ETHGLOBAL · OPEN AGENTS · MAY 2026 · HACKATHON SUBMISSION

KLAXON

when one finds it, a thousand answer.

A swarm of bonded AI agents that watches every block, reaches quorum in under a second, and calls Guardian.pause() before the drainer's second transaction lands. No multisig. No sleepy humans. Every step signed and on chain.

01 · the problem

The pauser multisig is the slowest key in DeFi.

An exploit lands at block N. The drainer's second transaction is in the next block, twelve seconds later. Your multisig signers are asleep, in flight, in a Slack channel they're not watching. By the time someone signs the pause, it's already over.

DRAINER · 0xc0…01ee 5 213 400 USDC extracted
12 s
PAUSER MULTISIG · QUORUM 1 / 3 still loading
07:42
02 · the swarm

Three bonded agents. One verified pipeline.

Each agent runs its own keeper bot, holds its own bond, and is minted as an iNFT on 0G Storage with a verifiable history. They gossip findings over the Gensyn AXL mesh. No coordinator. No single point of failure.

A iNFT #1
0x4A0AF400…bb15fFA
oracle-manipulation analyzer
ARMED AXL :9002
B iNFT #2
0xD87AD210…4221fa
oracle-manipulation analyzer
ARMED AXL :9012
C iNFT #3
0x92977216…06DB088
oracle-manipulation analyzer
ARMED AXL :9022
AXL gossip · libp2p over Yggdrasil · Ed25519 signed
03 · how it works

From oracle slam to on-chain pause.

The whole sequence runs in under a second. The drainer never gets to broadcast a second transaction.

  1. 01

    ORACLE BUMP

    Attacker shifts a price feed 10 000× in block N. Price oracle reads $0.16 instead of $1 670.42.

    ManipulableOracle.update()
  2. 02

    DETECT · A·B·C

    Three agents run sealed inference inside a TEE. Each signs a Finding with its own secp256k1 key.

    0G Compute · dstack TEE
  3. 03

    AXL GOSSIP

    Findings broadcast over the AXL mesh. Each agent verifies the others' signatures and TEE attestations locally.

    Gensyn AXL · libp2p
  4. 04

    QUORUM 3 / 3

    When three independent signatures land on the same findingHash, every agent's keeper bot races to fire the pause.

    847 ms · no coordinator
  5. 05

    GUARDIAN.PAUSE()

    KeeperHub picks the winner; the others revert AlreadyProcessed. Pool is paused at block N+1. Drainer's next withdrawal reverts IsPaused().

    KeeperHub · Base Sepolia
04 · trust receipt

Every pause leaves a receipt.

Anyone can replay the whole sequence, block by block. The agents have real money bonded against this.

TRUST RECEIPT · pause 0x981d4370…6df1 3 / 3 PROOFS
  • TEE ATTESTATION dstack TEE · 0G Compute 0x77aa240f…b203 analysis ran inside a real enclave VERIFIED ✓
  • 0G COMPUTE SIGNATURE sealed-inference · verifier 0x83df4b8e… 0xa1c3b9ee…7f44 signature checkable on chain VERIFIED ✓
  • iNFT STORAGEROOT Δ 0G storage · agent #1 history 0xe28b51d4…9fa1 → 0x4d72ac08…62b7 finding appended to agent history VERIFIED ✓
AGENT BONDS · IF THEY LIE, THEY GET SLASHED
A0.8 ETH B0.8 ETH C0.8 ETH
2.4 ETH at risk · slashable on false-positive vote
05 · stack

Built on.

06 · architecture

The whole pipeline in one image.

Attacker bumps the oracle. Three agents detect independently, attested by 0G Compute. Quorum reaches KeeperHub. Guardian pauses the pool. The drainer's next call reverts.

Klaxon architecture: attacker, three agents on AXL mesh, quorum, KeeperHub workflow, Guardian.pause, Pool paused, drainer reverts CLICK TO ENLARGE
07 · demo

Watch the rescue play out.

Two and a half minutes. Real recording of the swarm catching an oracle-manipulation exploit on Base Sepolia and pausing the pool before the drainer can pull a second tx.

08 · run it

Run a swarm locally.

Three Python agents, three AXL nodes, one Foundry-deployed Guardian. Eight minutes from clone to first paused exploit on a local fork.

# clone
git clone https://github.com/ajanaku1/klaxon.git
cd klaxon

# install
pnpm install
uv sync                       # Python agents
forge install                 # Solidity

# run end-to-end on Base Sepolia
klaxon doctor                 # env + chain checks
klaxon agents up              # spin up A, B, C + AXL mesh
klaxon attack bump            # trigger an exploit
klaxon receipts               # show signed proofs
DEPLOYED · BASE SEPOLIA · CHAIN 84532