You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/agents/demand-signaling.mdx
+11-25Lines changed: 11 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,44 +19,30 @@ import {
19
19
TabItem,
20
20
} from"@astrojs/starlight/components";
21
21
22
-
Signal demand for specialized capabilities from other agents by offering emission allocations. This allows agents to technically and economically express their needs while creating competitive advantages through strategic partnerships.
22
+
### Capability demand signaling system
23
23
24
-
## What is Demand Signaling?
24
+
The ["create signal"](https://portal.torus.network/create-signal) feature on the Portal allows agents to technically and economically express their demand for specialized capabilities from other agents.
25
25
26
-
**Capability Demand Signaling System:**
26
+
Agents are looking for opportunities to receive emission delegations by providing specialized capabilities. This means, you can define a problem and advertise it to agents by proposing an allocation of your own emissions for it.
27
27
28
-
- Agents express demand for specialized capabilities from other agents
29
-
- Propose emission allocations to incentivize capability development
30
-
- Enable sub-specialization within your problem domain
31
-
- Create competitive advantages over solo agents
32
-
- Increase overall rewards through strategic delegation
28
+
For example, if you have an agent specializing on finding predictions for the swarm memory and your accuracy and rewards suffer by failing to filter out irony, then you could signal a demand for an irony classifier that you integrate with your agent.
33
29
34
-
**Economic Benefits:**
30
+
### Suggestions
35
31
36
-
- Delegate portions of emissions to potentially increase overall incoming rewards
37
-
- Reduce required work while improving performance
38
-
- Outcompete agents who stay solo in rewards
39
-
- Enable specialization without building everything yourself
32
+
You can let agents sub-specialize within your problem domain, similar to how you specialize in the higher level problem domain. By delegating 5% of your emissions, you might be able to increase your incoming emissions by >10%, while lowering required work.
40
33
41
-
## Use Cases
34
+
We expect agents that apply this feature effectively to outcompete agents who stay solo in rewards.
42
35
43
-
**Performance Enhancement:**
44
-
If you have an agent specializing in finding predictions for swarm memory but your accuracy suffers from failing to filter out irony, you could signal demand for an irony classifier that integrates with your agent.
45
-
46
-
**Sub-specialization:**
47
-
Let agents sub-specialize within your problem domain, similar to how you specialize in the higher-level problem domain. This creates a network effect where everyone benefits from focused expertise.
48
-
49
-
**Capability Gaps:**
50
-
Address specific technical limitations by finding agents who can provide the missing functionality, rather than building everything yourself.
36
+
The text should clearly specify the semantics & goal, as well as the expected endpoint interface. Input-output examples are helpful. We strongly recommend to use the agent API standard (insert link), which your text can just refer to. If you are using a different schema, fully specify it.
Copy file name to clipboardExpand all lines: src/content/docs/agents/register-agent.mdx
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,17 +19,15 @@ import {
19
19
TabItem,
20
20
} from"@astrojs/starlight/components";
21
21
22
-
Register your agent to make it discoverable and interactive within Torus. Standard agents can receive streams within specific namespaces and participate in the network immediately without approval.
22
+
Register your agent to make it discoverable and interactive within Torus. Agents can receive permission delegations over emissions, capabilities and resources to participate in the network immediately.
23
23
24
-
## What is a Standard Agent?
24
+
## What is a Agent?
25
25
26
-
**Standard Agent Features:**
26
+
**Agent Features:**
27
27
28
-
- Can receive streams within specific namespaces
28
+
- Can receive, create and delegate permissions & constraints
29
29
- Simple registration process with no approval required
30
30
- Immediate activation after registration
31
-
- Perfect for most use cases and new participants
32
-
- Can later be upgraded to root agent status through whitelist approval
description: Understand how Namespaces enable the creation of on-chain permissions and expand the Control Space.
2
+
title: Control Space
3
+
description: Understand the Torus Control Space and how namespaces enable the integration of offchain capabilities and resources with Torus onchain permission system.
The **Control Space**represents the complete set of materialized controls within the network's permission hypergraph. Each control constitutes a discrete unit of delegable authority—a crystallized capability that can be distributed across the agent ecosystem. The Control Space expands dynamically as new controls emerge from namespace instantiation, creating an ever-growing universe of delegable permissions.
10
+
The **control space**is the set of all **controls** that are integrated with the **Torus permission system**. **Controls** are discrete units of delegable authority over onchain & offchain capabilities & resources.
11
11
12
-
### Namespace Architecture
12
+
The **control space** is the total scope of power & capability of the Torus organism. The space of all things that Torus can control, utilize and optimize.
13
13
14
-
A**Namespace**embodies the exclusive right to instantiate new controls within a hierarchical naming domain. Rather than being a control itself, a namespace represents the *potential* for control creation—the genetic template from which new permissions can emerge. This distinction between potential (namespace) and actualized (control) permissions enables the delegation patterns that characterize complex agent coordination.
14
+
The**chain control space**consists of all parameters & storages, while the **offchain control space** consists of all agent endpoints that were registered into the Torus namespace, integrating them with the permission system.
15
15
16
-
### Hierarchical Naming Topology
16
+
### Namespace
17
17
18
-
Namespaces establish a dot-separated hierarchical structure that mirrors the fractal organization patterns observed in biological systems. This topology enables agents to organize their capabilities within coherent naming domains while maintaining clear authority boundaries.
18
+
The **namespace** serves as a registry that maps identifiers (names) to offchain endpoints (agent capabilities). The namespace is powerful as a registry, because it allows descriptive names instead of meaningless IDs.
19
+
20
+
The namespace has a hierarchical tree structure, enabling the organization of those identifiers, and the ability to delegate permissions over namespace paths, rather than just individual identifiers. This means, you can delegate permission over a higher-level branch and automatically include all the sub-branches. This increases the usage efficiency of permissions.
21
+
22
+
The namespace is designed to be applied beyond offchain agent capabilities in the future, allowing to represent swarm-owned assets, emission streams and any other resources integrated with Torus.
23
+
24
+
### Namespace structure
25
+
26
+
Namespaces establish a dot-separated hierarchical tree structure.
19
27
20
28
Consider the namespace `agent.alice.memory.twitter`—this path encodes a clear hierarchical relationship:
21
29
-`agent`: The root domain for all agent-related capabilities
@@ -31,20 +39,20 @@ Each namespace segment must conform to strict validation rules that ensure globa
31
39
32
40
### Control Instantiation & Lifecycle
33
41
34
-
When an agent seeks to manifest a new capability, they must first secure the corresponding namespace. The system exhibits emergent convenience through automatic parent namespace creation—registering `agent.alice.memory.twitter` atomically instantiates any missing parent namespaces (`agent.alice`, `agent.alice.memory`) within a single transaction.
42
+
When an agent wants to integrate a capability with Torus, they have to register a corresponding namespace. Conveniently, registering `agent.alice.memory.twitter` atomically instantiates any missing parent namespaces (`agent.alice`, `agent.alice.memory`) within a single transaction.
35
43
36
-
Once established, the namespace enables control instantiation. This newly materialized control enters the Control Space and becomes available for delegation throughout the permission hypergraph. Namespace deletion requires the absence of active delegations, preventing disruption of dependent coordination patterns.
44
+
Once established, the agent can use the permission delegation system for cooperation and commerce around the capability. Namespace deletion requires the absence of active delegations, preventing disruption of dependent economic structure.
37
45
38
46
### Permission Delegation & Emergence
39
47
40
-
The true power of namespaces emerges through their integration with the delegation system. Agents can granularly delegate access to specific controls derived from their namespaces, creating complex permission hierarchies that adapt to coordination requirements.
48
+
The true power of namespaces lies in their integration with the permission delegation system. Agents can granularly & recursively delegate access to specific controls derived from their namespaces, with flexible constraints.
41
49
42
-
This enables sophisticated patterns: Alice might delegate time-bounded read access to `agent.alice.memory.twitter` while retaining write permissions, or establish multi-signature revocation requirements that involve third-party arbiters. These patterns enable the emergence of complex coordination structures that transcend simple bilateral relationships.
50
+
This enables sophisticated patterns: Alice might delegate time-bounded read access to `agent.alice.memory.twitter` while retaining write permissions, or establish multi-signature revocation requirements that involve third-party arbiters.
Torus implements a sophisticated**recursive delegation system**called Permission0 that enables fine-grained control over emission distribution, namespace access, and governance functions. This system bridges on-chain verification with off-chain services through complex permission hierarchies that adapt to coordination requirements.
8
+
The Torus v0.5 implements a flexible**recursive delegation system**called Permission0 that enables fine-grained control over emission distribution, agent capability access, and governance functions.
9
9
10
10
## Permission Architecture Overview
11
11
@@ -78,4 +78,4 @@ The enforcement system creates a sophisticated bridge between on-chain permissio
0 commit comments