Ditto Protocol is a decentralized protocol designed to execute intent-driven workflows and event-driven automations across blockchain ecosystems. By leveraging shared security, Ditto ensures trustless, reliable execution of workflows across EVM-compatible chains.

The protocol empowers builders to create and execute complex workflows under predefined conditions, unlocking new possibilities for decentralized automation.

How Ditto Protocol Works

Account Abstraction

Ditto Protocol employs an abstraction layer for user accounts, enhancing privacy and security. Users can perform transactions and launch workflows without exposing unnecessary details, ensuring a safer and more confidential blockchain experience.

Randomized Node Groups (Committees)

  • Every workflow or transaction is processed by a randomly selected group of nodes (a committee).
  • Randomization is ensured via the RANDAO verifiable randomness mechanism.
  • Committees are formed from RANDAO participants to eliminate predictability and reduce attack risks.
  • A committee leader is chosen based on verifiable randomness and stake size for added fairness.

Secure Workflow Execution

  • Workflows require validation and signing by a majority of committee members using Byzantine Fault Tolerance (BFT).
  • Process completes upon majority consensus, ensuring robustness even if some nodes act maliciously.

Rewards for Participants

Validators, operators, and keepers are rewarded with transaction fees for:

  • Maintaining network stability
  • Ensuring protocol integrity
  • Incentivizing honest participation

Why Choose Ditto Protocol?

FeatureDescription
Maximum SecurityRandomized committees + BFT algorithm provide attack-resistant execution.
Smart ExecutionBuild sophisticated workflows with unmatched composability.
True DecentralizationNo fixed nodes – committees are randomly formed.
Cross-Chain CapabilitiesSupports EVM-compatible chains for cross-chain automation.

Roles in the Ditto Network

Operators

Maintain core infrastructure:

  • ✅ Transaction processing
  • 🔒 Staking required (slashing for violations)
  • 🛠️ Network upkeep

Keepers

Provide auxiliary functions:

  • 🔍 Monitoring for anomalies
  • ⚙️ Technical support and optimization
  • 📊 On-chain execution reporting

Validators

Key consensus participants:

  • ✔️ Transaction validation via cryptographic proofs
  • 🎲 Committee participation (RANDAO-based selection)
  • 🌐 Ensures decentralization

Economic Security and Staking

Core Principles:

  • 🛡️ Staking provides economic security
  • ⚖️ Slashing for misbehavior (failures/attacks)
  • ♻️ Restaking via Symbiotic integration enhances security

Key Benefits:

  • Reliable workflow execution
  • Incentivized honest participation
  • Scalable network security