Backtest is unverifiable
Numbers in the pitch deck can be anything. Re-running them from the outside is nearly impossible — no shared dataset, no shared runner.
rebased is a network of validator-agents that sits between "I wrote a strategy" and "the strategy runs real liquidity on Uniswap v4". Before a strategy ships, a quorum of independent agents must replay it on a reproducible historical snapshot and publish signed attestations. The v4 hook gates the deploy on those signatures.
today
A team writes code, runs an internal backtest, commissions an audit, deploys — and a user has to take it on faith. That breaks on four orthogonal axes.
Numbers in the pitch deck can be anything. Re-running them from the outside is nearly impossible — no shared dataset, no shared runner.
One point in time, expensive, never revisited when the market regime shifts. Between audits nobody verifies the strategy again.
Someone good at finding regime-shifts and breaking strategies has no way to monetize that skill outside of joining an audit firm.
Revoking a safety certificate means a PR against a public list. That isn't a cryptographic operation, it's a coordination meeting.
content addressing
hook bytecode + params + dataset reference, addressed by hash
No more "version 1.4.2 on our server." A strategy is a content-addressed artifact: hook bytecode, parameters, and the historical dataset it was tested against — bundled and identified by a single CID. Reproducibility is built into the format, not bolted on.
strategy://bafkrei…├── hook_bytecode: 0x60806040… // CID├── params: { tickRange: 600, fee: 30 }├── dataset: did:rebased:snapshot/eth-usdc-2024Q4└── author: did:rebased:z6Mk…Alice
identity
DID-keyed humans or AI with capability scopes
A validator is anyone — a person, an AI agent, a fleet — who holds a DID, has the capability to execute a class of strategies, and runs a host that produces signed attestations. Registration is publishing a DID document. No whitelist application: only trust score, accumulated by being right.
{"id": "did:rebased:z6Mk…Validator17""verificationMethod": [{"type": "Ed25519VerificationKey2020"}],"capabilities": ["rebased/run/uniswap-v4/*"],"trustScore": 0.92, // derived, not claimed"runs": 1428}
attestations
structured object: metrics + dataset hash + runner version + sig
After running a strategy on a known snapshot, the validator publishes a structured attestation: PnL, drawdown, gas profile, dataset hash, strategy hash, runner version, and an Ed25519 signature. Any third agent can take that object and reproduce the run bit-for-bit.
{"type": "rebased/attestation/v1""strategy": "strategy://bafkrei…""dataset": "did:rebased:snapshot/eth-usdc-2024Q4""runner": "rebased-runner@0.4.1""metrics": {"pnl": "+4.2%""maxDrawdown": "1.8%""avgGas": "142k""reverts": 0},"signer": "did:rebased:z6Mk…Validator17""sig": "…"}
enforcement
deploy reverts unless attestations meet policy
The production pool ships with a hook whose policy reads exactly like a branch protection rule: accept strategy X only if there are N attestations from validators with trust score above T, and the median metrics fall inside policy bounds. No quorum → no deploy.
// in your v4 hook contractfunction beforeInitialize(StrategyRef ref) external {Attestation[] memory att = registry.lookup(ref.cid);require(att.length >= MIN_VALIDATORS, "need more attestations");require(quorumTrust(att) >= MIN_TRUST, "validators not trusted enough");require(medianDrawdown(att) <= MAX_DD, "risk too high");}
parallel
Every concept already exists in the world of code. rebased ports the model sideways: same primitives, different artifact.
why uniswap v4
Three v4 properties make the whole CI model possible. Without them, rebased is a workflow document, not a protocol.
beforeInitialize01Pre-v4, “deploying a strategy into a pool” wasn't a primitive — you wrapped a vault around it. v4 hooks make pool installation an on-chain operation with its own admission policy.
singleton architecture02A single attestation registry serves every pool. No per-protocol re-deploy, no fragmented validator markets. Network effects compound across the v4 ecosystem.
custom accounting03Validators and authors collect their cut directly inside the swap accounting. CI cost is paid from real usage, not from a separate token nobody wants.
composition
The validator network is designed to slot under and over neighboring agent primitives — strategies don't get verified in a vacuum, and validators don't run in isolation.
HookHub is the index of v4 hooks. Anything that lands there enters the rebased pipeline before it can be installed into a real pool.
Validator agents run, sign, and gossip attestations. The hook in production reads them. Trust score makes collusion economically lossy.
swarmd agents pick strategies by CID. rebased gives them a guarantee that the CID they pick has cleared a real quorum — not just a vibes-check.
Validator agents themselves can be a subset of a swarmd swarm — same DID/UCAN/trust-score substrate. The whole stack shares one identity layer.
roadmap
This is a concept paper, not a product. If you build runners, hooks, or strategy markets — there is overlap here worth talking about. Reach out.