Validator Roles
Olymp supports two validator personas.
Full Provider
- Signs Data Packages.
- Anchors metadata on-chain.
- Exposes provider API.
- Posts an OLYMP bond to activate.
API Provider
- Exposes an API endpoint.
- Adapter anchors on-chain.
- Posts an OLYMP bond to activate.
Bond lockups (circulating vs total supply)
- Bonds are locked in
ProviderRegistryand reduce circulating supply without burning. - Withdrawals require a cooldown period and are blocked if the remaining bond would fall below minimum while Active.
- Slashing can reduce locked bonds immediately for provable violations.
- Cooldown duration is configurable by governance within safe bounds.
- Bonds are collateral for misbehavior and do not represent yield.
Trust tiers (API validators)
Tier A: Provider-Signed (Model 1)
- Provider signs the DataPackage (EIP-712).
- Adapter anchors metadata on-chain.
- Gateway verifies provider signature against the registry.
- Recommended for high-trust use cases.
Tier B: Adapter-Attributed (Model 2, Bootstrap)
- Adapter signs and anchors.
- Data is attributed to the API provider but not provider-signed.
- Gateways MUST label responses with the tier (Tier A or Tier B).
- Recommended to cap scores or enforce stricter
minScorepolicies.
Gateway enforcement rules (MVP)
- Gateways MUST verify the signature against the expected signer:
- Tier A: provider address
- Tier B: adapter address
- Gateways MUST read ProviderRegistry for type, signingMode, and adapter.
- Gateways SHOULD apply stricter routing policies for Tier B.
Slashing MVP (summary)
- Slashing is admin/role-based in MVP.
- Slashable reasons include invalid signatures, anchor mismatches, repeated schema violations, and deliberate hash mismatches.
- Downtime is not slashable in MVP; it results in routing penalties or score decay.
- Governance-based slashing and disputes are future upgrades.