Protocol Specification

Technical specification for ClawFi's authorization protocol, smart contract interfaces, and cryptographic primitives.


Overview

ClawFi implements a three-layer authorization protocol enabling autonomous agents to execute financial operations with cryptographically enforced spending policies. This specification defines the protocol interfaces, message formats, and security guarantees.

Protocol Version: 1.0.0 Status: Production Last Updated: March 2026


Protocol Layers

┌──────────────────────────────────────────────────────────┐
│  Layer 3: Agent Interface (MCP)                          │
│  - Natural language parsing                              │
│  - Command structuring                                   │
│  - Response formatting                                   │
└────────────────────┬─────────────────────────────────────┘
                     │ Authorization Request
┌────────────────────▼─────────────────────────────────────┐
│  Layer 2: Policy Evaluation                              │
│  - Merchant verification                                 │
│  - Velocity control validation                           │
│  - Multi-party approval coordination                     │
│  - ZK-proof verification                                 │
└────────────────────┬─────────────────────────────────────┘
                     │ Authorization Proof
┌────────────────────▼─────────────────────────────────────┐
│  Layer 1: On-Chain Execution                             │
│  - Signature verification                                │
│  - Policy enforcement                                    │
│  - Asset transfer                                        │
│  - Event emission                                        │
└──────────────────────────────────────────────────────────┘

Cryptographic Primitives

Signature Schemes

Agent Authentication:

  • Algorithm: Ed25519

  • Key size: 256 bits

  • Signature size: 64 bytes

  • Purpose: Agent identity and command authorization

Multi-Party Approval:

  • Algorithm: Schnorr threshold signatures

  • Threshold: Configurable N-of-M

  • Aggregation: Non-interactive signature aggregation

  • Purpose: Coordinated multi-agent authorization

Zero-Knowledge Proofs:

  • System: Groth16 on BN254 curve

  • Circuit: Policy compliance verification

  • Proof size: 128 bytes

  • Purpose: Privacy-preserving authorization

Hash Functions

Transaction Commitment:

  • Algorithm: SHA-256

  • Output: 32 bytes

  • Purpose: Transaction integrity verification

Merkle Trees:

  • Algorithm: Keccak-256

  • Purpose: Policy state commitment


Authorization Protocol

Transaction Authorization Flow

Authorization Request Message

Authorization Response


Smart Contract Interface

Vault Contract

Program ID: VauLTxxx... (mainnet)

Initialize Vault

Execute Transfer

Authorization Engine Contract

Program ID: AuTHxxx... (mainnet)

Register Policy

Validate Authorization


Policy Specification Language

Merchant Whitelist Policy

Velocity Control Policy

Multi-Party Approval Policy


Message Formats

Transaction Request

Authorization Proof


Security Model

Threat Model

In Scope:

  • Unauthorized transaction execution

  • Policy bypass attempts

  • Replay attacks

  • Man-in-the-middle attacks

  • Agent key compromise

Out of Scope:

  • Solana consensus failures

  • Cryptographic primitive breaks (Ed25519, SHA-256)

  • Physical compromise of hardware security modules

Security Guarantees

Authorization Integrity:

  • Every transaction requires valid authorization proof

  • Proofs expire after configurable timeout (default: 300 seconds)

  • Nonces prevent replay attacks

  • Policies enforced at both off-chain and on-chain layers

Agent Authentication:

  • Ed25519 signatures verify agent identity

  • Keys rotatable without vault redeployment

  • Compromised keys revocable within 1 block time

  • Multi-signature required for high-value operations

Policy Enforcement:

  • Policies committed to Merkle tree on-chain

  • Policy updates require multi-party approval

  • Policy evaluation deterministic and auditable

  • Failed authorization attempts logged immutably


Performance Specifications

Latency Targets

Operation
Target
Measured (p99)

Authorization Request

< 50ms

45ms

Policy Evaluation

< 30ms

28ms

On-Chain Verification

< 100ms

85ms

Transaction Finality

< 400ms

380ms

End-to-End Latency

< 500ms

485ms

Throughput Targets

Metric
Target
Measured

Authorization Requests/sec

50,000+

62,000

On-Chain Transactions/sec

2,000+

2,400

Concurrent Agents

10,000+

15,000

Concurrent Vaults

100,000+

120,000


Protocol Extensions

Zero-Knowledge Proof Extension

Enable privacy-preserving authorization where policy compliance is proven without revealing transaction details.

Circuit Specification:

Usage:


Versioning & Upgrades

Protocol Versioning

Version Format: MAJOR.MINOR.PATCH

  • MAJOR: Breaking changes to protocol interfaces

  • MINOR: Backward-compatible feature additions

  • PATCH: Bug fixes and performance improvements

Current Version: 1.0.0

Upgrade Path

Smart Contracts:

  • Proxy pattern for non-breaking upgrades

  • 7-day timelock for major upgrades

  • Multi-signature governance required

  • Backward compatibility maintained for 2 versions

Authorization Protocol:

  • Version negotiation during handshake

  • Parallel support for N and N-1 versions

  • 6-month deprecation notice for major changes


Compliance & Auditability

Audit Log Format

On-Chain Event Emission


Reference Implementations

TypeScript SDK

Rust SDK


Test Vectors

Ed25519 Signature Verification

Policy Hash Calculation


Changelog

v1.0.0 (March 2026)

  • Initial production release

  • Core authorization protocol

  • Smart contract deployment

  • MCP integration

v0.9.0 (February 2026)

  • Beta release on devnet

  • Authorization engine testing

  • Performance benchmarking


References


Protocol Version: 1.0.0 Last Updated: March 2026 Status: Production Maintainer: ClawFi Protocol Team

Last updated