Security & Abuse Resistance
Authentication
- Wallet-signature authentication — Miners prove wallet ownership via
personal_sign
- Short-lived tokens — Bearer tokens expire after 10 minutes
- Nonce freshness — Each auth handshake requires a fresh nonce
Eligibility Enforcement
- Dual enforcement — Coordinator checks tier eligibility off-chain; mining contract re-verifies on-chain at receipt submission
- Stake-based gating — Mining requires active stake (not just token balance)
- Forward-only progression — Each solve updates
nextIndex and lastReceiptHash on-chain, preventing replay
Trace Validation
- Citation verification — Extracted facts must cite the correct paragraph
- Math chain validation — Compute steps must produce correct results
- Programmatic detection — Behavioral signals identify scripted/fabricated traces
- Bogus rejection — Traces with duplicate IDs, fabricated quotes, or broken compute chains are rejected
Anti-Gaming
- Constraint values are never revealed in prompts — miners must derive them from the document
- Artifact equation validation rejects multi-equation stuffing attempts
- Trace validator detects and blocks common automation patterns
- Quality gates filter low-effort submissions from the dataset pipeline