Hubless

Open AI Market Economy

Hubless is the market hub for decentralized intelligence. It enables open protocol driven sourcing, distribution and routing for the networked intelligence.

Github Github Vision Paper Vision Paper Technical Documentation Technical Documentation Pervasive.link Hubless
Hubless
Asset Registry
Element Description
Asset Onboarding System Handles registration, verifies authenticity and completeness of submitted data, and indexing of new assets.
Schema Registry Defines schema for asset catalog - fields like capabilities, technical specs, inputs, outputs. Enforces standard model cards for comparability and compliance.
Asset Metadata Catalog Records technical specs, capabilities, dependencies, benchmarks, pricing, tags, update history and more for all listed AI assets.
Provenance & Authorship Records Registers & verifies author identity, ownership rights, and contribution history.
Performance & KPI Tracking Real time trackers for Uptime Metrics, Latency & Response Time, Throughput & Scalability, Error Rate & Failure Logs, Usage Volume Metrics, SLA Compliance Tracker etc.
Licensing Metadata Machine interpretable and human readable encoding of terms of use, restrictions, policies and norms to follow while deploying and usage.
Fingerprinting & Hashing Creates cryptographic IDs for asset verification and anti-tampering.
Price Model Engine Allows authors to place human readable and machine interpretabl flat, tiered, and dynamic market-based pricing through programs and algorithms.
Compatibility Matrix Declares supported APIs, formats, and integration targets. Prevents purchase of incompatible assets.
Listing Visibility Controls who can view an asset based on roles, permissions, geography, or buyer segment. Supports public, private, and restricted exposure with dynamic rules tied to policy and compliance needs.
Discovery, Curation, and Evaluation
Element Description
Semantic Search and Retrieval Natural language and structured filters to find assets by capability and context. Pluggable system for custom search and ranking.
Semantic Matching Uses semantic parsing and intent inference to align tasks with user/agent objectives and domains.
Discovery Protocols Protocols enabling agents to navigate across Hubless networks to find assets and services matching utility heuristics.
Curated Collections and Playlists Human and algorithmic collections curated by jobs, goals or domain themes. Balances algorithmic discovery with expert judgment.
Leaderboards & Badges Public or private leaderboards using transparent eval protocols. Highlights strengths, tradeoffs, and known limitations for buyer clarity.
Evaluation Registry On demand tests for quality, safety, bias, and robustness on private or public datasets. These tests can be templatized.
Asset/ Author Subscription Enables buyers to follow specific assets or authors for updates, releases, and announcements. Delivers automated signals to maintain engagement and retention.
Lifecycle
Element Description
Publishing protocol Defines how sellers list assets with required metadata, validation, versioning, and moderation. Ensures repeatable submissions, prevents bad listings.
Composition protocol Standard way to declare how assets connect with inputs, outputs, and dependencies. Enables bundles and pipelines with clear compatibility rules and testable contracts.
Distribution protocol Securely distributes asset catalogs, entitlements, keys, endpoints, and artifacts to buyers with reliable controls and revocation mechanism.
Negotiation protocol Structured offers, counteroffers, and requirement capture for private or public deals. Records price, SLAs, scope, and exceptions in a machine-readable deal sheet for contracting.
Contracting protocol Templates, clauses, e-signature, and consent capture in a machine-readable form. Binds terms to entitlements, renewals, and termination flows.
Compatibility check Automated validation of schemas, APIs, formats, and target environments. Blocks mismatches before purchase.
Alignment check Evaluates pre and continuous checks on safety, policy fitness, and ethical risks. Gates access by alignment, region, age, and purpose.
Settlement protocol Executes transparent, rules-based payouts once delivery conditions are met and verified. Also handles multi-party revenue splits,
Payout Splitter Divides revenue among authors, curators, and operators. Honors contractual splits and programmatic royalties.
Dispute resolution Provides a structured process for resolving conflicts between buyers and sellers. Includes mediation, evidence review, decision making, and enforcing outcomes as per contracted policies.
Audit Produces verifiable logs and reviews of operational, usage, compliance activities for each listing & transaction.
Reviews & Feedback Feedback on each asset, tied to specific versions in use. Includes reviews, issue reports, eval results, and usage signals.
Reputation Updater Updates provider and asset reputations over time. Penalizes regressions and rewards reliability.
Metering and Billing Usage Based Price by tokens, requests, tasks, or API units. Accurate metering, limiting and usage tracking
Dataset Builder Curates labeled tasks and results for training. Supports periodic retraining of learned routers.
Quality Criterias
Element Description
SLA Defines execution standards, guarantees, and penalties used to evaluate agent performance.
QoS Captures metrics like response time, reliability, and precision for outcome evaluation.
Result Evaluation Validates task outputs using cryptographic, peer, or agent-based methods.
Ethics Encodes constraints ensuring user actions align with local or global ethical rulesets.
Exceptions Captures edge cases or known failure states and recommended actions for the same, allowing graceful fallback or bypass.
Human in Loop Injects human agent oversight for sensitive, ambiguous, or high-stakes action prior to finalization.
Super Distribution
Element Description
Asset Transport Asset is encrypted and distributed. Decryption at execution layer. Identifies every artifact by hash so mirrors are verifiable and deduped. Makes distribution permissionless while preserving integrity & security.
Runtime Rights Enforcement Compact, signed grants that encode use rights, limits, and obligations. Travels with the artifact so checks work anywhere it runs.
Policy Execution Engine Evaluates rights at access time with deny-by-default semantics. Supports time bounds, scopes, usage caps, and revocation.
Mirror and Forward Mesh Finds nearby nodes with the asset or capacity to fetch it fast. Prefers healthy, low-latency peers to reduce tail times. Forwards encrypted blobs without exposing plaintext at transit nodes. Optimizes routes for throughput, cost, and regional policy.
Catalog sync protocol Synchronizes batch or selective asset listings and updates across local, regional and global marketplace hubs. Uses policy to preserve provenance, respect visibility settings, and prevent duplication or conflicts.
Hot Cache Network Ranks assets by recent usage, fan-out, and miss cost. Promotes hot items to edge caches near users.
Replica Planner Chooses where to place copies across clouds and regions. Balances demand, cost, and policy constraints.
Smart Prefetcher Pulls likely-next assets based on workflow graphs. Cuts cold starts for common multi-step tasks.
Eviction Manager Applies size, age, and utility to free space predictably.
Content Delivery Service Serve encrypted artifacts with zero-trust checks at the edge. Provide consistent throughput under load.
Super Routing
Element Description
Task Spec Schema Captures goal, inputs, outputs, and quality targets in a compact form. Creates a specification the router can optimize against.
Constraint Collector Gathers hard constraints like policy, residency, budgets, and allowlists. Separates must haves from nice to haves for later scoring.
Decomposition Engine Breaks complex requests into steps, calls, and checkpoints. Enables per step routing and local optimization.
Capability Matcher Maps each step to needed skills and interfaces. Narrows the provider set before heavy evaluation.
Provider Normalization Standardizes key technical specifications in provider catalog metadata. Enables apples to apples comparison across vendors.
Variant and Version Mapper Tracks sizes, fine tunes, and hardware variants. Ensures compatible selection for a given step and budget.
Score feeder Feeds static features -provider metadata such as price tiers, safety labels, quotas and real time signals - error rate, latency etc to the scoring engine.
Score Composer Multi Objective Utility scoring module that combines accuracy, cost, speed, reputation with weights. Supports custom goal, weights per tenant and task.
Symbolic Router Uses rules and policies to choose a path. Gives deterministic behavior for regulated workloads. Solves allocation with costs and limits, Produces a feasible plan that meets hard rules.
Neural Router Uses models trained on outcomes to pick providers. Routes by embedding distance between task and capabilities. Improves with feedback from success and user ratings.
Hybrid Router Blends symbolic and neural votes into a final pick. Falls back to safe defaults when signals are weak.
Meta Router Chooses which router type fits task complexity. Switches strategy as context and risk change.
Locality Routing Routes jobs based on locality specifications and local policies alignment.
Route Explainability Shows inputs, weights, and constraints that shaped the pick. Links to evidence, metrics, and past performance.
Cost, Risk Evaluator Estimates spend, latency, and failure risk for the route. Helps buyers compare alternatives with clarity.
Objective Optimizer Chooses regions and instances to hit target objectives. Adapts to network demand and congestion in real time.
Routing SLOs Tracks budgets per step and end to end. Triggers replans when path time creeps up. Watches error rates, retries, and fallbacks. Promotes stable paths during incident windows.
Feedback Loops Captures human ratings, business KPIs, and off policy signals for learning purposes.
Super Sourcing
Element Description
Goal Spec Schema Defines inputs, outputs, KPIs, and acceptance criteria for the goal. Provides a stable contract that scouting and ranking can optimize against.
Constraint Collector Captures policy, residency, budget, risk, and allowlists. Separates hard musts from negotiable preferences for later tradeoffs.
Tradeoff and KPI Modeling Expresses accuracy, latency, cost, and reliability targets. Converts or normalizes units so providers can be compared fairly.
Explore–Exploit Profile Stores the user's appetite for trying new options vs proven ones. Guides how wide scouting should go and how fast to promote winners.
Scouting Agents Discovers providers, models, tools, and datasets across regions. Indexes entries with capabilities, limits, and pricing tiers.
Micro-bench Runner Executes small test jobs to measure accuracy, latency, and cost. Produces signed, reproducible evidence snapshots for comparison.
Stability Probe Runs stability tests under fluctuating load. Flags jitter, throttling, and error patterns before production.
Policy Fit filter Eliminates candidates that violate rights, safety, or licenses. Shrinks the pool to only compliant, usable options.
Multi KPI Ranker Scores candidates by multiple objectives such as weighted accuracy, speed, price, and uptime, outputs a transparent contextual leaderboard with supporting metrics.
Risk Assessor Evaluates vendor concentration, lock-in, and supply volatility. Attaches risk bands that affect promotion and fallback order.
Curator Network Experts curate listings in their specialization areas and for specific goals. Playlists act as fast-start pools with clear inclusion criteria. Lets buyers subscribe to trusted curators for specific goals.
Sourcing pool managment Maintains a ranked primary, secondary, and emergency pool. Monitors health, quality drift etc to ensure warm readiness for immediate routing handoff.
Pool to Router Interface Bundles ranked options with metrics, limits, and hints. Delivers a compact, cacheable package to the router.
Contracting & Dispute resolution
Element Description
Contract Terms Defines machine interpretable and human readable terms. Captures deliverables, scope, price, SLAs, constraints, payment, escalation, remedies and acceptance criteria.
Job Binding Service Binds a specific contract version to a job before it runs. Freezes terms, rights, and limits for the execution window.
SLA Compiler Turns uptime, latency, accuracy, and support targets into checks. Generates monitors and thresholds tied to each contract.
Approval Workflow Routes contracts and changes to specific workflows. Records rationale and exceptions for audit purposes.
Settlement Evaluator Evaluates output, compliance to SLA, policies and calculates charges, credits, and penalties from outcomes. Executes remedies.
Evidence Locker Stores metrics, traces, artifacts, and communications immutably. Links evidence to clauses and SLA checks for clarity.
Dispute Workflow Engine Guides negotiation, mediation, and arbitration steps. Calculates remedies and triggers settlement outcomes.
Operation Layer
Element Description
Composition Tools Composes assets and services into executable workflows. Aggregates cost, optimizes latency, and successful integration.
Auto Scale Controller Adds and sheds workers based on demand from market hub, SLOs and queue depth. Prevents overprovisioning while absorbing bursts.
SLO Monitor Wires real-time metrics to contractual obligations, tracks deviations from SLO, errors and metrics. Autoscaler and router act on breaches immediately.
Health and Failover Continuously checks node and service liveness. Triggers drain and reroute before users notice.
Quorum Failover Moves traffic when replicas or regions degrade. Keeps rights enforcement intact during failover.
Pre & Runtime Policy checks Evaluates safety labels, usage rights, and content rules. Blocks unsafe or forbidden actions before and during execution. Applies residency and egress constraints by region.
Aggregated Telemetry Collects usage patterns without sensitive payloads. Guides caching and placement decisions safely.
Trust and Attestation Requires proofs for runtime and infra integrity. Prefers providers with current attestations. Verifies identities, keys, and signatures.