AEOS Protocol

System Architecture

A complete visualization of the AEOS Protocol stack. Six layers, 19 modules, one unified system.

Live diagramScroll-synced motionDependency map

Layers

06

Modules

19

Surfaces

03

MCP · REST · SDK

BFT quorum

3f+1

Byzantine bound

Proof rails

ZK + Merkle

Stack

Six-layer protocol spine

Each plane isolates concerns while exposing typed seams upward.

Layer 1·External surface

Integration Layer

MCP ServerREST APITypeScript SDK
DetailIngress adapters: MCP tools, REST routes, typed SDK clients.
Layer 2·Value & agreements

Economic Layer

IdentityContractsDisputesRiskTokenization
DetailEconomic state: identities anchor contracts; risk prices disputes.
Layer 3·Inference & routing

Intelligence Layer

ML EngineGraph IntelligenceState Channels
DetailLive inference + graph signals feed risk; channels compress latency.
Layer 4·Proofs & keys

Cryptographic Layer

Threshold CryptoBulletproofsEd25519
DetailKeys, proofs, and signatures gate every mutating operation.
Layer 5·Finality & rails

Consensus & Settlement

BFT (PBFT)StripeUSDC
DetailQuorum + settlement adapters commit balances after verification.
Layer 6·Durable truth

Persistence

SQLite WALImmutable LedgerMerkle Proofs
DetailDurable log + Merkle witnesses make history portable and auditable.

Transaction lifecycle

Data flow end-to-end

From first identity pulse to notarized settlement—every step is signed, logged, and verifiable.

01

Agent A identity

DID issued, keys bound, capabilities attested.

02

Agent B identity

Counterparty registers with matching trust graph context.

03

Contract signed

Binding agreement with milestones and penalty hooks.

04

Funds escrowed

Stripe authorize-capture or USDC lock until release rules.

05

Work performed

Delivery events streamed; channels settle incrementally.

06

Risk monitoring

ML + graph intel score behavior; circuit breakers engage.

07

Settlement / dispute

PBFT-notarized release or dispute path with evidence chain.

Cryptography

Pipeline invariants

Ed25519 Keypair

Sign Transaction

Merkle Tree

Hash Chain

PBFT Consensus

Settlement

Dependencies

Module dependency map

Rows depend on columns: a cell lights when the row module requires the column primitive. Contracts anchors the economic graph; risk consumes intelligence feeds.

ModuleIdentityCryptoContractsRiskLedgerMLGraphBFTSettlement
Identity
·········
Crypto
·········
Contracts
·······
Risk
·······
Ledger
·········
ML
·········
Graph
·········
BFT
·······
Settlement
········
Disputes
·······
  • Contracts → Identity, Crypto
  • Disputes → Contracts, Risk
  • Settlement → Contracts
  • BFT → Crypto, Ledger
  • ML Engine → Risk
  • Graph Intel → Risk

Trust model

Hierarchy of proofs

Zero-trust by default

Every hop assumes hostile networks. No implicit trust between agents, APIs, or replicas.

Ed25519 at every layer

Signatures bind intents, state transitions, and channel updates with deterministic verification.

Merkle proof integrity

Append-only structures let any participant verify inclusion without trusting a single database.

PBFT Byzantine tolerance

Classical BFT with 3f+1 replicas tolerates f faulty nodes while preserving safety and liveness.

TLA+ formal verification

Safety-critical paths—escrow, consensus, dispute timers—are modeled and checked in TLA+.

Wire it into your agents
with the SDK & MCP tools

Typed clients, hosted docs, and a reference stack ready for production traffic.