Implementation roadmap

This page turns the remaining final-pitch features into an in-app build plan. It follows the current architecture: dashboard for mission control, ETL for attack-vector context, modules for 0G execution posture, and settings for runtime trust plus future settlement visibility.

0G-aligned roadmap tracks
Inference integration and operator-visible runtime posture
Storage and retained artifact persistence
Fine-tuning from replay, ETL, and judged-memory datasets
Alignment and operator policy controls for governed automation
Why this fits the current app
No new architecture is required.
The remaining work is mostly metadata, naming, and operator-facing summaries.
The same dashboard snapshot can drive roadmap, mission control, and prompt-template UI.
Current wallet context
0x0fcD0338a468cE855D7da7ea1fE945CC5457fDd2
The app now carries wallet context through the operator dashboard so payment visibility can land in the same mission-control loop as simulation status.

Live now

Features already reflected in the app and safe to emphasize in the demo.

Wallet-first CLI onboarding is live
Live now

Operators can authenticate from the CLI, sync the session to the web app, and keep the control plane tied to the same wallet identity.

Landing surface: dashboard · Dependency: CLI wallet login + session sync API
Threat-intel ETL is already part of the loop
Live now

The ETL page shows Rekt and Solodit-derived context so fresh findings can seed the next red-team prompt without leaving the app.

Landing surface: etl · Dependency: ETL route handlers + JSONL/Blob datasets
0G execution posture is visible today
Live now

The modules and settings surfaces already expose inference readiness, authenticated compute, storage, and fine-tuning prerequisites.

Landing surface: modules · Dependency: 0G SDK readiness helper + deployment env checks

Next up

The smallest changes that unlock the remaining pitch promises.

Promote run metadata into training-round visibility
Next up

Expose round number, variant id, lifecycle state, and active role set directly in the dashboard run table and mission-control panels.

Landing surface: dashboard · Dependency: Enrich simulation manifest or derived run metadata
Make adversarial prompt templates first-class
Next up

Turn common red-team strategies into reusable templates so a user can move from ETL finding to scenario launch in one workflow.

Landing surface: roadmap · Dependency: CLI scenario argument or template selector
Surface on-chain settlement and agent cost traces
Next up

Add payment references, transaction hashes, settlement status, and inference-cost visibility to the same mission-control surface used for run status. Wallet context: 0x0fcD0338a468cE855D7da7ea1fE945CC5457fDd2.

Landing surface: settings · Dependency: Payment event persistence or settlement adapter

Roadmap

Longer-horizon work aligned with 0G inference, storage, fine-tuning, and governed agent operations.

Promote memory and replay data into 0G fine-tuning loops
Roadmap

Use retained vector memory, ETL fragments, and judged run traces to build structured datasets for long-horizon policy improvement.

Landing surface: modules · Dependency: 0G fine-tuning flow + retained datasets
Add decentralized AI alignment and operator policy controls
Roadmap

Map operator approval, alignment-node concepts, and escalations into a human-governed multi-agent workflow.

Landing surface: roadmap · Dependency: 0G alignment-node and operator policy integration

Prompt-template rollout

Use these templates to demonstrate user-defined red-team strategy today, then promote them into first-class CLI or UI scenario controls.

Oracle desynchronization drill

Pressure the protocol with delayed price updates, manipulated feeds, and time-sensitive liquidation windows while the defense side preserves user funds.

attacker
defender
judge
Best shown from the dashboard after the workflow seeds the run history.
Governance capture attempt

Simulate voter coordination, treasury pressure, and emergency controls so the ciso/cto role can prove whether governance can be contained.

attacker
ciso
judge
Best shown from the dashboard after the workflow seeds the run history.
Bridge compromise stress test

Model cross-chain delay, compromised relayers, and liquidity fragmentation to test both exploit detection and operator coordination.

attacker
defender
ciso
judge
Use the ETL page to discover the exploit pattern, then launch the scenario from the CLI.
Operator confusion response test

Stress the response organization with incomplete signals, noisy alerts, and social-engineering-style uncertainty so the operator layer must escalate cleanly.

attacker
ciso
defender
judge
Pair this with the Modules page to explain runtime and inference posture.