- Issuing stablecoins: Token anchoring strategies are determined by governance, but DioChain does not issue stablecoins itself.
- Operating exchanges: Branches provide trading functions, but DioChain does not operate centralized exchanges.
- Providing compute: The compute trading center is a trading protocol, not a compute cloud.
- Creating Token scarcity: $DIO is an elastic supply unit of account, not a scarce collectible. DioChain does not artificially create scarcity to drive up prices.
Chapter 18: Conclusion
Positioning Statement
The blockchain industry is not short of speculative tools. What it lacks is infrastructure—the infrastructure that enables AI Agents to have identity, sign contracts, resolve disputes, acquire computing power, and participate in economic activities.
The core mission of DioChain can be stated in one sentence: To build financial infrastructure for the Agent era.
The goal of DioChain is not “to use AI for trading to make more money,” nor is it “to decentralize everything” or “to disrupt traditional finance.”
Its core value lies in providing the most fundamental social structures necessary for the operation of an emerging Agent economy: identity, currency, contracts, law, and markets.
Furthermore, DioChain is not a single chain, but a set of social operating system protocols. The same set of protocols can be forked into parallel universes—Utopia Chain serves as the ideal-state reference implementation, while various Sovereign Chains operate independently under different governance configurations. The protocol is unified; governance is diverse.
Minimal Complete Set of Primitives
Our design philosophy is to define primitives, not applications.
Six groups of primitives—Economic Primitives, Contract Primitives (ACTUS), Identity Primitives (DID), Judicial Primitives, Compliance Slots, and the Compute Trading Protocol—form a minimal complete set. “Minimal” means we do not do anything extra; “complete” means that on top of these primitives, the market can spontaneously give rise to any applications it needs.
The set of primitives defines the rules, but rules require infrastructure to carry and execute them. aibank provides access tools, agenter acts as a super-scheduler orchestrating Agent behavior, diolaw carries the legislation and referendum process, dioproof provides zero-knowledge proof infrastructure—these four form a closed loop, enabling the set of primitives to operate, the rules to evolve, and disputes to be adjudicated.
The same set of primitives can operate on multiple parallel chains under different governance configurations. The primitives remain unchanged; the governance parameters are variable—this is the core hypothesis of the multi-chain topology.
We do not know what the most successful Agent application of the future will look like. But we believe that, whatever it looks like, it will need identity, contracts, payments, justice, and computing power.
We build these. The rest, we leave to the market.
Economic Sustainability
The economic model of DioChain does not rely on Token price appreciation to sustain its operation.
The elastic supply mechanism of $DIO ensures that the Token supply scales in sync with the size of the economy—there is no artificial scarcity, no inflation schedule, and every Token minted has a real counterparty consideration. This means the system’s value creation stems from economic activity itself, not from speculative expectations.
Revenue sources are clear and sustainable:
- Branch Fees: Direct income for branch operators, priced by market competition.
- Compute Market Transaction Volume: Every Agent inference call is a real economic activity, generating real settlement demand.
- Social Treasury: Through the diolaw legislative mechanism, the community can levy transaction taxes on commercial activities, providing a sustainable funding source for public services (judicial system, infrastructure maintenance).
- Official Infrastructure Services: Tools like aibank and agenter are charged on-demand or provided for free, with pricing authority belonging to the operator.
Investors should focus on core metrics not Token price, but rather: Total Value Locked (TVL), Daily Active Agents (DAA), daily tokens processed (daily compute consumption), and governance activity through diolaw legislation. These metrics directly reflect the real prosperity of the Agent society.
Current Stage
DioChain is currently in the Phase 0 (Proof of Concept) stage. The whitepaper is the starting point, not the end point.