此文章暂不支持您的语言,为您智能推荐英文版。
  • The Newton Protocol is a decentralized infrastructure layer for verifiable onchain automation and secure agent authorization. It enables protocols, DAOs, and users to execute complex actions through verifiable agents, without relying on centralized bots or offchain coordination. 

  • Users can securely authorize agents to act on their behalf using programmable permissions, ensuring that actions occur only under conditions they approve. By combining trusted execution environments (TEEs), zero-knowledge proofs, and a modular agent architecture, Newton Protocol brings automation fully onchain, enhancing transparency, composability, and trust.

  • Token use cases:

    • Staking for Protocol Security - NEWT dPoS staking will be available to enable network participants to contribute to the security and uptime of the Newton Keystore rollup.  

    • Token for Gas / Fees - NEWT will be the native gas token of the Newton Protocol required to issue, update, or revoke onchain permissions for a given account (e.g., when delegated to an autonomous agent).

    • Token for Newton Model Registry - Agent operators provide NEWT tokens as collateral for their automated services that use the registered agent models running on the Newton Protocol. 

    • Governance - Newton Protocol and its ecosystem will decentralize over time, and users who stake their NEWT will be entitled to vote in the governance process to help guide the growth and development of the Newton Protocol.

  • The Newton Protocol is designed around three core components:

    • Newton Model Registry: a canonical onchain registry where agent models (trigger-action contracts) are published and referenced.

    • Newton Keystore: a specialized rollup responsible for storing and updating user permissions (e.g., session keys, zkPermissions) that define which agents can act on a user's behalf.

    • Automation Intents: user-defined instructions submitted to the network that execute actions when specific onchain or offchain conditions are met.

  • Following its formation, Magic Newton Foundation received $USD 1 million of capital from Magic Labs in order to fund its near term expenses including legal costs, operating costs, contractors, and contracts with unaffiliated third party vendors. The Foundation has not raised any capital from investors.  As of the date of this document, the Foundation has not conducted any public or private sales of NEWT tokens.

  • The total supply of NEWT is 1,000,000,000 and the circulating supply as of the date of the NEWT token launch will be 210,500,000 (21.5% of the total token supply), including allocations for the airdrop, validator rewards, and liquidity support.

Key metrics (as at June 23, 2025):

Token Name

Newton Protocol (NEWT)

Token Type

ERC-20

Initial Circ. Supply When Listed on Binance

215,000,000

Maximum Token Supply

1,000,000,000

Total Token Supply

1,000,000,000

Current Circulating Supply

215,000,000 (21.5%)

Binance HODLer Airdrop Allocation

12,500,000 (1.25% of total supply)

1. What is Newton Protocol?

  • Project overview: 

    • Newton Protocol is an open and verifiable infrastructure layer designed to bring secure, programmable automation to onchain finance. In today’s decentralized ecosystem, users and protocols still rely heavily on offchain services and manual actions to execute key financial tasks—from recurring investments to token distribution and treasury operations. These dependencies introduce unnecessary risk, friction, and centralization.

    • Newton Protocol will address this gap by enabling developers and protocols to create autonomous onchain agents that monitor conditions, execute predefined actions, and coordinate complex financial behavior—without relying on offchain bots or intermediaries. It offers a standardized way to encode “if-this-then-that” logic directly into the blockchain ecosystem, allowing finance to become not just decentralized, but self-operating.

  • Project mission:

    • The mission of the Magic Newton Foundation is to steward the development of the Newton Protocol as a trustless automation layer for crypto-native finance—enhancing security, scalability, and user experience across the ecosystem. The Foundation seeks to empower protocols and DAOs to operate more efficiently, while enabling users to participate more confidently in onchain markets.

  • Project value proposition

    • Verifiable agents (no blind trust), programmable permissions (fine-grained risk control) and an open agent marketplace together create a plug-and-play coordination layer that any chain, DAO or wallet can integrate. $NEWT underpins the Newton Protocol through staking security, gas, and governance.

  • Project Key Highlights:

    • The Newton Protocol is designed to serve as a verifiable automation layer for onchain finance. It provides a mechanism for publishing, verifying, and executing automation intents—trigger-action programs—through a modular architecture that separates intent definition, execution, and validation.

    • The Newton Protocol is designed around three core components:

      • Newton Model Registry: a canonical onchain registry where agent models (trigger-action contracts) are published and referenced.

      • Newton Keystore: a specialized rollup responsible for storing and updating user permissions (e.g., session keys, zkPermissions) that define which agents can act on a user's behalf.

      • Automation Intents: user-defined instructions submitted to the network that execute actions when specific onchain or offchain conditions are met.

  • Existing Products:

  • The Newton Protocol is purpose-built infrastructure to enable verifiable AI-driven automations, powered by automation guardrails, execution proofs, and the agent model registry. 

  • The network effect illustrated above demonstrates the roles of the protocol participants that together enable Newton Protocol’s functionality. 

  • At the time of $NEWT launch, the first verifiable agent demo built on Newton Protocol (available on newton.xyz) has over 1.1M user sign ups, 600k verified agent transactions, and 350k activated agents. 

2. Token sales and economics:

Token Distribution:

Token Release Schedule:

3. Risk Analysis:

Initial Circulating Retail:Institution Ratio:

Reported Day1 circulating %

(Definition: Tokens unlocked on-chain based on Token Release Schedule)

21.5% of total supply


Day1 Real float % 

(Definition: Tokens that are circulating & tradable publicly)

17.1% of total supply

..Day1 Retailer %

  • Airdrop

10.0% of total supply

  • 10.0% of total supply

..Day1 Institution / Project Controlled %

  • Liquidity on CEXs

  • Liquidity on DEXs

  • Ecosystem Growth Fund

7.1% of total supply

  • 1.0% of total supply

  • 3.0% of total supply

  • 3.1% of total supply

Airdrop Cluster Analysis:

Airdrop Cluster Analysis

10% of total supply

Initial TGE Main Bucket On-chain Wallets Addresses:

Community Rewards - Wallet

0x2F395C5eCD2983CBa53bD5eddDc0684a415713fb

Validator Rewards - Wallet

0xBc8E97E67db5632AC779EA132963023FFE49aACc

Liquidity Support - Wallet

0x26580d3b95E6B260E80D44d73a3103ef8EaA23d4

Onchain Ecosystem Growth Fund - Wallet

0x00680Ce5C6b2Fa6845037171e1d84d56Abc9c341

Onchain Ecosystem Development Fund - Wallet

0x8cC2d3f139EB6d5b6912b3218f7a0f63A6556C8E

Onchain Foundation Treasury - Wallets

0x32556362Ad2b9bFf71C8c666CD061eE4A38206df

0x367AE7E743DC57d883be98596e06E227b34670d0

0x1Bb33De17228DEb0a941421903A1B1882C69bdc4

0xf6d764335A0234007C3D853B728a0a264cb5b456

0x564A4Ef4CB21281A61cD6640Fb9be9F1da989cac

0x0B5bDB8CAFd87A60DCA8E293c59e7b3282AF0996

0xA3F0F514C3509894f2E7E23ec992b269a6afEd66

0x1d12F7a0a1B5E981a8Db7f1822c61d263387E19F

0x03242e43310926019d29b100F744341DFafcbEc2

0x48fb11f734Ef03DCC3CCD3685CEa12e2d38EcAc4

0xee40edC24B449ab6D06cEb9E15F530a4Eae58501

0xb936B5c999ca001C0F8c0434f3b53b916548f69D

0xf5D8b38c9b3E6A74DE026663b5b5BdF83D963129

0x01F3Bceb4C44a9F465d881Cc107778903478582a

0xc7857dB7Ce83Fc20CC95B180D2EF702de7dF3D92

0x6c0568F73015229C7cbc06E04990ee927ddBB6d1

0x297CE0372d5190B76FB8fF173243F3F1C49C30f3

0xfc8dB54854d51102dbdb59C7F54C132F1478C52f

0xa2a30aDa9d79e572022955Cc72BE68ec43D832E5

0x9fE220b961c46FbA90fBfB087FA89adf746E75b6

0x75b05Ce57Cb96385C668205D227f6E5E1E94Af48

0xbB282E105880c3e445C6185210e9b0475532dBe8

0xcBDAbe3723c57e5443752E0dFC06766C92F1f219

0x64Fb97a89D21933aA3a7dB9Ce981942Cf9b1a554

0x1Ee3caB22DDa2a38536A67BcF928b3Fe208B3730

0x04F1365cD2cb04AD8Daaf18092f9D65d469c9A82

0x05e39a3662D867C2eAa2e465737475F2F84F8B95

0xC001ff4cF7bbc10c87c913d7407047E56EB3e60e

0x04E337035F06b6756e8A327B4a2ab12ca91170ef

0x4C891626A68f237dA89dC7D17e3f5aD9ebb4Bd73

0xa684Ce92D2fCBFfCeae40A9DADdED026CcefAE85

0x7CE9909eD4DC00F866D11645876538ce1E13262c



Magic Labs - Wallets

0x2f870f3Bd8eD88F219ED8FDc8F9acFC3cf133AeB

Other Risks: Certain product features of this project are still under development, and current utility may be limited. Cryptocurrency investments carry risks—please do your own research.

4. Roadmap and Updates

Completed Milestones:

The Protocol has achieved several critical milestones since inception, including:

  • Publication of a technical litepaper (see, https://blog.newt.foundation/the-litepaper/)

  • Development of the v1 verifiable automation protocol

  • End-to-end integration of the first live agent onto the Protocol with verification automation

    • Verification of TEE- (Trusted Execution Environments) based agent compute—zero-knowledge proofs (ZKP) of TEE attestations are generated, and their integrity verified through protocol contracts

    • A Recurring Buy agent—developed by Magic Labs—allowing users to schedule recurring asset purchases through verifiable automation

  • Staking of NEWT tokens on the Protocol

  • Multiple community rewards initiatives

  • Launch of the Foundation and governance roadmap to support neutral stewardship of Protocol development and ecosystem growth

Looking ahead, Newton Protocol will continue to evolve along several major fronts:

  • Verifiable Automation Marketplace
    Launching an onchain marketplace powered by the Newton Model Registry, making it simple for anyone to publish, discover, and compose agents or agent swarms (i.e., sophisticated orchestration of multiple agents). This unlocks a broad range of automation strategies and use cases, while fostering a vibrant, composable ecosystem of agents that end users can interact with directly.

  • Multichain Newton Keystore Rollup
    Launching a zkPermissions rollup that enables cost-efficient, multichain-compatible zero-knowledge permissions. Developers can define programmable guardrails like “only trade if volatility exceeds X” or “act only when RSI falls below Y,” with an SDK to simplify zkPermission integration into any agent.

  • Scalability
    Improving scalability through techniques like aggregated proof verification. These upgrades reduce costs and increase throughput, making high-frequency, verifiable automation economically viable at scale.

  • Decentralization
    Progressively decentralizing the Protocol by onboarding third-party validators to secure the Newton Keystore rollup. This enhances censorship resistance and ensures that verification remains credibly neutral and trustless over time.

Link to whitepaper: https://blog.newt.foundation/the-litepaper/

Commercial and Business Development Progress:

The Newton Protocol incorporates several open-source and third-party components critical to its function. These include:

  • Trusted Execution Environments (TEEs): Used for attestation of agent execution integrity. The protocol currently leverages Phala’s cloud environments to run confidential compute tasks in a decentralized and verifiable manner.  Additional cloud environments and redundancy may be added when available and suitable for use.  

  • Zero-Knowledge Proof Systems: Newton supports zk-based permissioning and proof generation as part of its permission model and agent validation. The Protocol integrates with emerging zk-VM frameworks such as Succinct and Risc Zero to enable verifiable offchain computation and scalable cryptographic proofs.

  • zk-SNARKs and Permission Libraries: Used for constructing and validating granular access controls (e.g., zkPermissions and session keys), ensuring that only authorized agents can take automated actions on behalf of users.

  • Ethereum Layer 1 and Layer 2 ecosystems: The Newton Protocol posts finality proofs and permission state roots to Ethereum and is designed for cross-chain interoperability with additional chains.  

The Protocol builds on battle-tested open-source libraries where applicable and contributes improvements upstream where possible.

5. Community

X: https://x.com/newtfoundation

6. Appendix:

Please see disclosure and transparency reports published on https://newt.foundation/ for additional information about the project.