top of page
Search

Building Trust Cooperatively: How Functions & dApps Get Approved on Auver



The power of a platform like Auver lies not only in its core verification capabilities but also in its ability to evolve and expand through new functionalities and applications built by its community. Registered functions executed via Cooperative Proof-of-Useful-Work (CPoUW) and diverse decentralized applications (dApps) are key to unlocking Auver's potential. However, ensuring these additions are secure, efficient, and aligned with the network's ethos is paramount. Auver addresses this through a multi-stage, incentivized, and accountable governance vetting process designed to balance permissionless innovation with rigorous quality control, centered around a novel Staked Auditor mechanism.


Step 1: The Proposal - Bringing Innovation Forward

It starts with a developer or team having an idea for a new useful work function or a dApp that leverages Auver's unique verification features. They prepare a formal proposal detailing the function/dApp's purpose, its technical specifications (including resource limits in "Units," execution logic references, and crucially, its verification_logic – how its core rules or outputs are verified), and submit it via a transaction to Auver's dedicated Submission dApp. This creates a transparent, timestamped record linked to the developer's verified AuverID.


Step 2: Engaging the Experts - Becoming a Staked Auditor

Auver empowers knowledgeable community members to play a crucial role in vetting proposals. Individuals or entities wishing to serve as auditors must first achieve the ZKPVerified-Unique identity status. They then formally register for the "Auditor" role via the Identity dApp and commit significant economic collateral by locking an Auditor Bond (a specific amount of CVNB, potentially utilizing the Stake Earn-In option) via the Staking dApp. This stake serves as a guarantee of diligent review, as it's potentially slashable for proven negligence. Auditors also have an Auditor Rating score, reflecting their track record.


Step 3: Selection and Assignment - Weighted Random Chance

When a new proposal enters the Submission dApp, the protocol automatically triggers a selection process. Using a verifiable random function (VRF), it chooses a subset of active, Registered Auditors to review the specific proposal. This selection isn't purely random; it's weighted by the Auditor's current Rating, giving more experienced and highly-rated auditors a greater chance of being selected for review tasks, while still ensuring broader participation.


Step 4: Accepting the Task - Commitment with Consequences

Selected auditors are notified and have a defined period to either accept or reject the assigned review task via an on-chain transaction. While auditors can reject tasks, doing so consecutively too many times incurs a small Auditor Rating penalty, discouraging individuals from simply staking as auditors without actively contributing review effort.


Step 5: Diligence and Reporting - The Audit Process

Auditors who accept the task perform their due diligence off-chain. This involves scrutinizing the proposal details, analyzing the code (if made available by the proposer – transparency is highly encouraged!), assessing potential security risks, validating resource limit claims, and evaluating alignment with protocol standards and ethos. They then submit their findings via a transaction to the Governance dApp, including their summary recommendation (e.g., Approve, Reject, Request Changes) and a hash linking to their full, detailed review report (stored accessibly, likely on Tier 2).


Step 6: Rewarding the Review & Updating Reputation

Upon successful submission of a timely, valid audit report (regardless of whether the recommendation was positive or negative), the protocol automatically triggers a payment from the Community Fund. The auditor receives a predefined, fixed Audit Fee (in CVNB) for their work. Consistently providing high-quality, timely reviews may also contribute to small increases in their Auditor Rating over time.


Step 7: Informed Governance - Community Decision

The submitted audit reports (or their summaries/hashes) become publicly accessible alongside the original proposal. This expert analysis provides crucial input for the broader stakeholder community (Shareholders and potentially Servers, depending on the proposal category) who participate in the final on-chain governance vote. The auditors' vetting acts as a critical filter and information source, enabling more informed decision-making by the DAO, but typically doesn't replace the final approval vote by the wider governance body.


Step 8: Auditor Accountability - Stake at Risk

The Auditor Bond isn't just for show. If a function or dApp that was approved based partly on an auditor's positive review is later found to contain a severe, obvious flaw that the audit demonstrably should have identified, a separate governance process can be initiated to challenge that audit. If the challenge is successful, the negligent auditor faces significant consequences, including a major reduction in their Auditor Rating and potential slashing of their staked Auditor Bond.


Optional Incentive: dApp-Level Profit Sharing

Beyond the protocol's fixed audit fees, Auver's design allows dApp developers themselves to optionally build incentives directly into their applications. A dApp could choose to automatically share a small percentage of its own transaction fees or revenue with the AuverIDs of the auditors who positively reviewed and the voters who approved its initial registration proposal. This creates a market dynamic where auditors might be further incentivized to review dApps offering such long-term alignment.


Conclusion: Balancing Innovation and Integrity

This multi-stage process, combining automated selection, expert review incentivized by fees and stake-at-risk, public reporting, and final community governance, creates a robust framework for approving new functions and dApps on Auver. It aims to foster permissionless innovation while ensuring that additions to the ecosystem are rigorously vetted for security, efficiency, and alignment with the network's core principles, building trust through cooperative verification and shared accountability.

 
 
 

Comentários


bottom of page