AOXCORE is a modular monorepo engineered for enterprise-grade governance, security, and AI-assisted operational control on XLayer.
Institutional Hardening Notice
This repository is currently in its Core Hardening Phase.
Architectural foundations are established while security gates, upgrade guarantees, and validation workflows are being progressively strengthened.
Production Risk Disclosure (Pre-Mainnet / Design-Hardening Stage)
AOXCORE is currently under active architecture and security hardening.
Until an independent external audit and final governance signoff are completed, this codebase should be treated as pre-production and operationally risky for unmanaged mainnet use.
AOXCORE provides a layered architecture for decentralized governance infrastructure combined with operational intelligence systems.
The strategic objective is explicit:
Deliver a deterministic, auditable, and upgrade-safe DAO execution environment in which AI can assist operators under strict policy boundaries.
The system focuses on:
- upgrade-safe smart contract infrastructure
- deterministic governance execution
- AI-assisted operational analysis
- enterprise-grade monitoring and logging systems
The repository is organized into layered components.
Core on-chain logic and validation environment.
Includes:
- upgradeable Solidity modules (UUPS + namespaced storage)
- DAO governance primitives
- treasury and finance modules
- registry infrastructure
- security sentinel modules
Validation includes:
- unit testing
- integration testing
- fuzz testing
- storage layout verification
Operational service layer for monitoring and automation.
Capabilities include:
- Sentinel risk analysis API
- structured logging pipelines
- forensic event tracking
- operator policy enforcement
React-based operational console.
Features include:
- governance telemetry
- audit visibility dashboards
- protocol health monitoring
- operator workflow controls
Command-line utilities for operators.
Includes tools for:
- state inspection
- governance interaction
- reconciliation diagnostics
- operational reporting
Engineering documentation and rollout procedures.
Includes:
- migration runbooks
- security hardening plans
- engineering evolution roadmap
- CI guardrails for storage-slot safety
- XLayer + Sui legacy-honor execution plan
- AoxCore-XAS modest revolution plan
- V1βV2 mainnet migration and audit readiness baseline
aoxcore/
β
ββ src/ # Solidity smart contracts
β ββ aoxcore-xas/ # New XAS-centric Move + Solidity modules
ββ test/ # Foundry test suite
ββ script/ # Deployment and tooling scripts
β
ββ backend/ # Sentinel API services
ββ frontend # Operator console
ββ cli # Command-line operational tools
β
ββ docs # Governance and architecture documentation
β
ββ foundry.toml
ββ package.json
ββ README.md
AI assists operational workflows but does not replace governance controls.
Privileged actions remain:
- policy gated
- attributable
- reviewable
Upgrade discipline relies on:
- ERC-7201 namespaced storage
- migration rehearsal
- post-upgrade invariant verification
Operational reliability depends on structured logging.
Capabilities include:
- request correlation identifiers
- event categorization
- forensic reconstruction support
Governance authority is distributed across distinct roles:
- governance execution
- security sentinel
- audit verification
- upgrade authorization
Security posture improves continuously through:
- CI validation gates
- regression testing
- storage-slot parity checks
- automated remediation workflows
If forge is not available on your system, use the repository installer:
bash script/install_foundry.shWhat the installer does:
- verifies required system tools (
bash,curl,git) - installs
foundryupif missing - installs/updates the stable Foundry toolchain (
forge,cast,anvil,chisel) - verifies tool versions and surfaces actionable warnings for common repo issues (e.g., empty
lib/dependency folders)
Manual fallback (official method):
curl -fsSL https://foundry.paradigm.xyz | bash
foundryupPost-install verification:
forge --version
cast --version
anvil --version
chisel --versionBuild contracts:
forge build
Verify storage layout:
python script/check_storage_slots.py
Run tests:
forge test
Run fuzz testing:
forge test --fuzz
cd backend
npm install
npm run dev
cd frontend
npm install
npm run dev
python script/check_storage_slots.py
python script/static_solidity_sanity.py
AOXCORE contracts use the UUPS Upgradeable Proxy pattern.
Upgrade process includes:
- storage layout verification
- migration rehearsal
- multisig governance approval
- invariant verification after upgrade
Key operational documents:
docs/V1_V2_PARITY_MATRIX.mddocs/MIGRATION_REHEARSAL_RUNBOOK.mdscript/RehearseV1ToV2.s.solscript/VerifyV1ToV2Invariants.s.sol
AOXCORE uses structured logging to support operational forensics.
Features include:
- request IDs for every backend call
- security event categorization
- operator-safe error reporting
- full forensic diagnostic context
Documentation:
docs/LOGGING_AND_OPERATIONS_STANDARD.mddocs/DEVELOPMENT_FULL_EVOLUTION_PLAN.mddocs/XLAYER_SUI_FULL_GATEWAY_BLUEPRINT.mddocs/WEB_PUBLISH_AND_RC_CHECKLIST.mddocs/GOVERNANCE_ENTERPRISE_REFACTOR_PLAN.md
Typical development cycle:
- implement feature
- add tests
- run storage validation
- run fuzz testing
- open pull request
- CI validation executes
Only validated changes are merged.
Contributions must:
- include relevant tests
- preserve upgrade safety
- follow repository coding standards
- pass CI validation
See docs/CONTRIBUTING.md.
This project is licensed under the MIT License.
See the LICENSE file for details.
For production upgrade discipline (storage continuity, governance safety, and audit evidence), follow:
docs/V1_V2_MAINNET_AUDIT_READINESS.mddocs/MIGRATION_REHEARSAL_RUNBOOK.mddocs/V1_V2_PARITY_MATRIX.mddocs/SECURITY.md
These documents define the minimum acceptance criteria before mainnet upgrade execution.
For external-chain consumption (e.g. aoxchain), use the wrapper modules under src/aoxc-library and the generated approved-manifest:
python3 script/generate_library_manifest.py
cat src/aoxc-library/manifest/approved-modules.jsonDetailed integration and migration blueprint:
docs/AOXCHAIN_LIBRARY_INTEGRATION.md
Additional sectioned standalone layout docs:
docs/AOXC_STANDALONE_LIBRARY_LAYOUT.mddocs/AOXCHAIN_BACKEND_INTERFACE_CONTRACT.md
Use this checklist for deterministic local setup and CI runners:
- Install toolchain with
bash script/install_foundry.sh. - Confirm PATH includes
~/.foundry/bin. - Pin and inspect versions using
forge --version. - Initialize dependencies if needed:
git submodule update --init --recursive
- Run repository validation pipeline:
bash script/validate_foundry_pipeline.sh
forge: command not found- Re-open your shell, or run:
export PATH="$HOME/.foundry/bin:$PATH"
- Re-open your shell, or run:
- TLS/HTTPS download failures
- Ensure CA certificates are installed on your OS.
- Build fails due to missing imports in
lib/- Run submodule/dependency initialization before
forge build.
- Run submodule/dependency initialization before
- CI environment mismatches
- Print tool versions as an explicit CI step and fail fast when
forgeis absent.
- Print tool versions as an explicit CI step and fail fast when
This workflow is designed to be idempotent and safe to run repeatedly across developer machines and ephemeral CI agents.