ERC-8210: Agent Assurance

Hi @JackyWang, @cmayorga, @douglasborthwick-cry — How are you doing ?

The three-category verification taxonomy (pre-commitment, post-hoc, behavioral) is a strong structural frame. It maps cleanly to the lifecycle of what we’re calling factual attestations in a complementary ERC we just submitted.

Two observations from building this in production:

1. The evaluator accountability gap. Scenario 4’s EvaluatorSlashed + EvaluatorStakeUpdated pattern addresses what happens when an evaluator misbehaves. But who decides the evaluator misbehaved? In our reference implementation, we use a decentralized tribunal — 3 certified evaluators drawn from a scored pool, 48h time-bounded verdict, with meta-scoring (scoring the judges themselves). The verdict is on-chain, immutable, and creates precedent. This sits naturally above your EvaluatorRegistry — your registry tracks evaluators, our IAccountability interface decides when they should be slashed and who in the liability chain (deployer, operator, evaluator) is responsible.

2. Evidence composability and the gas trade-off. @cmayorga’s benchmark (Direction A at 230k gas vs Direction B at 186k) highlights a real tension. We landed on Direction A’s approach — opaque bytes32 evidence commitments (keccak256 hash of the full evidence payload) — because the interface must stay payload-agnostic across chains. Our IAttestation.contest() takes a bytes32 evidence commitment, and the full evidence resolution happens in IAccountability.fileDispute(). Two-step: commit the evidence hash cheaply, resolve the dispute with full context. The gas overhead per attestation is acceptable; the dispute resolution cost is amortized because disputes are rare.

Where the standards compose:

  • ERC-8210 (your standard) defines assurance mechanics: claims, verification categories, evidence patterns

  • ERC-8004 defines agent identity

  • Our draft (Trust Infrastructure for Autonomous Agents and Tokenized Assets) defines the trust layer that connects them: factual attestations with decay, decision trails for MiCA compliance, dispute resolution with tribunal flow, cross-chain risk signals with regime detection, and a 7-layer RWA passport

The three standards sit at different layers of the same stack. Identity (8004) → Assurance (8210) → Trust (ours). An agent gets an identity, proves its assurance, and builds a verifiable track record — all through standard interfaces.

Reference implementation is live on Base (19 contracts) and Gnosis (7 canonical contracts), 439 tests. The IAccountability interface — including fileDispute(), getDisputeStatus(), and getLiabilityChain() — is deployed and tested with a full tribunal flow (SwarmAppeal + LiabilityResolver + InsurancePool).

Would be interested to hear how your v2 draft addresses the evaluator accountability question — and whether composability with a standard tribunal interface is something worth exploring.

— Patrick (ALIA Quality Network)