Trust Scoring and Counterparty Controls
Trust scoring is how Conto turns recipient history, verification, and network intelligence into a practical control surface for agent payments. It helps answer a simple question before money moves:How comfortable should this agent be paying this address right now?
What Feeds the Trust Score
Conto calculates trust with four weighted components:| Component | Weight | What it reflects |
|---|---|---|
| History | 30% | Transaction count, volume, and relationship depth |
| Reliability | 30% | Success rate, failed transactions, flagged activity |
| Activity | 20% | Account age, recency, and consistency of behavior |
| Verification | 20% | Manual verification, network data, and external enrichment |
How Trust Levels Are Assigned
Internally, Conto calculates a score on a0.0 to 1.0 scale and then maps it to a trust level.
| Internal score | Trust level | Notes |
|---|---|---|
< 0.2 | UNKNOWN or BLOCKED | Counterparties with low scores only become BLOCKED when there are actual negative signals, such as failed or flagged transactions |
0.2 - 0.49 | UNKNOWN | Limited history or weak signal quality |
0.5 - 0.74 | VERIFIED | Reasonable confidence, but not yet a fully trusted recipient |
>= 0.75 | TRUSTED | High-confidence recipient, assuming verification requirements are satisfied |
Low data is not the same as malicious behavior. Conto treats many new counterparties as
UNKNOWN
rather than auto-blocking them.External Enrichment and Compliance Signals
Conto Network Intelligence
Conto aggregates anonymized network signals across organizations to improve counterparty evaluation. This data takes precedence when it exists because it reflects real payment behavior on the platform.Fairscale for Solana
For Solana addresses with no existing network trust score, Conto can enrich the counterparty with Fairscale data.- Used for cold-start reputation on Solana
- Normalized into Conto’s
0.0 - 1.0trust scale - Fail-open design: enrichment helps, but provider unavailability does not automatically block
Sanctions Screening
Sanctions and compliance checks are separate from trust scoring.- Local OFAC screening is built in
- Chainalysis and TRM Labs can be layered on for enterprise use
- Compliance checks are fail-closed for enterprise screening providers
How Trust Becomes a Control
Trust data feeds directly into policy evaluation. Common trust-aware controls include:TRUST_SCOREthresholds- Counterparty status and trust-level rules
- New-recipient approval workflows
- Auto-freeze and alert thresholds when trust drops sharply
Canonical Patterns
1. New vendor safe path
- Unknown counterparties are allowed to exist but not to spend freely.
- Require approval for first payments or low-trust recipients.
- Promote to normal flow once transaction history and verification improve.
2. Trusted vendor fast path
- Allow trusted or verified counterparties to pass with fewer interruptions.
- Keep hard denies for sanctioned or blocked recipients.
- Layer spend limits and time windows on top of trust so no single signal has too much power.
3. Solana cold-start enrichment
- Use Fairscale when a Solana recipient has no Conto network history.
- Combine that score with a conservative approval threshold.
- Let the relationship graduate as real transaction history builds.
4. Trust deterioration response
- Watch for trust score drops, repeated failures, or new flags.
- Route affected counterparties into approval workflows.
- Use alerts or auto-freeze when trust degradation becomes severe.
Look Up Trust Programmatically
Use the SDK network trust endpoint to inspect any wallet address:- Global trust information
- Agent-specific relationship trust, when it exists
- Flags and risk indicators
- Aggregate transaction history
Trust, Approvals, and Policy Design
Trust scoring works best as part of a layered model:- Use trust to classify recipients.
- Use approvals to review the gray area.
- Use hard policy denies for clearly forbidden destinations.
- Fast lane for trusted counterparties
- Review lane for unknown or changing counterparties
- Blocked lane for clearly disallowed behavior
Related Guides
Trust Providers
See Fairscale, sanctions screening, and provider priority
Approval Workflows
Use trust levels as a review trigger
Securing Agents
Build a layered risk model for agents that spend
Recipes
Copy-paste trust lookup and policy setup commands