Skip to main content
https://explorer.newt.foundation/mainnet

Definitions

General

TermDefinition
TaskThe atomic unit that the protocol validates. It includes an intent and a reference to the policy.
PolicyUser-specific policy with parameters set by a user when they choose to use it.
CompliantWhen a task meets the criteria defined by a policy.
Non-compliantWhen a task does not meet the criteria defined by a policy.

Task

TermDefinition
Current StatusInformation on the stage a particular task is in. See section below for possible values.
SenderThe address of the wallet that initiated the transaction to the protocol.
Policy Client AddressThe address of the policy-guarded smart contract. This could represent a vault for an end-user.
Evaluation ResultIndicates whether a policy is passed or not. Possible values: compliant or non-compliant.
Date CreatedThe date the task was first recognized by the protocol.
Last UpdatedThe date the task last changed status.
IntentThe actual EVM transaction for which the policy is being evaluated.

Policy Evaluation

TermDefinition
Source TemplateA generic policy written by a developer. Templates are customized by end-users to create policies.
Policy IDUnique identifier representing a user-specific policy.
Date CreatedThe time at which a policy was created for the user.
Time of EvaluationThe time at which the task was evaluated as compliant or non-compliant.
Evaluation ResultIndicates whether a policy is passed or not. Possible values: compliant or non-compliant.
IntentThe actual EVM transaction for which the policy is being evaluated.
Policy DataOffchain data produced by the WASM binary as defined in the policy.
Policy ParamsUser-specific parameters used to customize a policy template.
Policy CodeThe Rego code that defines a policy template.
Policy SimulationA local browser evaluation of an intent, used to keep operators honest.

Task Lifecycle

  1. Intent evaluation requested: The task is sent to an AVS operator for evaluation.
  2. Intent evaluated: The AVS operator has evaluated the task against the policy to determine compliance.
  3. Proof consumed / Proof expired: Once a proof is generated by the protocol and provided to the developer, it can be used by the policy client to complete the transaction. If the proof is used, it is “consumed”. If the expiration window passes, as defined by the policy, it is “expired”.