— Principle 01
Adapter Pattern.
Layers 1 and 2 are not built. They are adopted. Solon connects to existing wallets, protocols, custodians, and chains through adapters — never competing with Coinbase, Stripe, Fireblocks, or Circle. They become distribution channels instead.
x402 · A2A · AP2 · ACP · MPP
All major protocols are addressed by adapters.
New protocols → ship a new adapter, not a new core.
— Principle 02
Non-Custodial by Design.
Solon never holds a complete signing key. Policy enforcement is structural: when an evaluation fails, the signing request is never produced. There is no policy-bypass path that Solon can be tricked into taking — because the bypass path doesn't exist in the codepath.
Policy fails → no signing request emitted.
Not a process veto. A structural one.
No keys held = no keys to leak.