Overview
Most firewalls do one thing: block. Sudont does something fundamentally different β when a transaction is suspicious but not clearly malicious, it interrogates the agent.The Interrogation Protocol is a structured, adversarial feedback loop. It doesnβt just block.
It teaches.
INTERROGATE verdict. The Cortex challenges the agent with a specific, actionable
demand. The agent self-corrects and resubmits. The corrected transaction re-enters the Diamond. If the
agentβs correction satisfies the Constitution, it is approved. If not, it is blocked and the failure
is logged.
The Three Verdicts
Every transaction that passes through the Diamond receives one of three verdicts from the Judge:| Verdict | Trigger | Outcome |
|---|---|---|
| APPROVE | Intent matches physics, within Constitution limits | EIP-191 signed approval artifact |
| BLOCK | Intent β physics, or Constitution hard-violated | Immutable rejection with reason code |
| INTERROGATE | Medium-risk signal detected | Cortex opens a challenge round |
The Feedback Loop
Agent Submits Request
The AI agent submits a transaction or approval request through the Sudont sidecar.
Diamond Pipeline Evaluates
The request passes through Constitution β Cortex/Cage β Judge. The Judge identifies a
medium-risk signal and returns
INTERROGATE.Cortex Issues Challenge
The Cortex states the specific violation and demands a correction. Examples:
- βApproval amount exceeds maximum. Reduce to exact trade amount.β
- βDestination not on allowlist. Provide an approved address.β
Agent Self-Corrects
The agent receives the structured prompt, adjusts its parameters, and resubmits the
transaction with the corrected values.
When Interrogation Triggers
The Cortex enriches every transaction with computed flags before the Judge evaluates it. The Judge queries the Constitutionβs Polar ruleset to classify risk.MEDIUM risk triggers interrogation.
| Signal | Why Itβs Suspicious |
|---|---|
Unlimited token approval (MAX_UINT256) | Agent may be granting unbounded access to a spender |
| Unverified spender address | Constitution does not recognize the counterparty |
| Non-allowlisted contract destination | Agent may be interacting with an unknown protocol |
Interrogation Scenarios
- Unlimited Approval
- Unknown Destination
An autonomous DeFi agent requests token approval with
amount = MAX_UINT256.Interrogation Trace
The Cortex applies an atomic rewrite β the unlimited approval is replaced with the exact amount
required for the current trade. The rewrite is logged as a
challenge_diff event. The agentβs
original request is preserved in the adversarial record.The Adversarial Record
Every interrogation β pass or fail β produces an immutable audit trail.challenge_diff Event Schema
challenge_diff Event Schema
Adversarial Record
What Interrogation Cannot Do
The Cortex is deliberately constrained:Cannot Approve
Only the Judge can produce a signed approval artifact. The Cortex has no signing authority.
Cannot Sign
No private key operations occur in the challenge round. Cryptographic operations are Judge-only.
Cannot Modify Policy
The Constitutionβs allowlists are read-only during a challenge. Policy is immutable mid-flow.
Cannot Loop Indefinitely
Each transaction receives at most one challenge round. A failed challenge is terminal.
Handling Interrogation in Code
See the SDK Quickstart for a complete TypeScript example of an agent that handles INTERROGATE
responses, self-corrects, and resubmits β implementing the full ReAct loop.

