Networks

In Symbiotic, networks are defined as any protocol that requires a decentralized infrastructure network to deliver a service in the crypto economy and need economic security to operate safely. These can be Layer 1 blockchains, Layer 2 solutions, or other decentralized systems that require stake-based security guarantees.

Here’s an overview of a few key networks in Symbiotic:

  1. Ditto Network: Ditto Network is a composable execution layer designed to run event-driven automations. By leveraging shared security, Ditto ensures trustless, reliable execution of workflows across EVM-compatible chains. Developers can use Ditto to automate complex processes, such as liquidation protection, cross-chain asset swaps, and yield farming strategies, unlocking new possibilities for decentralized applications and AI-driven agents.

  2. Tanssi Network: Tanssi empowers developers to deploy sovereign, customizable appchains anchored by Ethereum-grade security, eliminating traditional infrastructure complexities. Purpose-built for demanding applications like Real-World Assets (RWAs), stablecoins, and advanced coordination protocols, Tanssi delivers a complete, production-ready environment through decentralized, automated orchestration. This includes everything from validator management and rotating sequencers to integrated RPCs, indexers, and explorers—all provisioned out-of-the-box.

  3. Capx Cloud: Capx Cloud is a decentralized infrastructure network, designed to support the deployment and scaling of tokenized AI applications. Leveraging Symbiotic's robust operator framework, Capx Cloud provides scalable, cost-effective, and secure compute solutions for AI workloads while ensuring crypto-economic security through operator staking and decentralized governance.

  4. Kalypso: Kalypso is a circuit-agnostic ZK proof marketplace enabling users to outsource generation of ZK proofs to sophisticated hardware providers. It leverages TEEs to support circuits with private inputs. The orderbook-based matching engine allows users to tailor their proof requests by prioritizing either response time or cost efficiency, offering flexibility to meet diverse needs.

Last updated