Abstract
COC (ChainOfClaw) is a blockchain network designed for broad, sustained node participation. We observe that:
โข PoW systems tend to centralize around specialized hardware and cheap electricity
โข PoS systems tend to centralize around capital and delegated operations
COC introduces Proof-of-Service (PoSe): a verifiable challenge-response protocol that rewards nodes for providing measurable network servicesโuptime/RPC availability, data storage and availability, relay supportโrather than rewarding stake ownership.
Vision & Goals
Mission
"Make decentralization practical by shifting the core participation bottleneck: From 'buy hardware + run complex ops' โ 'run reliable node, backed by automated agent operations'"
Six Design Goals
Permissionless Participation
Anyone can run a node and earn rewards
Non-PoS Incentives
Earnings tied to service contribution, not stake
Consumer Hardware Friendly
Home/edge hardware can compete fairly
Verifiable & Auditable
Service claims verified through challenges
Anti-Monopoly
Diminishing returns and caps prevent winner-takes-all
AI Agent Operations Reliability
AI agents reduce operational burden without sacrificing determinism
Economic Model
Proof-of-Service (PoSe) Protocol
Core Idea
Nodes earn rewards by passing random, verifiable challenges over time. Each challenge produces an auditable receipt. Scores aggregate within an epoch.
Challenge Types
Challenge Frequency (per Epoch)
- โธUptime/RPC: avg 6 challenges/node/epoch (~1 per 10 min)
- โธStorage (SN only): avg 2 challenges/SN/epoch
- โธRelay (RN only): avg 2 challenges/RN/epoch
Pass Thresholds:
โข U pass rate โฅ 80% to qualify for U bucket reward
โข S pass rate โฅ 70% to qualify for S bucket reward
Scoring Formula
Anti-Cheat Mechanisms
๐Sybil Attacks
็ผ่งฃๆชๆฝ:
- โFixed bond + unlock delay
- โSingle-node reward soft cap
- โStorage commitment diminishing returns
- โSustained service requirement
๐Receipt Forgery / Replay
็ผ่งฃๆชๆฝ:
- โUnique challenge_id binding
- โChallenger + node signatures
- โSingle node per epoch nonce
- โVerifiable response fields
๐Challenger-Node Collusion
็ผ่งฃๆชๆฝ:
- โChallenger pool diversity
- โOn-chain sampling + dispute window
- โChallenger/aggregator bonds
- โTransparent statistics
๐Home Network False Negatives
็ผ่งฃๆชๆฝ:
- โModerate pass thresholds (80%)
- โMedian-based latency scoring
- โProgressive penalties
- โAI agent self-healing strategies
AI Agent Operations Layer
โกCOC maintains verifiability by keeping AI agents strictly in the operations layer
Release Plan
๐ Security Measures
- โThird-party security audits (trail-of-bits, consensys-diligence, etc.)
- โContinuous fuzzing and penetration testing
- โBug bounty program (up to $100k USD)
- โFormal verification of core contracts
- โGradual decentralization (multi-sig โ on-chain governance)
- โTestnet stress testing (network partition, Byzantine faults, etc.)