The Newton Protocol is a decentralized infrastructure layer for verifiable onchain automation and secure agent authorization. It enables protocols, DAOs, and users to execute complex actions through verifiable agents, without relying on centralized bots or offchain coordination.
Users can securely authorize agents to act on their behalf using programmable permissions, ensuring that actions occur only under conditions they approve. By combining trusted execution environments (TEEs), zero-knowledge proofs, and a modular agent architecture, Newton Protocol brings automation fully onchain, enhancing transparency, composability, and trust.
Token use cases:
Staking for Protocol Security - NEWT dPoS staking will be available to enable network participants to contribute to the security and uptime of the Newton Keystore rollup.
Token for Gas / Fees - NEWT will be the native gas token of the Newton Protocol required to issue, update, or revoke onchain permissions for a given account (e.g., when delegated to an autonomous agent).
Token for Newton Model Registry - Agent operators provide NEWT tokens as collateral for their automated services that use the registered agent models running on the Newton Protocol.
Governance - Newton Protocol and its ecosystem will decentralize over time, and users who stake their NEWT will be entitled to vote in the governance process to help guide the growth and development of the Newton Protocol.
The Newton Protocol is designed around three core components:
Newton Model Registry: a canonical onchain registry where agent models (trigger-action contracts) are published and referenced.
Newton Keystore: a specialized rollup responsible for storing and updating user permissions (e.g., session keys, zkPermissions) that define which agents can act on a user's behalf.
Automation Intents: user-defined instructions submitted to the network that execute actions when specific onchain or offchain conditions are met.
Following its formation, Magic Newton Foundation received $USD 1 million of capital from Magic Labs in order to fund its near term expenses including legal costs, operating costs, contractors, and contracts with unaffiliated third party vendors. The Foundation has not raised any capital from investors. As of the date of this document, the Foundation has not conducted any public or private sales of NEWT tokens.
The total supply of NEWT is 1,000,000,000 and the circulating supply as of the date of the NEWT token launch will be 210,500,000 (21.5% of the total token supply), including allocations for the airdrop, validator rewards, and liquidity support.
Key metrics (as at June 23, 2025):
1. What is Newton Protocol?
Project overview:
Newton Protocol is an open and verifiable infrastructure layer designed to bring secure, programmable automation to onchain finance. In today’s decentralized ecosystem, users and protocols still rely heavily on offchain services and manual actions to execute key financial tasks—from recurring investments to token distribution and treasury operations. These dependencies introduce unnecessary risk, friction, and centralization.
Newton Protocol will address this gap by enabling developers and protocols to create autonomous onchain agents that monitor conditions, execute predefined actions, and coordinate complex financial behavior—without relying on offchain bots or intermediaries. It offers a standardized way to encode “if-this-then-that” logic directly into the blockchain ecosystem, allowing finance to become not just decentralized, but self-operating.
Project mission:
The mission of the Magic Newton Foundation is to steward the development of the Newton Protocol as a trustless automation layer for crypto-native finance—enhancing security, scalability, and user experience across the ecosystem. The Foundation seeks to empower protocols and DAOs to operate more efficiently, while enabling users to participate more confidently in onchain markets.
Project value proposition
Verifiable agents (no blind trust), programmable permissions (fine-grained risk control) and an open agent marketplace together create a plug-and-play coordination layer that any chain, DAO or wallet can integrate. $NEWT underpins the Newton Protocol through staking security, gas, and governance.
Project Key Highlights:
The Newton Protocol is designed to serve as a verifiable automation layer for onchain finance. It provides a mechanism for publishing, verifying, and executing automation intents—trigger-action programs—through a modular architecture that separates intent definition, execution, and validation.
The Newton Protocol is designed around three core components:
Newton Model Registry: a canonical onchain registry where agent models (trigger-action contracts) are published and referenced.
Newton Keystore: a specialized rollup responsible for storing and updating user permissions (e.g., session keys, zkPermissions) that define which agents can act on a user's behalf.
Automation Intents: user-defined instructions submitted to the network that execute actions when specific onchain or offchain conditions are met.
Existing Products:
The Newton Protocol is purpose-built infrastructure to enable verifiable AI-driven automations, powered by automation guardrails, execution proofs, and the agent model registry.
The network effect illustrated above demonstrates the roles of the protocol participants that together enable Newton Protocol’s functionality.
At the time of $NEWT launch, the first verifiable agent demo built on Newton Protocol (available on newton.xyz) has over 1.1M user sign ups, 600k verified agent transactions, and 350k activated agents.
2. Token sales and economics:
Token Distribution:
Token Release Schedule:
3. Risk Analysis:
Initial Circulating Retail:Institution Ratio:
Airdrop Cluster Analysis:
Initial TGE Main Bucket On-chain Wallets Addresses:
Other Risks: Certain product features of this project are still under development, and current utility may be limited. Cryptocurrency investments carry risks—please do your own research.
4. Roadmap and Updates
Completed Milestones:
The Protocol has achieved several critical milestones since inception, including:
Publication of a technical litepaper (see, https://blog.newt.foundation/the-litepaper/)
Development of the v1 verifiable automation protocol
End-to-end integration of the first live agent onto the Protocol with verification automation
Verification of TEE- (Trusted Execution Environments) based agent compute—zero-knowledge proofs (ZKP) of TEE attestations are generated, and their integrity verified through protocol contracts
A Recurring Buy agent—developed by Magic Labs—allowing users to schedule recurring asset purchases through verifiable automation
Staking of NEWT tokens on the Protocol
Multiple community rewards initiatives
Launch of the Foundation and governance roadmap to support neutral stewardship of Protocol development and ecosystem growth
Looking ahead, Newton Protocol will continue to evolve along several major fronts:
Verifiable Automation Marketplace
Launching an onchain marketplace powered by the Newton Model Registry, making it simple for anyone to publish, discover, and compose agents or agent swarms (i.e., sophisticated orchestration of multiple agents). This unlocks a broad range of automation strategies and use cases, while fostering a vibrant, composable ecosystem of agents that end users can interact with directly.Multichain Newton Keystore Rollup
Launching a zkPermissions rollup that enables cost-efficient, multichain-compatible zero-knowledge permissions. Developers can define programmable guardrails like “only trade if volatility exceeds X” or “act only when RSI falls below Y,” with an SDK to simplify zkPermission integration into any agent.Scalability
Improving scalability through techniques like aggregated proof verification. These upgrades reduce costs and increase throughput, making high-frequency, verifiable automation economically viable at scale.Decentralization
Progressively decentralizing the Protocol by onboarding third-party validators to secure the Newton Keystore rollup. This enhances censorship resistance and ensures that verification remains credibly neutral and trustless over time.
Link to whitepaper: https://blog.newt.foundation/the-litepaper/
Commercial and Business Development Progress:
The Newton Protocol incorporates several open-source and third-party components critical to its function. These include:
Trusted Execution Environments (TEEs): Used for attestation of agent execution integrity. The protocol currently leverages Phala’s cloud environments to run confidential compute tasks in a decentralized and verifiable manner. Additional cloud environments and redundancy may be added when available and suitable for use.
Zero-Knowledge Proof Systems: Newton supports zk-based permissioning and proof generation as part of its permission model and agent validation. The Protocol integrates with emerging zk-VM frameworks such as Succinct and Risc Zero to enable verifiable offchain computation and scalable cryptographic proofs.
zk-SNARKs and Permission Libraries: Used for constructing and validating granular access controls (e.g., zkPermissions and session keys), ensuring that only authorized agents can take automated actions on behalf of users.
Ethereum Layer 1 and Layer 2 ecosystems: The Newton Protocol posts finality proofs and permission state roots to Ethereum and is designed for cross-chain interoperability with additional chains.
The Protocol builds on battle-tested open-source libraries where applicable and contributes improvements upstream where possible.
5. Community
X: https://x.com/newtfoundation
6. Appendix:
Please see disclosure and transparency reports published on https://newt.foundation/ for additional information about the project.