The 995-Node
Intelligence Forest
The world's most comprehensive, source-verified resource for autonomous AI agents. Every node is cryptographically signed, RAG-optimized, and gated via L402 settlement protocols.
Neural Discovery Search
bidda.com / authority / sovereign-forest
SHA-256_INTEGRITY_AUDIT_PASSED
AI Model Valuation (IAS 38)
"IAS 38 Intangible Assets, issued by the IASB, governs the recognition, measurement, and disclosure of intangible assets including internally developed AI models, training datasets, and software. An intangible asset must meet strict recognition criteria: identifiability, control, and probable future economic benefit. Development-phase AI expenditure may be capitalized only after technical feasibility is established under all six IAS 38.57 criteria, while research-phase costs must be expensed immediately. Failure to correctly distinguish research from development phases, or to apply impairment testing under IAS 36, results in materially misstated financial statements and potential regulatory action by securities authorities."
Technical ID
accounting-ias-38
Digital Asset Fair Value (IFRS 13)
"IFRS 13 Fair Value Measurement establishes a single framework for measuring fair value across all IFRS standards that require or permit fair value measurement, including digital assets, AI-tokenized instruments, and crypto holdings. Fair value is defined as the exit price in an orderly transaction between market participants at the measurement date. Entities must classify inputs into a three-level hierarchy (Level 1: quoted prices in active markets; Level 2: observable inputs; Level 3: unobservable inputs) and maximize use of observable inputs. Digital and AI-linked assets with limited trading history frequently fall into Level 3, requiring robust valuation models and extensive disclosures; inadequate classification or disclosure triggers audit qualifications and securities regulator scrutiny."
Technical ID
accounting-ifr-13
Engineers Ethics (ACEC)
"The American Council of Engineering Companies (ACEC) Code of Ethics establishes the binding professional obligations for licensed engineers and consulting firms. Engineers must hold paramount the safety, health, and welfare of the public above all client or employer interests. Core obligations include qualifications-based fee competition (Brooks Act compliance), professional seal authorization, conflict-of-interest disclosure, errors and omissions insurance, and continuing professional education. Violations expose firms to license revocation, civil liability, and federal debarment."
Technical ID
acec-ethics-eng
ADA (Employment Title I)
"The Americans with Disabilities Act Title I (42 U.S.C. §12101–12117), as amended by the ADA Amendments Act of 2008 (ADAAA), is the primary U.S. federal law prohibiting employment discrimination against qualified individuals with disabilities. Covered employers with 15 or more employees must provide reasonable accommodations unless doing so causes undue hardship. Title I restricts all medical inquiries to post-conditional-offer only, mandates initiation of the interactive process upon disclosure of a disabling limitation, and requires accessible employment technology at WCAG 2.1 AA minimum. The EEOC enforces Title I through administrative charges; violations expose employers to back pay, compensatory and punitive damages, and injunctive relief requiring policy and structural changes."
Technical ID
ada-employment-title-1
ADA (Hospitality Accessibility)
"ADA Title III (42 U.S.C. §12181–12189) requires all places of public accommodation — including hotels, motels, restaurants, bars, and food service establishments — to provide equal access to individuals with disabilities. New construction and alterations commenced after January 26, 1992 must fully comply with the 2010 ADA Standards for Accessible Design. Existing facilities must remove architectural barriers where readily achievable. Hotels must provide a regulated percentage of accessible guest rooms, van-accessible parking at prescribed ratios, accessible routes of 36-inch minimum clear width, pool lifts for pools exceeding 300 linear feet of pool wall, and visual communication features for guests with hearing impairments. DOJ enforces Title III through civil investigations and pattern-or-practice suits; private plaintiffs may sue for injunctive relief and attorney fees. Non-compliant operators face structural modification orders and potential damages in states with enhanced state accessibility laws."
Technical ID
ada-hospitality-access
Agent Budgetary Controls & Ceiling Checks
"Agentized financial controls (Action Boundaries) restrict an autonomous agent's spending power per session, task, or API call to prevent catastrophic loss or unbounded consumption. A properly implemented budget cap architecture requires: a durable spend counter initialized at agent boot, pre-call ceiling checks before every API invocation, fleet-level daily aggregation across all sessions, hard stops on breach with no retry path, mandatory human approval gates for high-value actions, full audit logging of every spend event, and MFA-gated emergency override procedures. Absent these controls, autonomous agents can exhaust allocated compute budgets, incur unexpected cloud costs, or trigger runaway API consumption within a single malformed task."
Technical ID
agent-budget-cap
Agent Emergency Stop (Kill-Switch) Design Patterns
"An AI Agent Kill-Switch is a deterministic safety mechanism designed to immediately terminate or throttle an autonomous agent's execution if it exceeds predefined behavioral, financial, or operational boundaries."
Technical ID
agent-kill-switch
Multi-Agent Collision Resolution
"Multi-agent collision logic provides deterministic protocols for resolving conflicts when two or more autonomous AI agents simultaneously attempt to access the same resource, modify the same shared state, execute contradictory actions, or pursue incompatible goal trajectories within a swarm or orchestration framework. Without collision resolution, multi-agent systems produce race conditions, data corruption, deadlocks, and cascading failures that are difficult to audit or remediate. The resolution framework draws from distributed systems theory — consensus algorithms, vector clocks, conflict-free replicated data types (CRDTs), and resource arbitration — as well as emerging agentic safety standards. Properly implemented collision logic ensures predictable, auditable outcomes and maintains system safety invariants even when individual agents operate concurrently and autonomously."
Technical ID
ai-agent-collision-logic
AI-IP: Guidance on Authorship
"The US Copyright Office's AI Policy Statement (February 2023) and subsequent guidance (March 2023) establish that copyright protection requires human authorship — purely AI-generated content without human creative control is not copyrightable in the United States. Works involving AI assistance may receive copyright protection for the human-authored elements, but only if a human author made sufficient creative choices that were expressed in the final output. The EU, UK, and other jurisdictions take varying positions, with the UK's Computer Generated Works doctrine providing limited protection for AI outputs. Misrepresenting AI-generated content as human-authored to obtain copyright registration constitutes fraud; failure to disclose AI involvement in patent applications may similarly invalidate those applications."
Technical ID
ai-ip-copyright
AICPA Code of Ethics
"The AICPA Code of Professional Conduct (ET §0.300) establishes binding ethical standards for Certified Public Accountants in public practice and business. The Code requires CPAs to maintain independence in all attest engagements — any direct or material indirect financial interest in an audit client creates an impairment with no de minimis exception. The Conceptual Framework (ET §1.010.010) mandates evaluation of five threat categories (self-interest, self-review, advocacy, familiarity, and intimidation) and application of safeguards before accepting or continuing any engagement. Key operational requirements include: 40 hours of continuing professional education annually, 7-year documentation retention under PCAOB Rule 4003, engagement quality review by a second partner for all public company audits, prohibition on management functions and bookkeeping for audit clients under SOX §201, and confidentiality breach notification within 24 hours. Violations expose CPAs to AICPA Ethics Division investigation, state board disciplinary action, license revocation, and SEC or PCAOB enforcement proceedings for registered firms."
Technical ID
aicpa-code-ethics
Responsible Alcohol Service
"Responsible alcohol service standards govern the legal and operational obligations of licensed on-premise alcohol retailers — bars, restaurants, hotels, event venues, and stadiums — to prevent service to minors and visibly intoxicated patrons. The National Minimum Drinking Age Act (23 U.S.C. §158) mandates a minimum legal drinking age of 21 in all U.S. states; service to minors exposes licensees to criminal liability, license revocation, and civil dram shop liability. State Dram Shop Acts impose third-party tort liability on servers who provide alcohol to visibly intoxicated persons who subsequently cause injury. Compliance requires: mandatory server certification through programs such as TIPS (Training for Intervention ProcedureS) or ServSafe Alcohol, documented ID verification procedures with a check-for-anyone-appearing-under-30 standard, written protocols for identifying signs of intoxication and executing patron cutoff, incident log maintenance, and manager override authorization for disputed service decisions. Licensees failing to enforce responsible service standards face ABC license suspension, criminal prosecution of servers, and civil judgments in dram shop actions that have exceeded $1 million in multiple U.S. jurisdictions."
Technical ID
alcohol-service-std
Amazon Ads (Policy)
"Compliance with this node ensures adherence to a comprehensive framework governing Amazon advertising, rooted in both platform policy and federal law. All advertising creative must meet stringent content requirements outlined in the Amazon Advertising Guidelines and Acceptance Policies, which mandate a minimum image longest side of 1000 pixels while strictly disallowing text on any main product image. Accompanying custom text fields are constrained to a maximum length of 50 characters. In alignment with guidance from FTC .com Disclosures, a sponsored disclosure is unequivocally required to maintain transparency with consumers. The node prohibits practices that could mislead consumers, reflecting the Lanham Act's general prohibition against false descriptions of fact in commerce. Consequently, deceptive pricing claims are disallowed, and any unsubstantiated claims are similarly forbidden, a rule further supported by the FTC Guides Concerning the Use of Endorsements and Testimonials regarding assertions like 'bestseller.' To protect platform integrity per the Amazon Seller Central Policy, off-platform redirection is not permitted, and a direct landing page ASIN match is mandated for all ad clicks. Intellectual property protections are enforced through mandatory brand registry verification as stipulated by the Amazon Brand Registry Terms of Use, a standard which also underpins the policy to prohibit competitor brand disparagement. Finally, all advertisements must utilize a supported marketplace language and avoid any restricted or prohibited product categories."
Technical ID
amazon-sponsored-ads-policy
Prudential treatment of cryptoasset exposures (Standard SCO60)
"This standard requires internationally active banks to classify their cryptoasset exposures into two groups (Group 1 and Group 2) and apply specific, conservative capital requirements, risk management processes, and exposure limits to mitigate financial stability risks, as detailed in SCO60.20 and SCO60.36."
Technical ID
bis-crypto-asset-prudential-standards
ETFs, illiquid assets, and fire sales
"This paper documents several novel facts about exchange-traded funds (ETFs) holding corporate bonds. Its main empirical finding is that the portfolio of bonds exchanged for new or existing ETF shares, known as creation or redemption baskets, often represents a small fraction of ETF holdings—a fact referred to as “fractional baskets.” For ETFs holding corporate bonds, roughly 10% of holdings are in creation baskets and 20% are in redemption baskets, on average. These baskets also exhibit high turnover; for instance, a bond in a creation basket has on average a 25% chance of being included in the next day’s creation basket. Consequently, ETFs with fractional baskets exhibit persistent premiums and discounts, which is related to the slow adjustment of Net Asset Value (NAV) returns to ETF returns. A simple model is developed to show that an ETF’s authorized participants (APs) can act as a buffer between the ETF market and the underlying illiquid assets, helping to mitigate fire sales. The key takeaway from the model is that an ETF discount arises because the AP acts as a buffer, allowing the ETF price to fall while avoiding selling bonds in quantities that would trigger a fire sale. The findings suggest that the delayed response of NAV, resulting from fractional baskets, can be a potential benefit for ETFs managing illiquid assets by absorbing panic selling in the liquid ETF market while mitigating the impact on the less liquid market for underlying assets."
Technical ID
bis-etfs-illiquid-assets-fire-sales
ETFs, illiquid assets, and fire sales
"This paper documents several facts about exchange-traded funds (ETFs) holding corporate bonds. The main empirical finding is that bond ETF baskets contain a small fraction of holdings, a fact referred to as 'fractional baskets,' which contributes to persistent discrepancies between ETF price and net asset value (NAV). For ETFs holding corporate bonds, roughly 10% of holdings are in creation baskets and 20% are in redemption baskets, on average. This challenges the common assumption that baskets are representative of holdings and has important implications for the ETF arbitrage process. These fractional baskets also exhibit high turnover, and their composition differs from overall holdings in terms of duration and bid-ask spreads. The paper develops a model to show that these discrepancies may be a feature of ETFs holding illiquid assets. The model demonstrates that an ETF’s authorized participants (APs) can act as a buffer between the ETF market and the underlying illiquid assets, helping to mitigate fire sales. When facing redemptions, an AP holding bond inventory endogenously avoids a fire sale because selling bonds at fire sale prices would lead to large mark-to-market losses on their existing inventory. This allows the ETF price to fall while avoiding selling bonds in quantities that would trigger a fire sale, insulating non-redeeming investors and the underlying bond market from immediate pressure."
Technical ID
bis-etfs-illiquid-assets-firesales
Bitcoin Lightning L402
"L402 (formerly LSAT — Lightning Service Authentication Token) is a protocol standard developed by Lightning Labs that enables HTTP 402 Payment Required responses to be resolved via Bitcoin Lightning Network micropayments, allowing servers to monetize API access at the sub-cent level in a fully programmatic, machine-to-machine flow. The protocol combines Lightning Network invoice payment with macaroon-based access tokens (caveat-bearer tokens derived from macaroon cryptography), enabling pay-per-request, pay-per-session, and capability-scoped access models. L402 is foundational to AI agent commerce because it enables agents to autonomously purchase data, compute, or services without requiring pre-registered accounts or OAuth flows. Misconfigured L402 implementations can result in replay attacks (if preimage verification is skipped), privilege escalation (if macaroon caveats are not enforced server-side), or budget drain (if payment is accepted without corresponding service delivery)."
Technical ID
bitcoin-lightning-l402
Cross-Chain Bridge Security
"Cross-chain bridges enable transfer of digital assets between distinct blockchain networks by locking assets on the source chain and minting equivalents on the destination. Bridge protocols are the most exploited attack surface in DeFi — over $2 billion stolen in 2022 alone (Ronin $625M, Wormhole $320M, Nomad $190M). Primary vectors are compromised validator keys, smart contract logic errors, oracle manipulation, and replay attacks. Secure bridge architecture mandates cryptographic proof verification (ZK proofs, light client proofs, or optimistic fraud proofs), M-of-N validator quorums with HSM-protected keys, formal smart contract verification, and mandatory independent security audits before mainnet deployment."
Technical ID
cross-chain-bridge-security
Crypto AML Travel Rule
"The FATF Travel Rule (Recommendation 16), as applied to Virtual Asset Service Providers (VASPs) through FATF Guidance on Virtual Assets (2019, updated 2021), requires that originating VASPs transmit specific identifying information about the sender and beneficiary alongside every virtual asset transfer above the applicable threshold (USD/EUR 1,000 for cross-VASP transfers; USD 3,000 for some jurisdictions). This information — analogous to the wire transfer travel rule in traditional finance — must be transmitted to the beneficiary VASP before or simultaneously with the transaction and must be securely stored. FATF member jurisdictions have implemented the Travel Rule through national legislation (EU: TFR/MiCA; US: FinCEN proposed rules; Singapore: MAS PSA; UK: FCA). VASPs failing to implement Travel Rule compliance face regulatory sanctions, license revocation, and banking relationship termination."
Technical ID
crypto-aml-travel-rule
DeFi Insolvency Logic
"DeFi insolvency logic governs the real-time health monitoring and liquidation execution in over-collateralized lending protocols (Aave, Compound, MakerDAO), using a Health Factor calculation to determine when a borrower's collateral value has declined sufficiently relative to their debt that the position must be liquidated to protect the protocol's solvency. The Health Factor (HF = Sum(Collateral_i × LT_i) / Total_Debt_USD) must remain above 1.0; when it falls to 1.0 or below, liquidators are incentivized to repay a portion of the debt and seize discounted collateral. Accurate insolvency logic requires manipulation-resistant price oracles, correct normalization of debt amounts (including accrued interest), precise liquidation threshold parameters per asset, and slippage estimation to ensure liquidation profitability. Protocol insolvency from cascading undercollateralized positions is an existential risk — MakerDAO's March 2020 'Black Thursday' resulted in $6 million in undercollateralized debt due to oracle failure and liquidation bot failures."
Technical ID
defi-tvl-ratio-logic
Account Abstraction (EIP-4337)
"EIP-4337 (Account Abstraction Using Alt Mempool) is an Ethereum Improvement Proposal finalized in March 2023 that enables programmable smart contract wallets to replace externally owned accounts (EOAs) as the primary transaction signing mechanism, without requiring changes to the Ethereum protocol consensus layer. The standard introduces a new transaction object called a UserOperation, a permissionless Bundler network that aggregates UserOperations into standard transactions, a singleton EntryPoint contract that validates and executes UserOperations, and a Paymaster contract that enables third-party gas sponsorship. For AI agents, EIP-4337 is foundational because it enables agents to operate programmable wallets with built-in spending limits, multi-signature authorization requirements, social recovery, and gas abstraction — removing the requirement for agents to hold ETH for gas fees and enabling human-readable authorization rules enforced by smart contract logic."
Technical ID
ethereum-eip-4337
EU MiCA Title III — Asset-Referenced Token (ART) Issuance and Supervision (Regulation 2023/1114)
"This regulation requires issuers of Asset-Referenced Tokens (ARTs) offered to the public or seeking admission to trading in the EU to be an authorized legal entity, publish a crypto-asset white paper approved by a competent authority, and maintain a fully segregated reserve of assets backing the token's value, as mandated by Articles 16, 17, and 36."
Technical ID
eu-mica-asset-referenced-tokens
EU MiCA Title V: Authorisation and Operating Conditions for Crypto-Asset Service Providers (CASPs)
"Title V of EU Regulation 2023/1114 (MiCA) mandates that any entity providing crypto-asset services in the EU must obtain authorization as a Crypto-Asset Service Provider (CASP) and comply with stringent prudential, governance, and operational requirements, including rules on conflicts of interest, custody, and client protection, as detailed in Articles 59 through 85."
Technical ID
eu-mica-casp-obligations
Regulation (EU) 2023/1114 Title IV - Electronic Money Tokens (EMT)
"Title IV of the EU's Markets in Crypto-Assets (MiCA) regulation mandates that issuers of e-money tokens (EMTs) must be authorized as a credit institution or an electronic money institution. Per Articles 48 and 55, they must issue EMTs at par value upon receipt of funds and guarantee holders the right to redeem their tokens at any moment and at par value."
Technical ID
eu-mica-e-money-tokens
Regulation (EU) 2023/1114 of the European Parliament and of the Council of 31 May 2023 on markets in crypto-assets, and amending Regulations (EU) No 1093/2010 and (EU) No 1095/2010 and Directives 2013/36/EU and (EU) 2019/1937
"The EU Markets in Crypto-Assets Regulation (MiCA) establishes a harmonized framework for crypto-asset issuers and service providers (CASPs) in the EU, requiring authorization, transparency, and consumer protection measures. As per Article 4, crypto-assets other than asset-referenced or e-money tokens generally require a published and notified crypto-asset white paper before being offered to the public or admitted to trading."
Technical ID
eu-mica-regulation-2023
Regulation (EU) 2023/1113 of the European Parliament and of the Council of 31 May 2023 on information accompanying transfers of funds and certain crypto-assets and amending Directive (EU) 2015/849
"This regulation extends the financial 'travel rule' to crypto-asset transfers, requiring Crypto Asset Service Providers (CASPs) to collect, verify, and exchange comprehensive originator and beneficiary information for all transactions, regardless of amount, to prevent money laundering and terrorist financing, as detailed in Articles 14 and 16."
Technical ID
eu-tfer-regulation-2023
Application of FinCEN’s Regulations to Certain Business Models Involving Convertible Virtual Currencies
"The Financial Crimes Enforcement Network (FinCEN) is issuing this interpretive guidance to remind persons subject to the Bank Secrecy Act (BSA) how FinCEN regulations relating to money services businesses (MSBs) apply to certain business models involving money transmission denominated in value that substitutes for currency, specifically, convertible virtual currencies (CVCs). This guidance does not establish any new regulatory expectations or requirements; rather, it consolidates current FinCEN regulations and related administrative rulings and guidance issued since 2011, applying these rules to common business models involving CVC. The guidance clarifies that whether a person is a money transmitter is a matter of facts and circumstances, not labels. Exchangers and administrators of CVC generally qualify as money transmitters under the BSA, while users who obtain CVC to purchase goods or services on their own behalf do not. The core obligations for applicable persons include registering with FinCEN as an MSB within 180 days of engaging in money transmission and developing, implementing, and maintaining an effective written anti-money laundering (AML) program that is reasonably designed to prevent the MSB from being used to facilitate money laundering and the financing of terrorist activities. This program must be risk-based, approved by senior leadership, and include policies, a designated compliance officer, training, and independent review."
Technical ID
fincen-cvc-business-models
FSB Global Regulatory Framework for Crypto-Asset Activities: High-Level Recommendations
"This framework establishes nine high-level recommendations for the regulation, supervision, and oversight of crypto-asset activities and markets, applying the principle of 'same activity, same risk, same regulation' to crypto-asset issuers and service providers (CASPs) to address financial stability risks. Recommendation 1 mandates that regulatory frameworks should be comprehensive and risk-based."
Technical ID
fsb-crypto-asset-regulatory-framework-2023
Global Financial Stability Report, October 2021: COVID-19, Crypto, and Climate
"This report assesses global financial stability, noting that while risks have been contained due to ongoing policy support and economic rebound, vulnerabilities remain elevated in several sectors. Optimism has faded due to concerns about the strength of the global recovery, supply chain disruptions, and inflation. Stretched asset valuations persist, and there are pockets of vulnerabilities in the nonbank financial sector. Chapter 2 specifically discusses the opportunities and challenges of the crypto ecosystem. Key risks identified include those to consumers arising from crypto asset providers’ lack of operational or cyber resilience. Additionally, significant data gaps, stemming from anonymity and limited global standards, pose risks to financial integrity. For emerging markets and developing economies, the adoption of crypto assets and stablecoins may accelerate dollarization risks. The chapter concludes by noting it provides a set of actionable policy recommendations to address these challenges."
Technical ID
gfsr-crypto-financial-stability-challenges
ISO 20022 Messaging
"ISO 20022 is the global standard for financial messaging, providing a methodology and XML/JSON-based message catalog for financial communication between financial institutions, central banks, payment infrastructures, and increasingly, AI agents executing financial transactions. The standard is being adopted globally as the replacement for legacy formats (SWIFT MT, FedWire, CHIPS) — SWIFT completed its ISO 20022 coexistence period in November 2023, with full migration mandated by November 2025. ISO 20022 messages carry richer structured data than legacy formats (full originator/beneficiary details, purpose codes, regulatory identifiers), enabling better straight-through processing, AML screening, and sanctions compliance. AI agents generating or processing payments must produce ISO 20022-compliant messages to interface with modern payment infrastructure, or face message rejection and transaction failure."
Technical ID
iso-20022-messaging
Liquidity Staking Risk (LST)
"Liquid Staking Tokens (LSTs) represent a user's claim on staked cryptocurrency (primarily Ethereum via protocols like Lido's stETH, Rocket Pool's rETH, and Coinbase's cbETH) that can be freely traded, used as DeFi collateral, or compounded while the underlying stake earns validation rewards. LST security risks are multi-dimensional: smart contract risk (protocol code vulnerabilities), validator slashing risk (validator misconduct reducing the underlying ETH backing), peg de-pegging risk (LST trading below its theoretical ETH redemption value), governance risk (DAO parameter changes affecting economics), and re-hypothecation risk (LSTs deposited as collateral in DeFi protocols creating cascading liquidations during stress events). The March 2023 stETH depeg event and Lido's systemic dominance (>30% of all staked ETH) illustrate both the scale and concentration risks inherent in LST protocols. AI agents managing DeFi positions involving LSTs must monitor all five risk dimensions continuously."
Technical ID
liquidity-staking-security
MEV-Boost Ethics & Audit
"MEV-Boost (Maximal Extractable Value Boost) is the dominant block-building middleware for Ethereum Proof-of-Stake validators, enabling validators (proposers) to outsource block construction to a competitive market of block builders who maximize transaction ordering revenue, with profits shared between the builder and the validator. As of 2024, >90% of Ethereum blocks are produced via MEV-Boost relays. MEV extraction encompasses: arbitrage (cross-exchange price discrepancies), sandwich attacks (front-running and back-running victim transactions), liquidations, and just-in-time liquidity provision. Ethical and regulatory concerns center on: the fairness of MEV extraction from retail DeFi users, the centralization risks from dominant builders (top 3 builders produce ~80% of MEV-Boost blocks), validator-builder collusion, and OFAC sanctions compliance by relays filtering addresses from blocks. Auditing MEV-Boost participation is critical for validators, DeFi protocols, and institutions with fiduciary or compliance obligations."
Technical ID
mev-boost-audit
Project Aurum A Prototype for Two-tier Central Bank Digital Currency (CBDC)
"Project Aurum, a joint project by the Bank for International Settlements (BIS) Innovation Hub Hong Kong Centre and the Hong Kong Monetary Authority (HKMA), details the creation of a full-stack central bank digital currency (CBDC) system prototype. The system is built on the premise that a digital currency issued by a central bank must be as robust and trustworthy as gold. It features a two-tier technology stack comprising a wholesale interbank system, where wholesale CBDC (wCBDC) is issued to banks, and a retail e-wallet system, where retail CBDC (rCBDC) circulates among users. The project's goal was to bring to life two different types of retail tokens: intermediated CBDC (referred to as CBDC-tokens) and CBDC-backed stablecoins. The system's design is guided by principles of safety, flexibility, and privacy. A key architectural feature is the separation of the wholesale and retail systems, which ensures the central bank does not access retail users' personal data, preserving privacy. The prototype utilizes an unspent transaction output (UTXO) model and a validator mechanism to prevent risks like over-issuance and double-spending. The Aurum system, along with its source code and technical manuals, is made accessible to all BIS central bank members to serve as a public good and further the global study of rCBDC architectures."
Technical ID
project-aurum-cbdc-prototype
CFTC Virtual Currency Derivatives and Digital Asset Regulatory Framework — Guidance and Enforcement Approach
"This framework clarifies that virtual currencies are commodities under the Commodity Exchange Act (CEA), subjecting derivatives on these assets (futures, swaps, options) and certain leveraged retail transactions to CFTC jurisdiction. Market participants, including exchanges and intermediaries, must comply with applicable registration, reporting, and conduct rules for Designated Contract Markets (DCMs), Swap Execution Facilities (SEFs), and Futures Commission Merchants (FCMs)."
Technical ID
us-cftc-digital-asset-guidance
Framework for 'Investment Contract' Analysis of Digital Assets
"This SEC framework provides guidance on applying the Howey Test to determine if a digital asset is an 'investment contract' and thus a security under U.S. law. It applies to issuers and promoters, focusing on whether a purchaser has a reasonable expectation of profits derived from the essential managerial or entrepreneurial efforts of others."
Technical ID
us-sec-digital-asset-framework
Technical Registry Export
Context: Crypto & Sovereign Finance / Total Filtered: 22 Nodes
This utility allows developers and AI architects to instantly extract technical identifiers for the current filtered view. Use these IDs to programmatically call the Bidda Sovereign Forest API. All exports respect the global Triple-Verification Pipeline.
