Simplify Your
Transaction Prerequisites
Define rules for onchain interactions. Owned by your community, powered by the Predicate Network.
Define rules for onchain interactions. Owned by your community, powered by the Predicate Network.
The Fundamentals
Define predicates to build rules and policies, integrating expressive pre-transaction logic into decentralized applications
Predicate
Rule
Policy
Predicate
Rule
Policy
Use Cases
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
Anti-Money Laundering
Dynamically prevent assets originating from high-risk entities
Collateral Verification
Attest to on and offchain collateral requirements
Mitigate Exploits
Mitigate stolen funds from being moved through your application
Anomaly Detection
Prevent abnormal transactions from executing and exploiting your application
Integrated Identities
Seamlessly incorporate multiple identity solutions
Rate Limiting
Limit or set parameters for transaction volume
How It Works
An open, verifiable, and ownable framework to build policies
Your Interface
User
Predicate
Middleware
Operator Network
Ethereum
Your Protocol
Predicate Library
Predicate Contracts
01
Submit Transaction
After a user action, the application interface submits a request to the Predicate Middleware containing the transaction information
02
Broadcast to Network
The Predicate Middleware broadcasts transaction information to the Predicate Operator Network
03
Validate and Sign
The Operators verify that the transaction adheres to the application’s policy, sign a response, and send signatures back to the Middleware
04
Aggregate and Submit
The application interface nests the aggregated signatures into the transaction and prompts the user to sign and submit It onchain
User
Your Interface
Predicate
Middleware
Operator Network
Ethereum
Your Protocol
Predicate Library
Predicate Contracts
01
Submit Transaction
After a user action, the application interface submits a request to the Predicate Middleware containing the EVM Transaction Object