SCP Economics and Governance
Version: v1.0 (Draft) Status: Draft Authoritative: Yes
Purpose
This document defines the protocol-level economics, challenge effects, governance rules, staking requirements, and ingress-control rules of SCP.
Canonical protocol terms used here follow SCP Core Spec.
It answers:
- when work becomes reward-eligible
- how penalty and slashing affect protocol accounting
- how payout relates to finalized reward records
- which governance rules must be preserved by implementations
- how staking and ingress control protect the protocol from malicious actors
Reward Principles
The protocol requires:
- reward only finalized work
- no reward without accepted verification and finalized settlement
- append-only reward accounting
- payout systems to remain downstream from protocol accounting
Reward Inputs
Reward eligibility depends on:
epoch_id- accepted verification context
- finalized settlement context
- contributor role and units
policy_version- penalty or suspension references
- stake-compliance state where the actor is a staking actor
Reward Lifecycle
The canonical reward lifecycle is:
pending_inputeligiblecalculatedfinalizedblockedadjusted
Protocol Actors
The protocol-level economic and governance participants are:
Data ProducerTask SubmitterVault OperatorExecutorVerifierGovernance ActorTreasury / Payout Authority
These are protocol actors, not required one-to-one runtime services.
Actor Duties
Data Producer
Protocol duties:
- upload source data into an authorized Vault boundary
- avoid flooding the system with garbage, duplicate, or misleading inputs
- respect quota, retention, and ingestion controls before data enters protocol-relevant processing
Task Submitter
Protocol duties:
- submit valid tasks with correct authorization context
- supply or authorize the budget, payment source, or quota consumption for the requested work
- avoid abusive, fraudulent, or replay-conflicting task submission
Vault Operator
Protocol duties:
- maintain private data boundaries
- expose only authorized record material
- preserve consistency between canonical records and
Commitmentreferences
Executor
Protocol duties:
- perform authorized computation
- produce deterministic and auditable execution output
- avoid unauthorized access, fabricated output, or duplicate claims
Verifier
Protocol duties:
- validate execution correctness and integrity
- issue replayable
VerificationDecisionartifacts - accept, reject, or challenge output according to evidence
Governance Actor
Protocol duties:
- open, review, or adjudicate challenges within governance authority
- confirm or reject penalty outcomes based on replayable evidence
- preserve the integrity of challenge and slashing procedures
Treasury / Payout Authority
Protocol duties:
- transform finalized reward accounting into payout intent
- execute authorized payout obligations on the designated chain
- preserve payout integrity, reconciliation, and signer isolation
Staking Principles
The protocol uses two distinct economic control models:
stakefor slashable production and governance actorsbondorbudget lockfor ingress actors that consume protocol capacity
The protocol requires:
- actors eligible for network reward and protocol authority to maintain sufficient active stake
- reward eligibility to depend on both finalized work and stake compliance
- malicious or negligent behavior to be punishable through slashing, blocking, or suspension
- data and task ingress abuse to be constrained through quota, bond, and budget controls
Data Producer is not a staking actor by default.
Task Submitter is not a staking actor by default.
Stake Requirements by Actor
Shared Rules
The following actors are staking actors:
Vault OperatorExecutorVerifierGovernance ActorTreasury / Payout Authority
For these actors:
- insufficient active stake may block participation or reward finalization
- accepted penalties may slash stake
- severe or repeated violations may cause suspension in addition to slashing
Vault Operator
Stake rule:
- must maintain active stake to remain an eligible data-serving and reward-receiving actor
Executor
Stake rule:
- must maintain active stake to receive execution reward and remain eligible for protocol execution authority
Verifier
Stake rule:
- must maintain active stake to receive verification reward and remain eligible to issue authoritative verification outcomes
Governance Actor
Stake rule:
- must maintain active stake to receive governance incentive and retain challenge or adjudication authority
Treasury / Payout Authority
Stake rule:
- must maintain active stake to retain payout authority and any operational compensation eligibility
Ingress Control for Data Producers
Data Producer is governed by quota and bond controls rather than network staking.
Shared Rules
The protocol may require:
- storage quota
- ingestion quota
- ingestion bond for protocol-relevant data intake
- retention and pruning rules for invalid or low-value data
Quality and Abuse Controls
The protocol requires:
- obviously invalid, duplicate, or abusive uploads not to gain automatic entry into protocol processing
- low-quality or malicious uploads to be rate-limited, deprioritized, or pruned under policy
- repeated ingress abuse to cause bond forfeiture, blocking, or suspension from further protocol-relevant upload pathways
Task Admission and Budget Control for Task Submitters
Task Submitter is governed by budget and admission controls rather than network staking.
Shared Rules
The protocol may require:
- budget lock before task acceptance
- challenge bond where challenge privileges are used
- task class policy and cost estimation before admission
- rate limits and concurrency caps per actor or policy scope
Admission Rules
The protocol requires:
- insufficiently funded or unauthorized tasks not to enter
accepted - tasks whose estimated cost, complexity, or policy class exceeds limits to be rejected, delayed, or split under policy
- repeated abusive or non-computable task submission to trigger budget forfeiture, blocking, or suspension
Reward Model by Actor
Shared Rules
The protocol distinguishes between:
- reward recipients, who earn protocol rewards for valid contribution
- budget or payment sources, who fund or authorize work but do not earn task rewards by default
- operating authorities, who may receive operational compensation but are not primary task-production reward recipients
Primary reward recipients are typically:
Vault OperatorExecutorVerifier
Conditional governance or operational incentives may apply to:
Governance ActorTreasury / Payout Authority
Task Submitter is normally the budget or payment source, not a reward recipient.
Data Producer is normally the source-data contributor, not a reward recipient.
No actor receives protocol reward if:
- the relevant work is not finalized
- the actor is blocked or suspended
- the actor is a staking actor and not stake-compliant
- a challenge or penalty state still blocks reward finalization
Data Producer
Reward policy:
- does not receive protocol reward by default for merely uploading data
- may receive policy-defined credits or rebates only if explicitly configured
- cannot use raw upload volume alone to claim protocol reward
Task Submitter
Reward policy:
- does not receive task-production reward by default
- receives utility from successful task completion rather than protocol issuance
- may receive refunds, credits, or explicit governance compensation only if defined by policy
- cannot receive task admission privilege without satisfying budget lock and admission requirements
Vault Operator
Reward policy:
- may receive reward for making authorized data access available
- may receive reward for preserving data integrity and protocol-usable record quality
- reward amount is policy-governed and tied to eligible, finalized work
- reward finalization may be blocked if active stake is insufficient or pending penalties exist
Executor
Reward policy:
- receives reward for valid execution work that reaches accepted verification and finalized settlement
- reward amount may depend on units of work, task class, policy parameters, or epoch context
- no reward is due for rejected, invalidated, or unresolved execution output
- reward finalization may be blocked if active stake is insufficient or pending penalties exist
Verifier
Reward policy:
- receives reward for valid verification work
- may receive differentiated reward for correctly confirming valid output or correctly identifying invalid output
- no reward is due for unverifiable, incorrect, or bad-faith verification outcomes
- reward finalization may be blocked if active stake is insufficient or pending penalties exist
Governance Actor
Reward policy:
- may receive governance incentive for valid challenge or adjudication activity
- governance incentive applies only where policy recognizes the action as valid and protocol-useful
- no governance reward is due for frivolous, abusive, or unsubstantiated actions
- governance incentive may be blocked if active stake is insufficient or pending penalties exist
Treasury / Payout Authority
Reward policy:
- is not a primary task-production reward recipient
- may receive operational compensation for correct payout execution if policy allows
- operational compensation must remain downstream from finalized reward accounting
- operational compensation may be blocked if active stake is insufficient or pending penalties exist
Penalty Model by Actor
Shared Penalty Forms
The protocol may apply three broad forms of consequence:
block: temporarily prevent reward finalization or payout progressionslash: append negative economic records or forfeituressuspend: temporarily or permanently remove actor eligibility or authority
These consequences must be evidence-based, append-only in accounting effect, and governable through the challenge process where applicable.
For staking actors:
slashis primarily applied against active stake
For ingress actors:
- forfeiture is primarily applied against budget lock, challenge bond, or ingestion bond
Data Producer
Penalty policy:
- repeated garbage, duplicate, or misleading uploads may trigger quota restriction, bond forfeiture, or blocking
- malicious upload behavior that pollutes protocol-relevant intake may trigger suspension from further upload-driven task pathways
- invalid uploads should not automatically create protocol reward or semantic promotion opportunity
Task Submitter
Penalty policy:
- abusive or fraudulent submission may trigger rejection, blocking, or budget forfeiture
- forged authorization or replay abuse may trigger suspension from further submission
- malicious challenge abuse may trigger governance penalty or challenge bond forfeiture
Vault Operator
Penalty policy:
- unauthorized disclosure or misuse of private data may trigger severe slashing or suspension
- supplying false, inconsistent, or non-committed record material may trigger penalty
- refusing required protocol duties after accepted commitment may block or remove reward eligibility
- accepted penalties may directly slash active stake
Executor
Penalty policy:
- fabricated execution results may trigger slashing
- unauthorized access or policy violation may trigger suspension or expulsion
- duplicate claiming or replay abuse may trigger both blocking and negative economic adjustment
- accepted penalties may directly slash active stake
Verifier
Penalty policy:
- knowingly incorrect approval or rejection may trigger slashing
- fabricated evidence or collusion may trigger suspension or expulsion
- persistent low-quality or bad-faith verification may block future reward eligibility
- accepted penalties may directly slash active stake
Governance Actor
Penalty policy:
- frivolous or malicious challenge activity may trigger penalty
- collusive or bad-faith adjudication may trigger slashing and governance disqualification
- governance abuse that stalls protocol progress without evidence may be penalized
- accepted penalties may directly slash active stake
Treasury / Payout Authority
Penalty policy:
- duplicate payout, withheld authorized payout, or payout tampering may trigger severe penalty
- signer misuse or treasury abuse may trigger suspension of payout authority
- incorrect chain effects must be corrected explicitly and may produce governance or economic consequences
- accepted penalties may directly slash active stake
Governance and Slashing Rules
The protocol requires:
- challenge evidence to be replayable
- open challenge to block affected reward finalization
- approved penalties to append new economic records rather than rewrite history
- already confirmed chain effects to be corrected explicitly, not silently rolled back
- staking, reward, and penalty state to remain economically consistent with each actor's current eligibility
Blockchain Obligation Boundary
SCP defines the obligation to prepare payout instructions from finalized reward records.
At the protocol level:
- Aptos is the current primary payout chain
SYMis the canonical payout tokenPayoutInstructionSetmust preserve deterministic payout identity- payout failure must not mutate finalized reward records
Implementation details for submission, retry, signer management, and reconciliation belong to SCS.
Trust and Security Assumptions
The protocol assumes:
- private plaintext remains inside Vault or authorized TEE boundaries
- append-only evidence and accounting are mandatory
- signer compromise and payout tampering are treated as governable security incidents
- reconciliation drift must be detectable