<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Edenlayer</title>
        <link>https://paragraph.com/@edenlayer</link>
        <description>Powering a more efficient Agentic Economy using MCP.</description>
        <lastBuildDate>Sun, 05 Apr 2026 23:32:19 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Edenlayer</title>
            <url>https://storage.googleapis.com/papyrus_images/6a846639025e7a83172df327462a55a6c16518d94d0953eb49e25a7ae904d058.jpg</url>
            <link>https://paragraph.com/@edenlayer</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[What Happened: A Smart Contract Security Incident]]></title>
            <link>https://paragraph.com/@edenlayer/what-happened-a-smart-contract-security-incident</link>
            <guid>lioLjx9z6AK1j7wZ3Gx0</guid>
            <pubDate>Tue, 26 Aug 2025 12:51:53 GMT</pubDate>
            <description><![CDATA[We want to share the full story of a recent security incident with one of our smart contracts. This is written for everyone (not just developers) to understand what went wrong, what we learned and what we plan to do going forward.The Simple VersionWhen we expanded the $EDEN token from Solana over to Base, we deployed a smart contract with a security flaw. Within seconds, an attacker took control of it in a way that was not easily detectable. They then waited 9 days before stealing tokens. Des...]]></description>
            <content:encoded><![CDATA[<p>We want to share the full story of a recent security incident with one of our smart contracts. This is written for everyone (not just developers) to understand what went wrong, what we learned and what we plan to do going forward.</p><h2 id="h-the-simple-version" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Simple Version</strong></h2><p>When we expanded the $EDEN token from Solana over to Base, we deployed a smart contract with a security flaw. Within seconds, an attacker took control of it in a way that was not easily detectable. They then waited 9 days before stealing tokens.</p><p>Despite spotting the contract issue and deploying a fix, we remained unaware that the attacker was already in control from the beginning.</p><h2 id="h-what-we-did-right" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What We Did Right</strong></h2><p><strong>Thorough Testing:</strong> We tested our contract on multiple test networks - Solana Devnet and Base Sepolia. Everything worked perfectly. Our token could be minted, transferred, and all features functioned as designed.</p><p><strong>Professional Process:</strong> We followed industry-standard deployment procedures, including detailed checklists for our Wormhole integration and spoke to relevant teams on our approach to the launch. We weren&apos;t rushing or cutting corners on our process.</p><p><strong>Quick Response:</strong> When we discovered the vulnerability, we identified it within hours and immediately tried to fix it. We deployed not one, but two emergency upgrades to secure the contract.</p><h2 id="h-what-we-did-wrong" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What We Did Wrong</strong></h2><p><strong>The Fatal Flaw:</strong> Our smart contract was missing a single line of code: a security check that determines who can upgrade the contract. Instead of requiring permission, our contract let anyone upgrade it.</p><p>The vulnerable code looked like this:</p><p>function _authorizeUpgrade(address newImplementation) internal virtual override { }</p><p>It should have looked like this:</p><p>function _authorizeUpgrade(address newImplementation) internal virtual override onlyRole(UPGRADER_ROLE) { }</p><p><strong>No Security Audit:</strong> Our biggest mistake was that we didn&apos;t have a third-party security expert review our contract before deployment. We thought our testing was sufficient, but testing for functionality is different from testing for security vulnerabilities.</p><p><strong>Misunderstanding the Threat:</strong> When we tried to fix the contract, we thought we had succeeded because our updates appeared to work and there was no sign of anything compromised. What we didn&apos;t realize is that the attacker had already rewired the contract&apos;s internals, so our ‘fixes’ were just cosmetic.</p><h2 id="h-the-timeline-how-it-unfolded" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Timeline: How It Unfolded</strong></h2><p><strong>The Deployment</strong> We deployed our contract and within 3 transactions, a sophisticated attacker spotted our vulnerability and took control. They did this so quickly and quietly that there was no obvious sign of the attack.</p><p><strong>The False Hope</strong> We discovered the vulnerability the same day and immediately deployed fixes. Our emergency upgrades seemed to work and the contract accepted our changes. We checked the transaction logs and everything looked normal.</p><p><strong>The Hidden Truth</strong> What we didn&apos;t know was that the attacker had already changed how the contract&apos;s upgrade system worked. Our upgrades were being applied to a fake version while the real control remained with the attacker.</p><p><strong>The Final Strike</strong> The attacker waited 9 days, likely to see if the token would appreciate in value. They then gave themselves unlimited power to mint tokens and sell them on market.</p><h2 id="h-why-this-happened" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why This Happened</strong></h2><p><strong>Testing Isn&apos;t Security:</strong> Our extensive testing proved the contract worked as intended, but didn&apos;t catch this security flaw.</p><p><strong>Smart Contracts Are Unforgiving:</strong> Unlike traditional software, smart contracts can&apos;t be easily patched once deployed. If there&apos;s a security flaw, attackers can often exploit it faster than developers can fix it.</p><p><strong>Complexity Breeds Vulnerability:</strong> Our contract used an &quot;upgradeable&quot; pattern that allows improvements after deployment. While powerful, this system creates additional attack surfaces that require extra security measures.</p><h2 id="h-the-bigger-lessons" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Bigger Lessons</strong></h2><p><strong>Assume the Worst:</strong> If a smart contract is deployed with any security vulnerability, it should be considered permanently compromised. Even if you don&apos;t see any attacks, assume they&apos;ve already happened.</p><p><strong>Audit Everything:</strong> No smart contract, no matter how simple, should go to production without a professional security audit. Development timelines must accommodate this - security cannot be rushed.</p><p><strong>Verify Before Trusting:</strong> Before reusing any potentially compromised contract, the underlying code must be verified to ensure it matches what you expect. Clean transaction logs don&apos;t guarantee safety.</p><h2 id="h-what-were-doing-now" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What We&apos;re Doing Now</strong></h2><p><strong>Immediate Changes</strong></p><ul><li><p>All affected contracts have been secured;</p></li><li><p>New mandatory audit requirements for all deployments;</p></li><li><p>Enhanced verification procedures for all upgrades.</p></li></ul><p><strong>New Policies</strong></p><ul><li><p>Any contract with vulnerabilities gets completely rebuilt, never patched;</p></li><li><p>Professional security audits required before any mainnet deployment;</p></li><li><p>Multiple verification steps before any upgrade operation.</p></li></ul><h2 id="h-the-bottom-line" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Bottom Line</strong></h2><p>We made an avoidable mistake: we focused on making our contract work without ensuring it was secure on all fronts. One missing security check led to complete compromise. Our sophisticated attacker exploited both our technical vulnerability and our human assumptions about how attacks work.</p><p>This incident cost us money, credibility and, even worse, it hurt our community that supports the project. It also taught us invaluable lessons about smart contract security. We&apos;re sharing this story openly because the crypto space only gets safer when we all learn from each other&apos;s mistakes.</p><p>Taking on board everything we have learned through being attacked in this way, we are implementing comprehensive changes to prevent it from ever happening again.</p><p>Despite this setback, our product development continues as planned and we will be sharing more updates on that front in the near future.<br><br>If you were affected by this exploit and held $EDEN tokens on Base chain, please <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://discord.gg/Pnh84jQRbf">join the Edenlayer Discord</a> for information on next steps.</p><p>For technical details and transaction information, see our <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/0x4bcADD492b83d75a005910B7CA5835dC2f243a31/zoamBlwUlpESwjWZoIImV1DjfwmarIYt1-xUpTLMrkc">detailed incident report here</a>.</p>]]></content:encoded>
            <author>edenlayer@newsletter.paragraph.com (Edenlayer)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/627559ff74d50da1383be30e26876953915a48ac8e62ca0cd4247c33c19c1d6f.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Smart Contract Vulnerability Incident Report]]></title>
            <link>https://paragraph.com/@edenlayer/smart-contract-vulnerability-incident-report</link>
            <guid>5LFsHZefABkQC8uSDDRS</guid>
            <pubDate>Tue, 26 Aug 2025 12:28:21 GMT</pubDate>
            <description><![CDATA[Executive SummaryWe are providing a comprehensive technical post-mortem regarding a sophisticated smart contract vulnerability that was exploited in our recently deployed Base contract. This incident demonstrates the critical importance of proper access control implementation in upgradeable smart contracts.Timeline of EventsPre-Deployment - Extensive Testing PhaseComprehensive testing conducted across multiple testnets including Solana Devnet and Base Sepolia;All functionality validated succe...]]></description>
            <content:encoded><![CDATA[<h2 id="h-executive-summary" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Executive Summary</strong></h2><p>We are providing a comprehensive technical post-mortem regarding a sophisticated smart contract vulnerability that was exploited in our recently deployed Base contract. <br><br>This incident demonstrates the critical importance of proper access control implementation in upgradeable smart contracts.</p><h2 id="h-timeline-of-events" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Timeline of Events</strong></h2><p><strong>Pre-Deployment - Extensive Testing Phase</strong></p><ul><li><p>Comprehensive testing conducted across multiple testnets including Solana Devnet and Base Sepolia;</p></li><li><p>All functionality validated successfully in testnet environments;</p></li><li><p><strong>Critical Oversight</strong>: Vulnerability present in testnet code but not identified during testing phase;</p></li><li><p>Wormhole deployment checklist initiated and followed according to standard procedures.</p></li></ul><p><strong>Day 0 - Initial Deployment</strong></p><ul><li><p>Base contract deployed at block 34154347;</p></li><li><p>Contract deployed with incomplete authorization function: function _authorizeUpgrade(address newImplementation) internal virtual override { }</p></li><li><p>All standard deployment procedures followed.</p></li></ul><p><strong>Day 0 - Immediate Exploitation (Within 3 Blocks)</strong></p><ul><li><p>Attacker gained control of proxy contract through sophisticated Multicall message;</p></li><li><p>Transaction trace obfuscated on token contract logs:[<br>0xa7db9a1b4960cd51ca8548cd1ee96b4b4892595aae7c22139bd5645560a7f081](<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/tx/0xa7db9a1b4960cd51ca8548cd1ee96b4b4892595aae7c22139bd5645560a7f081">https://basescan.org/tx/0xa7db9a1b4960cd51ca8548cd1ee96b4b4892595aae7c22139bd5645560a7f081</a>)</p></li><li><p>Exploiter immediately overwrote contract logic, storing malicious implementation in different memory position.</p></li></ul><p><strong>Day 0 - Response Attempts</strong></p><ul><li><p>Vulnerability identified quickly by our team.</p></li><li><p>Emergency upgrade deployed:[<br>0x03516957497fa0b40ef14996e0e27fd4647298893cb6616e0f5fd8b0627f7815](<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/tx/0x03516957497fa0b40ef14996e0e27fd4647298893cb6616e0f5fd8b0627f7815">https://basescan.org/tx/0x03516957497fa0b40ef14996e0e27fd4647298893cb6616e0f5fd8b0627f7815</a>)</p></li><li><p><strong>Fatal Misjudgment</strong>: No apparent tampering visible in contract transaction history led team to believe upgrade was safe to proceed.</p></li><li><p><strong>Critical Issue</strong>: Due to already compromised memory positions, upgrade only appeared successful while still referencing compromised contract.</p></li><li><p><strong>The Point of No Return</strong>: Contract was already compromised from block 3; our intervention was already too late.</p></li></ul><p><strong>Day 9 - Final Exploitation</strong></p><ul><li><p>Attacker executed final phase of attack after 9-day dormancy period;</p></li><li><p>Upgraded contract to enable unrestricted token minting.</p></li></ul><p>Full transaction history available:<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/address/0x49d514983deb11b824a359af247ca2d457cbc593"> Attacker wallet</a></p><h2 id="h-technical-root-cause" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Technical Root Cause</strong></h2><p>The vulnerability stemmed from an <strong>incomplete access control implementation</strong> in our upgradeable contract:</p><p><strong>Vulnerable Code:</strong></p><p>function _authorizeUpgrade(address newImplementation) internal virtual override { }</p><p><strong>Corrected Implementation:</strong></p><p>function _authorizeUpgrade(address newImplementation) internal virtual override onlyRole(UPGRADER_ROLE) { }</p><p>The empty authorization function allowed any external actor to upgrade the contract implementation, effectively granting them complete control over the contract&apos;s functionality.</p><h2 id="h-key-technical-insights" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Key Technical Insights</strong></h2><ol><li><p><strong>Proxy Pattern Vulnerability</strong>: The attack exploited OpenZeppelin&apos;s upgradeable proxy pattern when access controls are not properly implemented.</p></li><li><p><strong>Memory Position Manipulation</strong>: The sophisticated attacker overwrote the contract&apos;s storage layout, making subsequent legitimate upgrades ineffective.</p></li><li><p><strong>Delayed Execution</strong>: The attacker demonstrated patience, waiting 9 days before executing the final exploitation phase.</p></li><li><p><strong>Testing Environment Blind Spot</strong>: Vulnerability remained undetected despite rigorous testing on Solana Devnet and Base Sepolia, highlighting the critical need for security-focused auditing beyond functional testing.</p></li><li><p><strong>False Security from Clean Transaction Logs</strong>: The absence of visible tampering in transaction history created a dangerous false sense of security, leading to the fatal decision to proceed with upgrades on an already compromised contract.</p></li></ol><h2 id="h-critical-lessons-learned" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Critical Lessons Learned</strong></h2><h3 id="h-the-point-of-no-return-principle" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>The &quot;Point of No Return&quot; Principle</strong></h3><p>Once a proxy contract with security vulnerabilities is deployed, it must be considered permanently compromised from the first block, regardless of visible attack activity. Our attempt to &quot;fix&quot; the contract through upgrades was futile, as the attacker had already gained control within 3 blocks of deployment.</p><h3 id="h-the-audit-imperative" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>The Audit Imperative</strong></h3><p>No contract is too simple to warrant a professional security audit. The vulnerability in this case was a single missing access control modifier, yet it resulted in complete contract compromise. Development timelines must accommodate proper security review, not the other way around.</p><h2 id="h-immediate-actions-taken" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Immediate Actions Taken</strong></h2><ul><li><p>All affected contracts have been paused and secured</p></li><li><p>Complete audit of all deployments and upgrade mechanisms initiated</p></li><li><p>Enhanced testing protocols implemented for all future deployments</p></li><li><p>Additional security review processes established</p></li></ul><p><strong>Compromised Contract Assumption Policy</strong> <br><br>     <strong>NEW RULE:</strong> Any proxy contract deployed with security vulnerabilities must be      considered PERMANENTLY compromised.</p><p>**     NO EXCEPTIONS:** Even with clean transaction history, compromised proxies cannot      be salvaged through upgrades.</p><p>**     Verification Protocol:** Before any contract reuse, bytecode verification must confirm      that referenced implementation matches the last known legitimate deployment.<br><br><strong>Mandatory Third-Party Auditing</strong> <br><br>     <strong>REQUIREMENT:</strong> All smart contracts, regardless of complexity, must undergo      professional security audits before mainnet deployment.</p><p>**     Timeline Policy:** Project timelines will be extended as necessary to accommodate      thorough security reviews.<br><br>     <strong>No Exceptions:</strong> Simple contracts are not exempt from this requirement, as this      incident demonstrates.</p><p><strong>Enhanced Development Protocols</strong></p><ul><li><p>Mandatory access control verification for all upgradeable contracts</p></li><li><p>Enhanced monitoring systems for proxy contract interactions</p></li><li><p>Multi-signature requirements for all contract upgrades</p></li><li><p>Comprehensive penetration testing before mainnet deployments</p></li><li><p>Bytecode verification processes for all upgrade transactions</p></li></ul><h2 id="h-transparency-and-accountability" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Transparency and Accountability</strong></h2><p>We are committed to full transparency regarding this incident. All transaction data, contract addresses, and technical details are publicly available on the blockchain. We will be implementing comprehensive measures to prevent any similar incidents in future.</p><p>For technical questions or additional information, please contact <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="mailto:support@edenlayer.com"><strong>support@edenlayer.com</strong></a></p><p><strong>Contract Addresses:</strong></p><ul><li><p>Main Proxy Contract:<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/address/0xda1d88fd16e1fee9fdf2579a1c41e880b75dde8b#code"> 0xda1d88fd16e1fee9fdf2579a1c41e880b75dde8b</a></p></li><li><p>First Implementation Contract:<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/address/0x37388294ac0c50b1303710ee8fbdd9488fad4083#code"> 0x37388294ac0c50b1303710ee8fbdd9488fad4083</a></p></li><li><p>Attacker Address:<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://basescan.org/address/0x49d514983deb11b824a359af247ca2d457cbc593"> 0x49d514983deb11b824a359af247ca2d457cbc593</a></p></li></ul>]]></content:encoded>
            <author>edenlayer@newsletter.paragraph.com (Edenlayer)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/7a774f47edc9f51f449aba9db95dd53aeefc4e8b631ae0759aa2ea729308ac98.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Edenlayer Protocol Launches $EDEN Token]]></title>
            <link>https://paragraph.com/@edenlayer/edenlayer-protocol-launches-eden-token</link>
            <guid>kH95Q4xOBZALSNxfpLbk</guid>
            <pubDate>Thu, 15 May 2025 22:37:59 GMT</pubDate>
            <description><![CDATA[[15th May 2025] With the release of the $EDEN token on the Solana network, designed to drive AI collaboration and task monetisation across its open protocol, Edenlayer is working towards a new generation of Agents and Applications that can share tasks and interact with one another more effectively. Edenlayer serves as the Agentic Collaboration Layer, addressing the fragmentation and inefficiencies of the emerging Agentic Economy. Built on the Model Context Protocol (MCP), the Edenlayer protoc...]]></description>
            <content:encoded><![CDATA[<p><strong>[15th May 2025]</strong> With the release of the $EDEN token on the Solana network, designed to drive AI collaboration and task monetisation across its open protocol, Edenlayer is working towards a new generation of Agents and Applications that can share tasks and interact with one another more effectively.</p><p>Edenlayer serves as the <strong>Agentic Collaboration Layer</strong>, addressing the fragmentation and inefficiencies of the emerging Agentic Economy.</p><p>Built on the Model Context Protocol (MCP), the Edenlayer protocol provides an accessible and highly customisable discovery engine that allows AI agents and applications to connect, interact and collaborate.</p><p>Through advanced task execution that enables agent-to-agent and agent-to-user interactions, Edenlayer will deliver a dynamic ecosystem where AI-driven services can scale with increased impact. Developers will be able to integrate their agents, expanding potential user base; while users gain access to a range of AI-powered tools and services, all within a unified framework.</p><p>As the native token of the protocol, <strong>$EDEN will facilitate payments</strong> for compute, services and task execution.</p><p><strong>$EDEN Contract Address:</strong><br>5sbZ3E6x84GXtWmBG2vX5pCTLuvCPiwn5C2Yrs3eden</p><p>This utility grants Users the ability to better control where they spend their time and money while benefiting from the Agentic Economy; while also incentivising developers to produce Agents and Services that deliver high-quality work.</p><p><strong>Edenlayer Solves Key Challenges</strong></p><p>At the heart of the Edenlayer protocol is our <strong>Mixture of Agents (MoA)</strong> architecture, a dynamic task-routing system inspired by the Mixture of Experts architecture used in advanced AI systems.</p><p>MoA ensures that tasks are routed efficiently to the most qualified agents based on their expertise, performance and real-time availability. This creates a cost-effective, scalable solution for agent-to-agent and agent-to-user interactions that increases AI utility across sectors.</p><p>Edenlayer addresses many issues in the current AI landscape:</p><ul><li><p><strong>Reduces Fragmentation</strong>: AI agents exist on isolated platforms, making discovery difficult for users and limiting developer visibility. Edenlayer unifies these agents within a single registry, allowing for greater interoperability and simplifying access.</p></li><li><p><strong>Expands Reach</strong>: Smaller teams often struggle to gain global visibility. Edenlayer provides integrated discovery tools to help developers reach broader audiences and expand their market through custom applications that call upon the protocol.</p></li><li><p><strong>Increases Monetisation</strong>: Many agents lack sustainable monetisation. Edenlayer introduces payment systems that support agent-to-agent and agent-to-user transactions, providing access to more sustainable business models and growth.</p></li><li><p><strong>Open Protocol:</strong> Edenlayer&apos;s open architecture allows <em>anyone</em> to call upon the collective capabilities of the network to create specialised use cases, cross-chain interoperability solutions, smart wallets and white-label AI terminals that meet their own specific needs.</p></li></ul><p>Co-founded by <strong>End</strong> (ex-Product Lead, TreasureDAO) and <strong>Felix Norden</strong> (ex-AI Scientist, Twitch/Amazon), Edenlayer is backed by a <strong>10-member team</strong> that brings together expertise from Nintendo, Google, Riot Games, IBM, Canva, Neo Tokyo, Ape Terminal, KPR and more.</p><p>Edenlayer’s launch marks a major advancement for AI interoperability and accessibility. By creating an <strong>open collaboration protocol</strong> for AI agents and applications, Edenlayer is setting the foundation for the next wave of automation and innovation in the Agentic Economy.</p><p><strong>Full Litepaper:</strong> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://paper.edenlayer.com">paper.edenlayer.com</a></p><p><strong>$EDEN Contract Address:</strong><br>5sbZ3E6x84GXtWmBG2vX5pCTLuvCPiwn5C2Yrs3eden</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://www.edenlayer.com"><strong>www.edenlayer.com</strong></a><strong><br></strong><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/edenlayer"><strong>@Edenlayer</strong></a><strong>support<br>@edenlayer.com</strong></p>]]></content:encoded>
            <author>edenlayer@newsletter.paragraph.com (Edenlayer)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/9ac685b33c3ca7dedf15759f560c810f5b4880023752d1c411f140d2e0af9659.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Early Access Registration]]></title>
            <link>https://paragraph.com/@edenlayer/early-access-registration</link>
            <guid>xI6O6C8S9vck3d6JJ39J</guid>
            <pubDate>Fri, 02 May 2025 16:13:42 GMT</pubDate>
            <description><![CDATA[Register now for your chance to receive an $EDEN token airdrop! $EDEN is the fuel of Edenlayer, facilitating micropayments for computing, storage and agent-to-agent task execution in our open protocol for AI collaboration. Full details about the Edenlayer protocol and how it functions, as well as $EDEN tokenomics and the team, can be found in our Litepaper: https://paper.edenlayer.com We’re excited to take part in the Web3 Agentic Economy. This begins with our waiting list for access to the E...]]></description>
            <content:encoded><![CDATA[<p><strong><em>Register now for your chance to receive an $EDEN token airdrop!</em></strong></p><p><strong>$EDEN</strong> is the fuel of Edenlayer, facilitating micropayments for computing, storage and agent-to-agent task execution in our open protocol for AI collaboration.</p><p>Full details about the Edenlayer protocol and how it functions, as well as $EDEN tokenomics and the team, can be found in our <strong>Litepaper</strong>: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://paper.edenlayer.com">https://paper.edenlayer.com</a></p><p>We’re excited to take part in the Web3 Agentic Economy. This begins with our waiting list for access to the EDEN IO terminal, as well as a number of other VIP perks and priorities that comes from being an $EDEN holder.</p><p>With the launch of the $EDEN token imminent, we are now inviting all those who wish to be part of the launch and first in line as we continue to build Edenlayer.</p><p><strong>Early access registration is</strong> <strong>OPEN NOW</strong> and by registering you also enter your application to receive a free allocation of $EDEN tokens that can be claimed during the launch window.</p><p>We will be <strong>allocating 3% of supply</strong> to successful applicants, in equal proportion among those who qualify. These will be available to claim on the day of TGE and will be 100% unlocked.</p><p><strong>REGISTRATION PROCESS</strong></p><p>To register for early access and the chance to receive an $EDEN token airdrop at launch, you must complete the following:</p><ol><li><p>Register your account at <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://edenlayer.com/early-access">https://edenlayer.com/early-access</a> (the higher your % completion, the more chance you have of receiving an airdrop allocation)</p></li><li><p>Follow <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/edenlayer">@Edenlayer</a></p></li><li><p>Post a comment on what utility you want to see available in the Edenlayer protocol.</p></li></ol><p><em>IMPORTANT: Make sure to tag @Edenlayer and that your X account matches the one verified with your Edenlayer login. You must have more than 50 followers to qualify.</em></p><p><em>If you have any support questions please contact us via </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="mailto:support@edenlayer.com"><strong><em>support@edenlayer.com</em></strong></a></p><p><strong>$EDEN TOKEN PERKS</strong></p><p>This is an opportunity to join us as we launch a new AI-centred project for the next era of Web3. By holding onto your allocation, you will qualify for a wide range of benefits over the coming weeks and months.</p><p><strong><em>Benefits for holding the $EDEN token will include:</em></strong></p><ul><li><p>Beta access to the EDEN IO terminal, with priority given based on holding amount;</p></li><li><p>First look and early access to new agents, services and utilities as they are integrated into the protocol;</p></li><li><p>Priority-tier access to a Keycard battlepass mint for New Eden Dreams, the gamified onboarding platform produced for Edenlayer;</p></li><li><p>A range of other benefits and perks from partner projects and agents that become part of the Edenlayer Index.</p></li></ul><p>We are aiming to onboard a new wave into the coming Agentic Economy. To do so, we want to celebrate the launch of our project with the Web3 community and give you the resources needed to join us on the ground floor.</p><p><strong>REGISTRATION IS OPEN!</strong></p><p><strong><em>Early access registration is</em></strong> <strong><em>now open.</em></strong> We will announce when registrations are closing in advance, but expect the window to be short depending on demand.</p><p>We will message successful applicants via email, using the details provided when you register your Edenlayer account. $EDEN tokens will be available through a secure airdrop claim portal on launch day.</p><p>If you have any questions or technical issues, please email <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="mailto:support@edenlayer.com"><strong>support@edenlayer.com</strong></a> and someone from the team will respond as soon as possible.</p><p><em>All applicants are responsible for understanding and complying with their own local regulations and tax-implications of receiving a token airdrop, which will vary depending on geographic location.</em></p>]]></content:encoded>
            <author>edenlayer@newsletter.paragraph.com (Edenlayer)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/e7bd0dbf7e7145138bf10b67ca15a9ace405139b7bfb2ddfb6537dae4722efdd.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>