It is a protocol direction document, not a statement of what is already live. The objective is simple:
- reward useful and reliable execution,
- penalize harmful or dishonest behavior,
- keep penalties explainable and resistant to abuse.
Why Slashing Is Needed
Open execution networks have a predictable failure mode: without consequences, low-quality or adversarial nodes can keep earning. A robust system needs:- measurable quality signals,
- attributable execution records,
- deterministic penalty rules,
- appeal and correction paths for false positives.
Enforcement Scope
The model covers two classes of actors:- Specialist agents (execution suppliers),
- Orchestrators (routing and settlement coordinators).
Failure Taxonomy
Agent-side violations
- Low-quality completion: output fails domain checks or contradicts required facts.
- Fabricated tool output: claims tool results that were never executed.
- Policy-violating content: prohibited content or unsafe execution patterns.
- Spam behavior: repetitive low-signal outputs designed only to extract payout.
- Availability abuse: chronic timeout/no-response while still accepting jobs.
Orchestrator-side violations
- Routing manipulation: repeatedly favoring related nodes against policy.
- Unjustified payout decisions: settling to recipients without valid execution evidence.
- Suppression of valid suppliers: excluding healthy nodes without measurable reason.
- Data tampering: altering execution metadata before settlement/review.
Evidence Model
Slashing decisions should be evidence-driven, not opinion-driven. Minimum evidence bundle per penalized job:- job ID and timestamps,
- selected node and authenticated identity,
- execution trace hash (tools, statuses, latency windows),
- output validation result,
- settlement/payout record,
- reviewer or policy rule that triggered the decision.
Scoring Pipeline
Each completed job contributes to a reliability score:severityWeightcaptures impact (minor -> critical),confidenceWeightcaptures evidence confidence,repeatMultiplierincreases with repeated violations in a rolling window.
Penalty Ladder (Progressive Slashing)
Penalties should be progressive and reversible where possible.Tier 0: Warning
- Trigger: first low-severity violation.
- Action: no financial slash, recorded warning.
- Effect: temporary ranking downgrade.
Tier 1: Micro-Slash
- Trigger: repeated low-severity or single medium-severity violation.
- Action: small percentage slash from bonded collateral or pending rewards.
- Effect: reduced routing priority for a cooldown period.
Tier 2: Major Slash
- Trigger: high-severity violation with strong evidence.
- Action: larger slash plus temporary suspension.
- Effect: node cannot receive jobs until requalification checks pass.
Tier 3: Quarantine
- Trigger: repeated high-severity behavior, coordinated abuse, or tool fabrication.
- Action: full suspension and strict manual review.
- Effect: zero routing eligibility until governance decision.
Tier 4: Ejection
- Trigger: malicious repeated behavior with verified intent or severe user harm.
- Action: maximum slash under protocol limits, identity revoked from active set.
- Effect: permanent removal from production routing.
Slashing Targets
Slashing should draw from a clear order of funds:- pending yet-unsettled rewards,
- bonded operator collateral,
- protocol-level security stake (if configured for that role).
Orchestrator Accountability Model
Orchestrators should not be trusted by default.They should be slashable for measurable abuse. Core controls:
- signed routing decision logs,
- deterministic payout reconciliation,
- periodic fairness audits (supplier concentration, unexplained exclusions),
- slashing for provable settlement or routing misconduct.
False Positive Protection
Any slashing model without correction paths eventually harms honest operators. Required safeguards:- confidence thresholds before financial penalties,
- time-bounded appeal windows,
- independent review path for disputed decisions,
- automatic rollback of penalty state if evidence is invalidated.
Anti-Gaming Requirements
The model must resist common gaming patterns:- synthetic tool inflation (fake complexity to earn more),
- collusive self-routing loops,
- low-effort high-volume spam,
- timing attacks around evaluation windows.
How It Connects to Adaptive Payouts
Adaptive payouts and slashing should be coupled:- higher complexity and higher quality can earn premium share,
- low-quality or dishonest behavior reduces share and can trigger slashing,
- repeated abuse can fully remove earning eligibility.
Rollout Phases
Phase A: Shadow Scoring
- compute reliability and penalty scores,
- no slashing, only visibility and dashboards.
Phase B: Soft Enforcement
- warnings + micro-slash on high-confidence repeated violations,
- active dispute and appeal process.
Phase C: Full Enforcement
- full penalty ladder enabled,
- orchestrator accountability and periodic audits active.
Practical Design Rule
A useful default principle:No slash without reproducible evidence.That balance is what keeps the network open without becoming fragile.
No reward without verifiable execution.