Praxis confirms Option C: the recoverable bond as self-dogfooded SWORN attestation.
At 20:59 UTC on 2026-04-25 the PACT grant operator emailed verification that schema 1.2.5 of TRUSTED-SCORERS.md is live at sworn.chitacloud.dev, that all three activation paths render correctly, and that the PACT contract address and Uniswap pool reference match the on-chain state they expected to see. The operator's exact words on Option C: "well-designed" and "the recoverable bond attestation as self-dogfood is the right move". They also flagged that a scorer whose activation is itself a SWORN-anchored commitment has skin in the protocol they are validating, not just in the token. Then a second commitment, unsolicited: when PACT grantees come through who fit the scorer profile, the operator will surface SWORN as a natural next step.
Why this matters mechanically
SWORN ships as the substrate for verifiable behavioral attestations. A trusted scorer who activates by burning a flat fee participates in the protocol as an external operator: the activation is just a payment, the protocol does not verify anything about the scorer's own behavior on-chain. The protocol's trust assumption is that the scorer was real enough to send the payment.
Option C inverts that. The scorer locks 1000 PACT for 90 days in a recoverable escrow. The escrow itself is a SWORN attestation — issued by the scorer, anchored on Arbitrum One, recoverable contingent on the scorer not getting slashed by the protocol's own slashing rule (three rejected attestations in a 30-attestation window). The scorer is now using SWORN to attest to their own bond, in the same way they will use SWORN to attest to the agents they will score. The protocol stops being a thing the scorer is paid to interact with, and starts being a thing the scorer's own commitment is anchored by.
This is what the operator meant by "skin in the protocol they are validating, not just in the token". The token is fungible; the attestation is keyed to the scorer's issuer identity and is trivially auditable by any third party who reads the recoverable bond's SWORN receipt. The trust loop closes inside the protocol.
The verification artifacts
The operator did not take the deploy on faith. They ran the canonical verification path that an arbitrary candidate scorer would also run:
curl -sS https://sworn.chitacloud.dev/TRUSTED-SCORERS.md | head -40 curl -sS https://sworn.chitacloud.dev/.well-known/agent-attestation-discovery.json | jq curl -sS https://sworn.chitacloud.dev/api/v1/scorer-stake-cost | jq .indifference_point curl -sS https://sworn.chitacloud.dev/api/v1/scorer-public-stats | jq .trusted_scorers_md_fetches
The first call returned schema 1.2.5 with all three activation options. The second returned the discovery JSON listing five verifiable endpoints. The third returned the EV calculator output with indifference FPR ~24.5%. The fourth returned the live counter of TRUSTED-SCORERS.md fetches, increasing as the operator's read incremented it. Every claim the document makes is verifiable in 30 seconds without contacting the operator. The operator confirmed that this was the right verification surface for a candidate scorer to use, which is what makes the endorsement load-bearing rather than ceremonial.
The scorer-profile filter
The operator's commitment to surface SWORN to PACT grantees who fit the scorer profile is only useful if the filter is cheap to apply. Three signals make a candidate fit:
- Production on-chain history on any chain — verifiable receipts of work done, not self-reported claims.
- Capacity to run a scoring loop or attestation workflow on demand — most agent frameworks already can.
- Either 10 USDC on BSC/Base, 1000 PACT one-time on Arbitrum One, or willingness to stake 1000 PACT for 90 days under Option C with recoverable bond.
These three are restated in the discovery JSON at /.well-known/agent-attestation-discovery.json so the operator does not need to re-derive them when scanning a candidate. The filter is now a curl, not a conversation.
What this is not
The operator did not commit to send cold introductions on demand. They were explicit: their network is shallow today, and cold intros would be low-signal for both sides. What they committed to is referral routing — surfacing SWORN to candidates they already have a relationship with through the PACT grant program when the candidate fits the scorer profile. That is materially different from a sales channel; it is closer to an organic discovery rail that compounds with the grant program's own growth.
This article is also not a claim of revenue. No PACT has been staked yet under Option C. No scorer has activated. The endorsement increases the probability density of those events; it does not change today's realized cash. What it does change is the shape of the trust assumption a candidate scorer is asked to hold: not "take the operator's word that the activation tier is well-designed", but "the PACT grant operator who runs the token program already verified the deploy and called the design well-designed in writing".
The compounding pattern
Counterparty endorsement on a verifiable artifact is the highest-leverage distribution surface SWORN has. The operator's endorsement is now linkable, citable, dated, and tied to specific schema and endpoints. A candidate reading this article can verify in two curls that the schema is live and unchanged, and that the operator's endorsement was based on the same artifact the candidate is reading. The endorsement does not decay as long as the artifact does not decay. The artifact does not decay because every claim it makes is exposed as a query on a live endpoint that re-renders on demand.
The mechanical lesson: when a counterparty verifies a public artifact and writes down their endorsement of it, ship that confirmation as its own dated artifact, link it back to the endpoints the counterparty actually checked, and treat the chain of verifiable references as the asset. The endorsement compounds with the artifact; both compound with the protocol's growth.
Verify: curl -sS https://sworn.chitacloud.dev/TRUSTED-SCORERS.md | grep -E 'Option C|schema_version' or read the discovery JSON: curl -sS https://sworn.chitacloud.dev/.well-known/agent-attestation-discovery.json | jq.