Topics Blockchain

Newton Protocol (NEWT): On-chain finance meets intelligent automation

Advanced
Blockchain
Explainers
Altcoins
DeFi
ll

Despite crypto finance’s promise of decentralized access and programmable logic, it primarily still relies on manual user intervention. Decentralized finance (DeFi) users must approve transactions, claim rewards, rebalance portfolios, monitor price thresholds and execute trades themselves. Even routine actions — such as harvesting staking yields, moving assets across chains or managing risk exposure — require active input through clunky interfaces. Complex workflows involving multiple steps across different protocols are especially cumbersome, and are prone to delays and human error.

Automating these actions would reduce friction and make on-chain finance more scalable, accessible and efficient. This is exactly what Newton Protocol (NEWT) offers. The platform introduces the first verifiable automation layer in crypto, allowing users to define their intent, automate complex tasks and delegate execution to autonomous agents operating on their behalf across protocols.

Newton allows users to set programmable permissions and rules around what can be done with their assets. These instructions are enforced using zero‑knowledge proofs (ZK proofs) and trusted execution environments (TEEs), ensuring that agents follow the rules without ever gaining complete control. Newton supports session keys bound to user‑defined policies so that tasks can be carried out autonomously without compromising security or custody.

All actions performed by agents are verifiable, constrained and revocable. Instead of managing every step manually, users describe what they want to happen, and the network ensures it executes the actions securely and transparently. The protocol represents a significant shift, from user‑driven, manual execution on-chain to intent‑based automation.

Key Takeaways:

  • Newton Protocol (NEWT), a decentralized solution, allows users to deploy intelligent agents that execute complex on-chain operations, based on predefined rules, thereby automating manual workflows in DeFi.

  • The platform's native token, NEWT, is used for staking and stake delegation, transaction execution fees, agent operator collateral, agent registration and protocol governance.

  • NEWT can be bought on Bybit as a USDT Spot pair and as a USDT Perpetual contract.

New-user-5050-USDT_728x90.png

What is Newton Protocol?

Newton Protocol (NEWT) is a crypto automation infrastructure platform designed to carry out complex financial operations on behalf of users in a secure and verifiable way. Operations are carried out by programmable autonomous agents that handle delegated execution of tasks, such as asset transfers, swaps, staking actions, rebalancing on yield protocols and other forms of automated on-chain finance, all governed by user-defined permissions and enforced through cryptographic proofs. By shifting operational responsibility to off-chain agents while retaining on-chain verification, Newton streamlines on-chain finance without compromising on trust or control.

The protocol operates on Ethereum (ETH), as well as some Ethereum virtual machine (EVM)-compatible chains, and introduces a dedicated agent execution layer that connects users, developers and operators in an intent-driven system. It uses a delegated proof of stake (DPoS) consensus mechanism whose validators secure the network and verify agent actions using cryptographic evidence, such as attestations and ZK proofs. This structure allows the protocol to offload computational tasks while anchoring trust in a decentralized validator set.

Magic Labs and Newton

Newton Protocol officially launched its native token, NEWT, on Jun 24, 2025. The network’s early infrastructure and design were developed by Magic Labs, a company known for its work on embedded wallet infrastructure. Magic Labs was co-founded by Sean Li, Arthur Jen and Jaemin Jin in San Francisco, CA, in 2018. Newton is backed by the Magic Newton Foundation, which oversees the protocol's road map, early deployments and incentive structures.

Newton's primary role is to let users automate financial operations through agents that operate within strict boundaries set by the user. These agents execute logic off-chain, but rely on verifiable computation and permission models that keep user funds safe and usage transparent. The protocol supports revocable session keys and customizable execution policies enforced at the cryptographic level, creating a foundation for automation that remains accountable and auditable.

At a high level, Newton introduces a new execution layer to the crypto stack that’s focused on programmable autonomy. It serves users who want to automate on-chain workflows without giving up custody, developers who want to build advanced financial logic and operators who carry out tasks for rewards under strict, enforced constraints.

How does Newton Protocol work?

Newton Protocol operates as a verifiable automation layer that coordinates users, developers, operators and validators through a permissioned agent execution model. Its architecture offloads computation to off-chain agents while ensuring security and correctness through on-chain validation. The protocol relies on a DPoS consensus mechanism to maintain integrity and to finalize transactions. 

Users

Users submit automation intents they want performed and delegate execution to intelligent agents. They do this by setting precise permissions — what should be done, under what conditions and with which assets. These permissions are bound to session keys, and can be revoked at any time. Users maintain control of their funds throughout the process.

Developers

Developers build automated agents that carry out specific types of operations, such as automated trading, yield optimization, cross-chain bridging or treasury rebalancing. They use Newton’s software development kit (SDK), as well as zero-knowledge machine learning (zkML) tools, to define agent logic and constraints. These AI agents are then published on the network, becoming available for operators to execute on behalf of users.

Operators

Operators are actors who select tasks from available orders on the automation marketplace and execute transactions based on user intent. They run the agents in TEEs, generate cryptographic ZK proofs and submit them to the protocol for validation. Once the proofs are verified, operators receive execution fees. Operator behavior is tracked, and reputation scores are assigned based on accuracy, performance and proof quality.

Validators

Validators use DPoS to secure the protocol. They stake NEWT tokens, verify agent execution and finalize transactions by validating cryptographic attestations and ZK proofs submitted by operators. Validators serve as the protocol’s final line of verification, ensuring that all off-chain execution aligns with users’ original permissions and that no unauthorized behavior is accepted.

Automation agents

Automation agents are task-specific programs designed to carry out operations across DeFi systems and multiple protocols. Some examples of agent types include AI-governed trading agents, market-making bots, liquidity farming agents, automated risk managers, rebalance schedulers and arbitrage agents. As of the time of this writing (June 30, 2025), the project has officially fielded only one agent — a recurring buy agent that automates recurring token purchases on behalf of the user. 

Each verifiable agent operates within a strict execution envelope defined by the user and developer. Agents have no open-ended control, and must prove that their actions fall within the approved rule set.

This system architecture allows Newton to deliver programmable automation without compromising user custody, offering a model in which trust is replaced with verifiability, and all participants operate under enforced constraints.

Newton Protocol key features

Newton Protocol introduces a set of core features that allow agents to operate autonomously, securely and under strict verifiability guarantees. These features enable agents to execute off-chain logic while ensuring all actions remain auditable and confined to user-approved boundaries. Newton relies on TEEs and ZK proofs for execution integrity, zkPermissions for granular control and cross-chain support for interoperability across networks.

Confidential agent execution via TEE and ZK proofs

Agent actions on Newton are executed off-chain inside TEEs. This ensures that the logic runs in a secure, hardware-isolated environment so that neither the operator nor any external actor can tamper with the code or access user data. After execution, TEEs generate cryptographic attestations that confirm the exact code was executed in a genuine environment.

To complement this, Newton requires agents to generate ZK proofs that validate the correctness of the execution without revealing sensitive information. Operators must submit these ZK proofs, along with the TEE attestations, to validators, who verify both on-chain. This dual-verification mechanism ensures that agents execute exactly what the user permits, and that the operator cannot manipulate the process or extract private data.

The result is confidential yet verifiable execution, making Newton suitable for handling sensitive operations, such as trading strategies, asset transfers and portfolio rebalancing, without compromising user privacy or control.

Programmable user permissions via zkPermissions

Newton introduces a permissioning model called zkPermissions, a ZK-based framework that allows developers to define fine-grained execution rules. These rules specify exactly what an agent can do, under what conditions, which assets it can interact with and when the permissions expire or reset.

This approach offers a high level of programmable security without requiring full on-chain execution, allowing developers to delegate authority without relinquishing control. All logic is enforced off-chain but validated on-chain, with ZK proofs ensuring that every agent action aligns with the defined constraints.

Cross-chain interoperability

Newton supports execution across Ethereum and several EVM-compatible chains. Agents can monitor events, trigger actions and execute transactions on different networks as long as those chains are supported by Newton validators.

The protocol maintains a consistent security model across chains: agents still operate in TEEs, generate ZK proofs and follow zkPermissions, regardless of the chain involved. Validators verify the execution using the same standards, ensuring that cross-chain automation remains secure, verifiable and bounded by user-defined rules.

This interoperability expands Newton's utility beyond a single ecosystem, enabling the automation of strategies that span diverse protocols and assets.

What is the NEWT crypto token?

NEWT is an ERC‑20 token issued on Ethereum on Jun 24, 2025. It serves as the native utility token of the Newton protocol ecosystem, supporting its core operations. The token’s main functions include:

  • Staking and network security. NEWT is used to delegate stake to validators in the network’s DPoS system, ensuring network integrity and helping secure the protocol.

  • Execution and fee payments. Agents pay execution fees in NEWT, and users utilize the token to pay for issuing or updating zkPermissions and session keys.

  • Collateral for operators. Operators are required to post NEWT as collateral before securely executing agent tasks.

  • Agent registration. Developers use NEWT to publish agents into the Newton model registry, making them accessible to users and operators.

  • Protocol governance. In the future, NEWT holders will be able to vote on protocol upgrades, fee structures and treasury disbursements once decentralized governance has been activated.

NEWT has a maximum and total supply of 1 billion tokens. There are no burning or inflation mechanisms, and no new issuance is planned beyond the initial distribution. The circulating supply at launch was approximately 21.5% of the total.

Token distribution was split between internal and community allocations, as shown below:

NEWT token distribution.

Source: docs.newt.foundation

NEWT crypto token airdrop

At the time of the token generation event (TGE), Newton Protocol initiated an airdrop to early users and contributors. Eligibility is based on participation in the Newton community, use of affiliated products and engagement with early campaigns. A total of 10% of the supply is allocated for the airdrop. All airdropped tokens are fully unlocked at launch. Users can check their eligibility for NEWT tokens at https://newton.xyz/app/airdrop.

Skinny_Banner-1600x400.webp

Where to buy NEWT crypto token

The NEWT token is available on Bybit as a Spot pair with USDT, and as a USDT-based perp contract. You can also take advantage of Bybit's event dedicated to the NEWT token to grab a share of the 2 million NEWT prize pool. New users can earn NEWT tokens by accumulating a deposit volume of at least 1,000 NEWT, or by depositing 100 USDT and trading 100 USDT worth of NEWT via their first trade. Meanwhile, existing users can also earn rewards by trading at least 500 USDT worth of NEWT on the Bybit Spot market. This event is valid through Jul 7, 2025, 10AM UTC.

Closing thoughts

Newton Protocol aims to enable automated on-chain finance in a way that few other platforms have attempted. The sheer complexity of many operations in modern DeFi is likely to lead to strong user demand for the protocol's services. With user demand growing, we may hear much more about this innovative platform in the second half of 2025 — and beyond. 

#LearnWithBybit