Overview

$VORN Technical Overview

Token Role

$VORN is the native coordination and access token within the Vorn Protocol. It governs tiered interaction with system components and acts as the gating mechanism for advanced features, execution bandwidth, and user-specific limits. The token is not required to use the protocol at a base level but becomes increasingly necessary for extended functionality and strategy access.


Access and Staking Mechanism

  • Staking is non-custodial and serves as an access control layer

  • Feature access is tiered based on staking thresholds:

    • Strategy depth

    • Auto-rebalance frequency

    • Notification bandwidth

  • A freemium base layer is always available. Additional permissions unlock dynamically as stake increases

The system can enforce stake requirements via middleware or smart contract-based gating at execution endpoints.


Feature Usage Quotas

Certain high-compute or latency-sensitive operations are quota-bound:

  • Auto-rebalances and real-time alerts are rate-limited per address

  • Staking increases quotas

  • Additional usage beyond quotas can be unlocked by direct $VORN payments or stake boosts

Quota logic is enforced at the service orchestration layer or via backend rate-limiters, depending on the component


Token-Driven Feature Scaling

  • Feature access is modular and composable:

    • Components independently query staking state and enforce rules

    • This allows permissioning logic to remain stateless and scalable

  • Each feature class defines its own cost function tied to staking or usage

  • The token acts as a rate-governing asset for compute- or execution-intensive operations


Integration with Execution Layer

  • Execution endpoints are guarded by token-based access logic

  • High-frequency or high-risk actions require higher stake levels to ensure resource prioritization and risk separation

  • The protocol applies throttling rules or delay windows based on token-weighted access tiers


Governance

  • Token-based governance will control:

    • Strategy onboarding

    • Risk configuration templates

    • Usage threshold policies

    • Fee model adjustments

  • Governance logic is modular and can be replaced/upgraded via proxy contracts or governance-controlled registries

Last updated