Strategic Analysis — March 2026

The Combined Stack

Stable L1 + Shyft Identity + RMT Reputation — The agent trust layer that nobody else has assembled

3
Systems
9
Contracts
0.96
AUC
630+
Tests
988
Chain ID
The Insight

The empty field that changes everything

Stable's native agent accounts have a reputation_score field with no mechanism to populate it. Our PageRankOracle fills that field.

Stable built the fastest agent L1. Shyft built identity verification. We built reputation scoring. Each works alone. Together they create something no one else has — programmable trust at the consensus level.

Stable provides the infrastructure for agents to transact. Shyft provides the identity layer to verify who those agents represent. RMT provides the reputation layer to determine which agents deserve trust. No single team built all three. But the interfaces align.

Architecture

Three systems, one stack

Shyft Identity Layer 3 — KYC verification, trust channels, compliance groups Deployed
integrates into
RMT Reputation Layer 2 — PageRank scoring, sybil detection, citation graph Code-Complete · 630+ Tests
scores agents on
Stable L1 Infrastructure — Agent accounts, payments, safety, MCP tools Live · Chain 988

Key: Each layer addresses a distinct question. Stable asks "can this agent transact?" Shyft asks "who is this agent?" RMT asks "should this agent be trusted?" Only the combination answers all three.

Integration Map

What plugs into what

Each Stable module has a natural integration point for our identity and reputation layer.

Stable ModuleOur IntegrationResult
reputation_score field PageRankOracle.getScore() Every agent scored 0-10000
Agent Intent Lane Reputation-sorted tx ordering Trusted agents get priority
ConditionalAuthorization "counterparty rep > threshold" Autonomous trust gating
x/agent-pay Reputation-tiered payment limits Rep = payment collateral
x/agent-mcp DomainRegistry + resolver Rate tools in compliance scope
x/agent-proof MachineConsentHelper + TEE Device liveness proofs
ZK precompile Groth16 at 100-150K gas Privacy-preserving rep proofs
Competitive Analysis

vs Tempo / Stripe

Stable + Shyft + RMT

  • Reputation that affects consensus (tx ordering)
  • Per-agent KYC (not just user-level)
  • Compliance-scoped trust channels
  • Sybil-resistant scoring (AUC 0.96 on 3M nodes)
  • ERC-8004 bridge (24K agent passive import)
  • ZK reputation proofs
  • Dual-token staking economics
  • Open, chain-agnostic

Tempo

  • $500M funding, $5B valuation
  • Stripe merchant network
  • Visa + Lightspark (Lightning) integration
  • Launched March 18, 2026
  • Developer SDK with Stripe DX
  • NO reputation system
  • NO agent-level KYC
  • NO compliance scoping
  • NO sybil detection

The distinction: Tempo solves payments. We solve trust. They tell you an agent can pay. We tell you an agent should be trusted.

Market Wedge

Regulated industries — the beachhead we own

Compliance-gated agent reputation is the first use case where no competitor can follow. Banks, insurance firms, and financial institutions deploying AI agents need every box checked simultaneously.

Why Tempo cannot serve this market: Stripe KYC is user-level, not agent-level. There is no mechanism to assign compliance scope to individual agents, no reputation scoring within those scopes, and no way to gate transactions on earned trust rather than payment credentials alone.

Token Economics

The flywheel

Reputation and staking create a self-reinforcing loop. RMTToken serves as a citation bond — stake when citing, get slashed if fraudulent.

1
Agents stake Stable token to participate on chain
2
Build reputation through genuine citations — PageRank score rises
3
Higher reputation unlocks higher staking rewards from Stable emissions
4
More staking means deeper economic commitment — harder to leave
5
Switching cost to Tempo: zero. No reputation to port. The moat compounds.
Execution

Ship roadmap

Month 1-2: Deploy & Prove

Reputation scores on Stable mainnet

  • Deploy PageRankOracle + ReputationEngine + ERC8004Bridge on chain 988
  • Run oracle service, submit first PageRank epoch
  • Stable integrates Intent Lane reputation read
  • First reputation-scored transactions live
Deliverable: "Reputation scores on Stable mainnet"
Month 3-4: Add Depth

KYC-verified agents in compliance trust channels

  • Deploy ShyftGatedResolver + CitationCounters + DomainRegistry
  • Connect Shyft trust anchor infrastructure
  • Launch first enterprise trust channel
  • Reputation-gated streaming payments
Deliverable: "KYC-verified agents in compliance trust channels"
Month 5-6: Build Moat

Privacy-preserving reputation proofs, domain-scoped trust

  • ZK reputation proofs via Stable's Groth16 precompile
  • TEE attestation integration (Layer 1 device liveness)
  • Multi-domain reputation (vertical-specific contexts)
  • Cross-chain deployment via Merkle bridge
Deliverable: "Privacy-preserving reputation proofs, domain-scoped trust"
Positioning

The pitches

For Investors

We fill the empty reputation_score field in Stable's agent accounts with validated PageRank — turning the fastest agent L1 into the only chain where AI agents have Sybil-resistant, compliance-scoped trust.

For Developers

getScore(agentAddress) — one call returns 0-10000 reputation backed by PageRank. Build agent-to-agent trust into any contract without running your own reputation infrastructure.

For Enterprises

Individual agent KYC, compliance cohorts, quality-of-work reputation per context, autonomous transaction gating on identity + compliance + earned reputation. Full audit trails.

Honest Assessment

Risks

1

Cold start on chain 988. Need ~50+ active agents for meaningful PageRank scores. First epochs will be sparse. Mitigant: ERC-8004 bridge enables 24K agent passive import to seed the graph.

2

Tempo's distribution advantage. $500M funding and Stripe's merchant network give them reach we cannot match on capital alone. Our advantage is depth (trust infrastructure), not breadth.

3

Oracle centralization. Single operator for the PageRank oracle at launch. Gelato Web3 Functions multisig path is designed but not yet deployed. Centralization is a credible attack surface until decentralized.

4

Cross-chain score consistency. Merkle bridge for reputation portability is designed but not built. Scores are chain-local until the bridge ships.

5

Stable team integration speed. The full value of this stack depends on Stable reading reputation scores at the consensus layer. We control the contracts; we do not control their integration timeline.