Invarians

ROADMAP

Structural measurement infrastructure for AI agent economies · A2A · Toward decentralised certification

2026
PHASE 01
Calibration & Onchain Proof of Value
Q1 2026, LIVE · PARTIAL
L1 Structural Attestation in production
Structural regime measurement for Ethereum, Polygon, Solana and Avalanche. Two-layer model, infrastructure structure versus economic demand, producing a certified, signed regime vector per chain. Four regimes: S1D1 · S1D2 · S2D1 · S2D2. Attestation v3 live. Calibration status per chain: ETH and POL validated, SOL and AVAX in calibration.
ETH SOL POL AVA Attestation v3 S1D1·S2D1
Q1–Q2 2026, LIVE · PARTIAL
L2 Coverage · SDK · Labs · CRE Integration
Structural measurement extended to Arbitrum, Base and Optimism, execution profile, sequencer response, blob saturation. Cross-chain Execution Context API live: L1 regime × L2 regime × Bridge state → certified on-chain execution context.

Python SDK deployed (pip install invarians), JavaScript integration examples available. labs.invarians.com launched as a substrate observability research surface (intentions and metric inventory, agentic load × substrate response). agentic.invarians.com deployed as a reference integration of Invarians within the Chainlink CRE stack.
Arbitrum Base Optimism Python SDK JS examples Labs CRE 7 Chains
Q2 2026, MAY · DELIVERED
L2 Calibration Completion · Variable-Latency Bridge Scope · Agentic Pressure Baseline
L2 threshold calibration completed 2026-05-01 on Arbitrum, Base and Optimism (rhythm, continuity, sequencer_publish_latency). Statistical calibration on 30-day production baseline, ~3% D2 nominal rate, coherent with L1 FPR. Beacon participation threshold calibrated on Ethereum 2026-05-01. Event-detection validation pending Phase D (on-chain event detection via archive node replay, Q3 2026).

Bridge classification scope: variable-latency surfaces (Chainlink CCIP, Circle CCTP). Circle CCTP upgraded from health-probe proxy to per-message Circle ECDSA capture 2026-05-11 (capability_level: per_message_attested, confidence MEDIUM on the 10 EVM routes). Chainlink CCIP upgraded to capability_level: per_message_attested on 2026-05-12 (source-to-execute matched by bytes32 messageId on the 10 EVM lanes); DON multi-sig CommitReport capture is the next step.

The agentic pressure baseline is collecting on regime-distribution observations across L1 × L2 × Bridge pairs since 2026-03-30 and cannot be reconstructed retroactively.
L2 calibration Variable-latency bridges CCTP per-message ECDSA CCIP per-message (matched by messageId) Agentic baseline
Q2 2026, END OF APRIL
Panel Attestation · Direction-Agnostic Cross-Chain Surfaces
Execution context exposed as a single panel covering variable-latency cross-chain surfaces. L2↔L2 via Circle CCTP and L1↔L1 via Chainlink CCIP rolled out through Q2.

One direction-agnostic call: GET /v2/panel. The agent composes the exact route it cares about from the panel's L1, L2 and bridge entries; Invarians exposes states, not directions. Each bridge entry carries a unified BS1 / BS2 state (or null when classification is deferred), with a type field distinguishing CCIP from CCTP.
CCIP L1↔L1 CCTP L2↔L2 Variable-latency only Direction-agnostic Unified BS state
Q2 2026, LATE APRIL · LIVE
EVM Full Operational · Centralised
Complete EVM centralised coverage reached late April 2026. Seven chains live, with cross-chain surfaces exposed through a single panel: L2↔L2 via Circle CCTP and L1↔L1 via Chainlink CCIP.

Panel exposes 20 variable-latency cross-chain surfaces: 10 Circle CCTP routes (upgraded 2026-05-11 to per-message Circle ECDSA capture, capability_level: per_message_attested) and 10 Chainlink CCIP lanes (upgraded 2026-05-12 to per-message capture via bytes32 messageId matching, capability_level: per_message_attested, with DON multi-sig CommitReport capture scheduled in the same Phase 01 window). Unified BS1 / BS2 nomenclature on panel.bridges[].state; type, capability_level, and crypto.anchor fields distinguish the protocol, the depth of signal captured, and the cryptographic anchor mechanism.

Unified API: GET /v2/panel, one call returns L1, L2 and every bridge at once. Each entry carries its own calibrated flag and capability_level, so agents reason about raw vs calibrated and aggregate vs per-message at a glance. Institutional grade cross chain coverage, live. Methodology published on the audit trail.
EVM Full CCTP per-message CCIP per-message RMN observable capability_level enum 20 variable-latency lanes in panel 7 chains
2026-04-30, LIVE
API v2.0 · Three Primitives (Attestation + Regime + Drift Signal)
API surface restructured around three explicit primitives in a single signed payload: Primitive 1, Attestation (HMAC-SHA256 envelope, on-chain anchor slot reserved May 2026), Primitive 2, Regime (12 SxDx codes per chain via the structural × demand grid with signed direction extension), Primitive 3, Drift Signal (per-metric shift, shift_delta, shift_magnitude_delta over short ~10h and long ~30d EMAs, plus composite drift per axis).

Two new structural classifying observables: beacon_participation on Ethereum (Beacon Chain validator participation rate) and sequencer_publish_latency on each L2 (sequencer health, unblocks S2 detection on rollups). Both emit shift_available: false during their slow-EMA stabilization period (~30 days).

New endpoints: GET /v2/panel + POST /v2/verify. Tiered exposure via ?include=core|diagnostic|full. SDK Python invarians 0.7.0 on PyPI. v1.1.0 endpoints sunset 2026-06-30.
API v2.0 Three primitives Drift Signal Beacon participation Sequencer publish latency SDK 0.5.0
2026-05-11, LIVE
Per-Message CCTP Attestation Capture · Circle ECDSA Anchored
CCTP routes upgraded from health-probe proxy to per-message attestation tracking. Each USDC transfer between EVM chains is now captured individually with its Circle ECDSA secp256k1 signature, retrievable via GET /v2/cctp/attestation/{message_hash} and independently verifiable against Circle's published attester public key.

Real per-message latency P90/P99 per route. A pending queue handles the asymmetry between collector cycle (10 min) and source-chain finality (~13-19 min on Ethereum-anchored sources): no message is lost across cycles. Each bridge entry exposes a new capability_level field (per_message_attested for CCTP today, aggregate reserved for surfaces where per-message capture is not yet implemented) plus structured metrics and crypto objects. CCIP reaches the same per_message_attested level on 2026-05-12 (see next entry).

Confidence flag moves from LOW (proxy) to MEDIUM (per-message, EVM only) on 10 EVM CCTP routes. SDK Python invarians 0.8.0 on PyPI with client.get_cctp_attestation().
Per-message capture Circle ECDSA Independently verifiable capability_level Pending queue SDK 0.8.0
2026-05-12 · DELIVERED
CCIP Per-Message Capture
CCIP lanes upgraded from aggregate signals to per-message capture. Source CCIPSendRequested and destination ExecutionStateChanged are matched per message via the bytes32 messageId, yielding real send-to-execute latency per lane per direction. A pending queue handles messages whose execute lands later than the 10-min collector cycle, mirroring the CCTP pending model.

CCIP capability now matches CCTP's per-message depth. crypto.anchor remains null until DON multi-sig capture (next step). Captured messages retrievable via GET /v2/ccip/message/{message_id}. SDK invarians 0.9.0 ships with client.get_ccip_message().
CCIP per-message messageId matching CCIPSendRequested ABI v1.2 ExecutionStateChanged Pending queue per_message_attested
Q2 2026, MAY-JUNE · UPCOMING
CCIP DON Multi-Sig Anchoring (CommitReport Capture)
Crypto-grounding of CCIP signals, respecting Chainlink's native cryptographic chain of trust (different mechanism from Circle's single-attester ECDSA).

CommitStore capture. CommitReport events emitted on the destination CommitStore carry the F+1 threshold-signed DON multi-sig over the batch Merkle root. Captured per batch, with per-message Merkle inclusion proofs derived from the batch tree.

API outcome. CCIP capability_level upgrades from per_message_attested to per_message_crypto_anchored, with crypto.anchor: "don_threshold_sig" on every CCIP bridge entry. The verification mechanism is intrinsically different from CCTP's single-attester ECDSA, and the API exposes that distinction honestly via the crypto.anchor enum.

Strategic alignment with Phase 02 CRE integration. The same DON threshold-signature mechanism Invarians will capture on CCIP bridges is the architecture that will host the Invarians attestation flow via Chainlink CRE in Q3-Q4 2026. Monitoring CCIP at DON-grade depth and operating Invarians attestation through a DON converge: bridge observability becomes operational reference for the path toward decentralised attestation. Capturing CCIP commit reports is dual-purpose by design.
DON multi-sig CommitReport Merkle inclusion proof per_message_crypto_anchored CRE alignment Phase 02 enabler
Q2 2026, MAY · GOAL
First Live CRE Workflow, Execution Context Onchain
First autonomous CRE workflow running on Sepolia: structural execution gate mapping certified L1 regime to agent decisions, S1D1 proceeds, S2D1 defers, with the full execution context stored onchain at every execution.

Agent decisions cryptographically bound to certified network state at the moment of action. Not a record of what happened, a certified, timestamped record of the infrastructure conditions under which the agent acted. Composite tuple: L1 regime × L2 regime × CCTP bridge state (route in scope: ARB↔ETH, BASE↔ETH, OP↔ETH).
CRE Sepolia Execution context onchain Audit trail L1 × L2 × CCTP
Q2 2026, MAY
MCP Server, Agent-Native Access
A Model Context Protocol server exposing Invarians execution context as a native tool, callable by AI agents without human middleware or SDK integration. SDK addresses developers. MCP addresses agents directly.

An agent running on Claude, GPT or Chainlink CRE can call get_panel_v2() as a first-class tool in its stack, the same way it calls any other capability.
MCP CRE Agent-native Claude Zero integration friction
Q2 2026, JUNE
Tier 2 CCTP Routes · ETH↔SOL CCIP Observation
CCTP confidence flag moves from MEDIUM (per-message, EVM only, since 2026-05-11) toward HIGH as the production-grade 30-day window of clean per-message latencies accumulates (target ~2026-06-10). Tier 2 CCTP routes (AVAX↔ARB, BASE↔OP) added once observed throughput supports per-message calibration.

ETH↔SOL CCIP lane has been live since May 2025 but historical data on the Solana side is thinner (~12 months) and requires the Solana RPC pipeline (same dependency as CCTP Solana). Passive observation accumulates until classification can be committed, targeting Q1 2027. Pattern Reference enriched with directional patterns observed in production.
CCTP MEDIUM → HIGH 30-day window Tier 2 routes ETH↔SOL CCIP observation
PHASE 02
Trustless Integration, Hybrid Model
Q3 2026
Non-EVM Calibration Complete · Signed Regime Codes Generalised · Third-party Bridges · Pattern Reference
Solana and Avalanche structural calibration validated on internal production data, regime classification reaching full confidence on all four L1 chains. July 2026.

Signed regime classification reaches every chain after event-based backtest on documented incidents (sequencer halts, agentic cascades, censorship events). The 12-code grid (S1D1, S1D2+, S1D2-, S1D2±, S2+D1, S2-D1, S2+D2+, S2+D2-, S2+D2±, S2-D2+, S2-D2-, S2-D2±) has been live on Ethereum, Polygon, Base and Optimism since 2026-04-29 (statistical activation). Q3 2026 brings Solana and Avalanche into the same scheme alongside their L1 calibration, and refines the existing lower bounds via event-based validation. Arbitrum gets a multi-dim demand workaround (size + tx based) since the native sigma_ratio is degenerate on Nitro.

Coverage extended to third-party institutional bridges: LayerZero Enterprise, Across, with the same directional tuple (source regime × destination regime × bridge state). ETH↔SOL CCIP observation continues toward Q1 2027 MEDIUM confidence.

Pattern Reference enters production: documented historical frequencies per directional tuple, per bridge type, across 7 chains.
Solana calibration Avalanche calibration Signed regime codes LayerZero Across ETH↔SOL observation Pattern Reference
Q4 2026
Trustless Integration Layer, CRE · Functions · CCIP
The Invarians API continues serving off-chain agents via Python and TypeScript SDKs, existing integrations unchanged. In parallel, a Chainlink Functions layer enables genuine DON-level computation: each node independently fetches structural metrics from its own RPC endpoint and reaches consensus on the regime vector without a single computation source.

CCIP delivers the DON threshold-signed regime cross-chain, an execution context produced by decentralized consensus, verifiable on-chain at the point of execution. CRE workflows extended to mainnet with the full L1 × L2 × Bridge execution gate.

The hybrid model operates both paths simultaneously: API for agents, DON consensus for smart contracts. The full calibration methodology and backtests have been public since Q2 2026 (agentnorthstar.com); Q4 closes the loop by moving the runtime trust from a single operator to a DON. Capturing CCIP commit reports during Phase 01 (Q2 2026) provided the operational reference for this transition: the same threshold-signature mechanism now hosts Invarians' own attestation.
Chainlink Functions CCIP CRE mainnet TS SDK Backtests DON consensus Hybrid
Q4 2026, A2A VISION
CCIP L1×L1 · L1×L2, Cross-Chain Execution Context
CCIP observability, already live at per_message_crypto_anchored capability since Phase 01 (DON multi-sig CommitReport captured per batch, Merkle inclusion proof per message, RMN cursed status per chain), is now wired into the A2A coordination layer. A cursed CCIP lane freezes routing independently of statistical classification, invisible to any fee monitor.

This unlocks a unified cross-chain composite context across two patterns: L1×L1, (SxDx)ETH × (SxDx)SOL × BSxCCIP, the structural regime of two L1 chains crossed with the operational state of the bridge connecting them; and L1×L2, (SxDx)ETH × (SxDx)ARB/BASE/OP × BSxCCIP, extending existing rollup coverage to CCIP-grade bridge certification.

Designed for A2A agent coordination: Agent A passes a signed panel to Agent B before any cross-chain action. Both agents operate on the same independently verifiable ground truth, no trust required between them. API and SDK unified: panel.bridges[] exposes every CCIP lane alongside CCTP routes, same interface for L1 or L2 endpoints.

EVM lanes production-ready at launch. ETH↔SOL activates with observation-phase certification, calibration completing Q1 2027 as the lane accumulates sufficient structural history.
Chainlink CCIP L1×L1 L1×L2 RMN observable SxDx cross-chain A2A ETH↔SOL Institutional RWA
2027
2027
Protocol Decentralisation, Computation Network & Node Rewards
Invarians publishes updated structural baselines on every computation cycle, the quantified reference of nominal behaviour for each chain. Independent nodes receive these baselines, compute their own invariants directly from raw RPC data, and submit their regime classification. Nodes whose output matches consensus earn token rewards. Stake is required to participate.

Invarians retains the methodology, the historical baseline, and the role of reference publisher. The computation, and with it the trust, becomes distributed. Regime classifications are no longer certified by a single server. They are verified by an independent network against the same source data, each node signing its output with a registered Ed25519 key.

Calibration stops being a private asset. It becomes a public good, reproducible and verifiable by any participant.
Independent nodes Computation rewards Stake to compute On-chain baselines Ed25519 on-chain Open methodology