Skip to main content
Newton Protocol is a policy engine that lets you encode, verify, and enforce rules — spend limits, sanctions screening, fraud prevention — directly within your smart contracts.

The problem

Smart contracts are blind to offchain context: whether a user is sanctioned, whether an AI agent is hallucinating, or whether a transaction violates a corporate spend policy. Traditional security relies on frontend filters or centralized API checks, leaving protocols vulnerable to unauthorized actions from third-party aggregators, autonomous agents, or direct contract calls.

The solution

Newton bridges this gap with real-time offchain data — KYC status, market feeds, proof of reserves — evaluated by a decentralized operator network and enforced at the smart contract level. Your protocol stays protected regardless of where the transaction originates.

Modular and chain-agnostic

Newton integrates with most EVM-compatible networks including Ethereum, Base, and Arbitrum. Non-EVM support is on the roadmap.

Try the demo

See a live example of a Newton-powered sanctions-checked transfer app

Talk to an expert

Get in touch to discuss your integration or partnership opportunity

What it looks like

import { createWalletClient, http } from 'viem'
import { sepolia } from 'viem/chains'
import { newtonWalletClientActions } from '@magicnewton/newton-protocol-sdk'

const client = createWalletClient({
  chain: sepolia,
  transport: http(),
}).extend(newtonWalletClientActions({ apiKey: process.env.NEWTON_API_KEY! }))

// Simulate a policy evaluation against a transaction intent
const result = await client.simulateTask({
  intent: { from: sender, to: recipient, value: '0x0', data: calldata, chainId: 11155111, functionSignature: '0x' },
  policyTaskData: { policyId, policyAddress, policy: '0x', policyData: [] },
})

console.log(result.result?.allow) // true or false

Quickstart

Run this example end-to-end in 5 minutes

Walkthrough

Why Newton

  • Verifiable Trust: Every compliance decision is backed by a BLS attestation, not reputation.
  • Privacy-Preserving: Only hashes and commitments are onchain — no PII or sensitive data exposure. See the privacy layer.
  • Composable: Works with wallets, dApps, AI agents, and DeFi protocols through a standard SDK interface.
  • Chain-Agnostic: Newton proofs can be verified across any supported EVM chain via lightweight verifier contracts.
  • Extensible: Supports both open-source policies and enterprise modules for regulated financial institutions.

Next Steps

Quickstart

Simulate your first policy evaluation in 5 minutes

Core Concepts

Understand policies, intents, tasks, and attestations