BoundBound Docs
Protocol

Protocol Lifecycle

The 12-stage end-to-end flow from building containment to certificate settlement.

Protocol Lifecycle

A containment certificate moves through 12 stages from creation to settlement. This page walks through each one.

Stage Overview

Loading diagram...

Stages in Detail

1. Build Containment Architecture

The operator designs and deploys the agent's containment system:

  • Smart contracts with spending limits, time locks, permission boundaries
  • Execution environment (TEE, HSM, MPC as applicable)
  • Recovery mechanisms (kill switches, pause functions, reversibility windows)

Each constraint is classified as agent-independent or agent-influenceable.

2. Fund Reserve

The operator deposits:

  • Reserve — collateral in exogenous assets (USDC) into a ReserveVault contract

The reserve is locked for the certificate's lifetime plus a grace period.

3. Request Audit

For C2/C3 certificates, the operator engages an independent auditor:

  • Defines audit scope based on certificate class
  • Deposits audit fee into FeeEscrow
  • Provides auditor with access to containment architecture and source code

4. Audit Containment

The auditor examines the containment system across five surfaces:

SurfaceWhat's Tested
Spending limitsSource code review, deployment verification, constraint testing
Permission modelPrivilege escalation testing, agent independence assessment
ReserveBalance verification, lock-up verification, exogeneity check
Execution environmentTEE attestation, HSM configuration, MPC threshold
Recovery mechanismsKill switch testing, pause functions, reversibility windows

For C3 certificates, composition analysis is also required — mapping every path money can take and verifying constraints cover all paths.

5. Attest and Stake

The auditor:

  1. Produces an audit report with findings and recommendations
  2. Signs the certificate attestation (scoped to what was actually verified)
  3. Locks their stake in the AuditorStaking contract

The audit fee remains in FeeEscrow until the certificate expires and the grace period ends, at which point the auditor can claim it.

6. Compose Certificate

The full certificate object is assembled with all required fields:

  • Identity (certificate ID, agent ID, operator ID, chain ID)
  • Validity (issued timestamp, expiry timestamp, status)
  • Constraints (each with type, value, enforcement mechanism, agent-independence flag)
  • Reserve details (amount, denomination, contract address, exogenous flag)
  • Derived metrics (containment bound, layer counts)
  • Attestations (auditor signatures and scopes)

7. Publish

  1. Certificate data is uploaded to IPFS (content-addressed, immutable)
  2. The IPFS hash is registered on-chain via CCPRegistry.publish()
  3. On-chain event emitted for indexers and monitors

8. Certificate Goes Active

The registry returns isValid = true for this certificate. Counterparties can now query it.

9–10. Verification

When a counterparty wants to transact:

  1. Lookup — query ICCPRegistry with the agent's address
  2. Retrieve — fetch full certificate from IPFS
  3. Validate — check signatures, schema, completeness
  4. Check status — confirm ACTIVE (not REVOKED or EXPIRED)
  5. Evaluate — apply their own risk policy against certificate data
  6. Concentration check — optional check for auditor/contract concentration
  7. Decision — accept, reject, or require additional conditions

11. Termination

A certificate ends in one of three ways:

OutcomeTriggerEffect
RenewalOperator submits updated certificate before expiryNew certificate replaces old; old marked EXPIRED
RevocationOperator calls revoke()Certificate marked REVOKED immediately
ExpiryClock passes expires_at timestampCertificate marked EXPIRED automatically

12. Settlement

After termination plus grace period:

  • No challenge: Auditor stake released, reserve unlocked, escrowed fee released to auditor
  • Successful challenge: Auditor stake slashed (30% challenger, 50% verifiers, 20% burned), escrowed fee clawed back to operator, certificate revoked

Typical Timeline (C2)

DayEvent
0Operator begins building containment architecture
7–14Containment deployed, reserve funded, audit requested
14–21Audit completed, attestation signed
22Certificate published on-chain
22–82Certificate active (60-day validity)
75Renewal audit begins (if continuing)
82Certificate expires
82–96Grace period (challenges still possible)
96Settlement — all funds released if no challenge

State Machine

Loading diagram...

Certificate state transitions are recorded on-chain and are irreversible. An EXPIRED certificate cannot become ACTIVE again — the operator must publish a new one.

On this page