Sourcify is the evidence engine. Upgrade Siren cannot make credible claims without verified source, ABI, compiler metadata, bytecode links, and storage-layout data.
- old and new implementation verification status
- direct Sourcify links
- ABI diff based on verified metadata
- storage-layout comparison when available
- unverified implementation causing
SIREN
Upgrade Siren turns Sourcify's verified-contract data into a public upgrade-risk alarm.
Upgrade Siren should be framed as a Sourcify adoption loop, not just an API consumer:
- Protocol wants a
SAFEor high-confidenceREVIEWverdict. - Upgrade Siren requires Sourcify-verified implementations for credible evidence.
- If an implementation is unverified, the public verdict becomes
SIREN. - DAO voters, wallets, and reviewers ask the protocol to verify on Sourcify.
- Sourcify gets more verified contracts, more inspection traffic, and clearer public-good value.
- Which Sourcify API path is preferred for metadata, ABI, and storage layout during the hackathon?
- What is the best way to link judges directly to the verified contract evidence?
- Is partial verification acceptable for
REVIEW, or should it always beSIREN? - Are there Sourcify endpoints for similarity or signature data we should use for unverified implementations?
Track switched 2026-05-09 from "Most Creative Use" to "AI Agents" per
EPIC_BENCH_MODE.mdSection 21 D-D lock. Most Creative remains as fallback if AI Agents track signals weaken.
ENS is not just resolving a wallet address. It is the identity layer for two front doors on the same engine:
Single-Contract Mode (Epic 1, LIVE) — protocol upgrade map:
- named proxy
- previous implementation
- expected current implementation
- report pointer + hash + schema pointer
- atomic upgrade manifest
- ENSIP-26 context and web endpoint records
- project-specific
upgrade-siren:*namespace
Bench Mode (Epic 2, in build) — universal subject registry:
agent-bench:bench_manifestatomic JSON record listing every public data source for the subject (Sourcify projects + GitHub owner + on-chain primary address + ENS-internal root)agent-bench:ownerfor manifest authorshipagent-bench:schemaversion pointer- co-exists with
upgrade-siren:*records on the same name without conflict - public-read fallback for un-opted-in subjects (banner shows
confidence: public-read, tier ceiling A)
Bench Mode treats any ENS name as a subject identity — agent, project, team — and pulls verifiable evidence of that subject's seniority and relevance. The trust-discount mechanic (0.6 multiplier on unverified GitHub claims) makes ENS the identity anchor for verifiability: claims that aren't cross-signed against the ENS owner's wallet are structurally weaker. That is the AI-Agents-grade primitive — identity rooted in ENS, claims verifiable via ENS-controlled signatures.
Single-Contract path (live demo opener):
- live ENS text-record resolution
- named contract hierarchy
- proxy slot compared against manifest-declared implementation
- report discovery through ENS
- EIP-712 report signature verified against
upgrade-siren:owner - ENSIP-26 records (
agent-context,agent-endpoint[web]) reused instead of inventing every record
Bench Mode segment:
- live ENS resolution of
agent-bench:bench_manifeston owned subjectsiren-agent-demo.upgrade-siren-demo.eth - four-source grid populated from one ENS lookup
- public-read fallback on a Daniel-picked existing ENS name proves universal-registry shape works without opt-in
- v2 cross-sign upgrade path (gist signed by ENS-owner wallet → flips GitHub source from
unverifiedtoverified→ discount removed) is in the schema, even though v1 ships unverified
ENS is the identity anchor for both the protocol's upgrade map and any subject's verifiable benchmark — one resolver, two product surfaces.
- Is
agent-bench:*namespace acceptable alongsideupgrade-siren:*for AI-Agents-track judging? Both atomic-manifest pattern. - Does the trust-discount + cross-sign upgrade path satisfy AI Agents judging criteria around "agent identity rooted in ENS"?
- For the cross-sign v2 path, is a signed Gist-pointer the right verification primitive, or should we use ERC-1271 contract signature?
- Would wildcard/offchain subnames be more compelling than normal text records for the universal-subject-registry shape?
- Is the
kind: "ai-agent" | "human-team" | "project"taxonomy something ENS would want to standardize?
Public upgrade alarms help communities govern shared infrastructure. This is a civic Ethereum tool, not a private alpha feed.
- DAO voter workflow
- plain-language verdict
- governance comment generator
- evidence open to everyone
- no paywall around the basic alarm
Use only if Daniel decides to pursue the Best Agentic Venture track. Per SCOPE.md §5 + EPIC_BENCH_MODE.md Section 21 D-J, posture remains "optional, no proactive targeting" — but the integration code is built so a flip is one decision, not a new build.
Angle A — Submitter (umia venture apply payload exporter): Bench evidence (ENS records + GitHub fetched repos) prefills the canonical Umia Community Track schema; user downloads schema-validated JSON for handoff to a future Umia adapter. No upload. Lives under apps/web/lib/umia/ + UmiaVentureApplySection.
Angle B — Validator (EIP-712 ServerPermit issuer for Tailored Auctions): Upgrade Siren issues per-bidder EIP-712 permits keyed on Bench tier; UmiaValidationHook accepts them via mode 0x01 server-permit branch with zero Umia-side changes. Lives under packages/umia-permit/ + apps/web/app/api/umia/permit/route.ts + UmiaPermitSection.
Without Upgrade Siren, every Tailored Auction founder who wants tier-gated steps must run their own off-chain signing server. We already operate REPORT_SIGNER_PRIVATE_KEY for Siren Reports; reusing it as the Umia signer makes Bench tier a first-class auction-eligibility primitive at zero marginal infra cost. This passes the discriminating "could not exist without this technology" test (feedback_sponsor_native_test).
/b/[name]page renders both Umia sections under the Bench verdict.- Mint Bid Permit panel: connect wallet → enter hook address + step + minTier → API returns
hookDatablob signed by Upgrade Siren operator. Tier-below-threshold returns 403 with observed/required tiers visible. - Foundry mock
UmiaValidationHookMockproves the byte-on-wire accepted by a real hook: 6 round-trip tests cover valid permit, expired deadline, disabled step, wrong signer, missing type flag, bidder mismatch.
Upgrade Siren turns Bench tier into a Tailored Auction eligibility primitive — the EIP-712 server-permit Umia's hook already accepts.
Umia may still prefer ventures that create economic output, not just analyze risk. The Validator angle is the strongest counter (Bench scoring becomes auction infrastructure, not just analysis). Do not force the pitch unless mentor feedback confirms it lands.
| Sponsor | Reason |
|---|---|
| Swarm | Interesting report-storage future, but low prize and not core |
| SpaceComputer | Hardware/KMS mismatch |
| Apify | Data extraction not needed for core demo |