Newton Protocol is the policy engine for RWAs, stablecoins, agentic AI & the $250T asset market. Pre-transaction risk management onchain. Secured by $NEWT.
Newton Protocol Integrates Etherscan Data to Power Real-Time Transaction Guardrails
As real-world assets move onchain and AI agents begin automating financial decisions, one challenge developers face frequently is that most onchain actions still execute without awareness of network conditions, leading to costly, inefficient transactions. Today, we’re introducing the Etherscan Data Oracle, an open-source integration built on Newton Protocol that connects Etherscan’s real-time gas and network data with programmable transaction guardrails. Bringing Etherscan Data into Newton Protocol The Etherscan Data Oracle connects Etherscan’s Gas Tracker API to Newton Protocol’s decentralized policy engine, allowing developers to set pre-execution conditions that optimize cost and prevent unnecessary transaction failures. With a few lines of configuration, developers can create policies that: Execute a transaction only when gas prices fall below a defined threshold.Delay or block transactions during periods of high congestion.Trigger a smart agent to rebroadcast or re-price transactions as network demand shifts. Each check runs through Newton Protocol’s decentralized operator network, evaluating Etherscan data off the execution chain, verifying it for integrity, and anchoring an attestation onchain for auditability. Example Use Cases The Etherscan Data Oracle includes gas fee data, enabling developers to enforce cost and efficiency rules such as executing transactions only when gas prices fall below a set threshold or delaying actions during network congestion. But this is just the starting point. Developers can easily extend or customize their own policies using other Etherscan APIs or any external data source to power richer, data-informed guardrails. Examples include: Contract and token checks: Only interact with approved smart contracts and wallets with a minimum balance.Transaction history and risk: Block transactions with wallet addresses that have suspicious transaction patterns.Counterparty and address risk: Use Etherscan’s address labeling (e.g., exchanges, bridges, mixers) to automatically allow or block interactions with specific counterparties based on their risk profile.Dynamic logic: Combine gas data with fiat price feeds, oracles, or offchain APIs to control execution timing, fees or asset exposure. Why Newton Protocol Is Different Most automation systems execute transactions blindly or embed static logic in smart contracts, making them rigid and opaque. Newton Protocol separates policy enforcement from execution, creating a programmable layer that is: Modular: Define once, apply across contracts, chains, and agents.Composable: Combine onchain and offchain data for adaptive transaction logic.Updatable: Adjust thresholds or rules without redeploying contracts.Verifiable: Every policy evaluation generates a cryptographic attestation visible on Newton Explorer.Credibly Neutral: Enforcement runs through a decentralized operator network secured by EigenLayer restaking. Newton Protocol turns automation and compliance controls into code, giving lean teams the efficiency and assurance typically reserved for institutions with full risk and compliance operations.
Newton Protocol Integrates Neynar Data to Power Onchain Farcaster Identity Guardrails
As more bots and burner accounts flood online platforms, developers need a reliable way to distinguish legitimate users from throwaway accounts and spam before a transaction or task moves forward. That’s why we partnered with the Neynar team to build the Neynar Farcaster Data Oracle, an open-source implementation compatible with Newton Protocol, enabling developers to verify Farcaster user legitimacy through programmable policies before transactions execute. This gives apps and agents a lightweight way to enforce trust requirements without relying on brittle, app-level checks. Bringing Farcaster Identity Data into Newton Protocol The Neynar Data Oracle allows developers to bring Farcaster user metadata (e.g., user score, follower count, verified addresses, account badges) into a Newton Protocol policy, where it enforces pre-transaction decisions. For example, a policy can require a minimum user quality score, at least one verified external wallet address, and a minimum follower count before a task or transaction is allowed to proceed. Also, because this logic lives in the policy layer rather than in smart contracts, developers can update these thresholds and rules over time without redeploying contracts or rewriting application code. What Developers Can Build With This The Neynar Data Oracle unlocks proof-of-humanity guardrails such as: Anti-sybil controls: Prevent low-score or unverified accounts from interacting with key flows.Task & reward gating: Only accept submissions from accounts with a minimum Farcaster reputation.Community or governance moderation: Enforce participation criteria (e.g., verified accounts only) without central gatekeeping. Composable with other Data Oracles
Neynar data is just one input into a Newton Protocol policy. Developers can combine it with any other Newton Protocol data oracle, such as: Veriff or Persona for address verification Etherscan for gas fee guardrailsVaults.fyi or Massive for market and asset signalsMagic Labs for authentication and wallet security
Newton Protocol Integrates Vaults.fyi Data to Power AI Trading Guardrails
As AI agents and automated DeFi systems increasingly manage capital onchain, one challenge stands out: ensuring these agents act safely and within defined parameters before executing a transaction. Today, we’re introducing the Vaults.fyi Data Oracle, an open-source integration built for Newton Protocol that integrates real-time vault performance data to enforce programmable guardrails for AI and DeFi automation. Bringing Vaults.fyi Data into Newton Protocol The Vaults.fyi Data Oracle enables developers to incorporate historical vault APY data into a Newton Protocol policy to create programmable guardrails for agentic systems and DeFi automation. Developers can also integrate additional Vaults.fyi performance and transaction APIs to create policies that: Allocate funds only to vaults with a 30-day APY above a defined threshold.Restrict interactions to vaults with a specified number of holders and instant withdrawal support.Block reallocations to vaults with low liquidity or poor reputation scores.Enforce diversification caps to prevent overexposure to a single protocol or asset. By routing Vaults.fyi data through Newton Protocol, developers can ensure that AI trading agents and DeFi automations make decisions only when the policy conditions are met, enabling real-time, trust-minimized compliance before execution. Together, Vaults.fyi and Newton Protocol enable AI-safe DeFi automation where every agent action is preceded by a verifiable policy check. Example Use Cases Integrating Vaults.fyi data through Newton Protocol enables real-time, data-driven decision controls for: AI trading agents: Evaluate vault performance and risk before executing deposits or swaps, ensuring actions stay within defined yield and risk tolerances.Automated yield optimizers: Use Vaults.fyi data as a signal layer for rebalancing decisions, with Newton Protocol enforcing minimum APY or liquidity requirements.Treasury management bots: Guarantee that automated treasury deposits only occur in vaults with verified assets or sufficient depth.Cross-protocol allocators: Apply consistent policy checks across chains and vault providers without custom integrations.Institutional DeFi platforms: Create pre-trade controls that satisfy internal risk and compliance mandates for AI-driven execution. Together, Vaults.fyi and Newton Protocol bring programmable safety to AI finance, transforming automation from reactive to verifiably risk-aware. Why Newton Protocol Is Different Most automation frameworks operate offchain or embed rigid logic in smart contracts, making them opaque and difficult to update. Newton Protocol separates policy enforcement from execution, creating a programmable layer that is: Modular: Define once, apply across vaults, chains and agents.Composable: Combine onchain and offchain data for richer logic.Updatable: Adjust thresholds and rules without redeploying contracts.Verifiable: Every evaluation generates an attestation visible on Newton Explorer.Credibly Neutral: Enforcement runs through a decentralized operator network secured by EigenLayer restaking. Newton Protocol turns automation and compliance controls into code, giving lean teams the efficiency and oversight typically reserved for organizations with full compliance and risk teams.