XDaLa by XGR.Network

Business processes need more than smart contracts.

Your process should be digital, automatable and auditable. But in the real world, sensitive data, approvals, APIs, cutoffs and edge cases break the happy path. XGR adds the missing process layer: validate inputs, execute the next step, and log the decision — without exposing plaintext business data.

Why normal automation breaks
Sensitive business data
Different inputs every time
API failures and missing data
Cutoffs, approvals, exceptions
Example company process

A real process is more than a single contract call: validate the current step, decide what is valid, execute the next action, and keep the outcome explainable.

Checkrules + data
Approvedecision
Pay + Logauditable outcome
XDaLa on XGR Validate returned data. Decide whether it is valid. Execute the next step. Log the result on-chain.
What this means
  • private business data can stay encrypted
  • outcomes become explainable
  • API outputs can be validated, and the decision result is logged on-chain
Validation Check rules, limits, permissions and real-world conditions before anything moves.
Execution Trigger the next step in the process instead of stopping at a static contract call.
Decision logs Keep a verifiable record of what happened, why it happened and what happened next.
Why XGR

Why XGR stands out

A modern chain for real-world automation — fast enough for user-facing workflows, strict enough for auditable process execution, and familiar enough for builders to adopt quickly.

Fast chain. Clear rules. Verifiable outcomes.
~2s
Block time · responsive UX for real process steps
EVM
Works with Solidity, Hardhat, Foundry and familiar tooling
Low power
Energy-efficient by design
xDaLa
Deterministic Layer-1 Process Engine — xdala.testnet.xgr.network
Encrypted artifacts
On-chain receipts · privacy-first (grant-based)
Deterministic decisions
Same validated inputs · same rule path
Solidity Hardhat Foundry ethers.js web3.js

How XDaLa works (Builder quickstart)

This is the smallest builder flow — not the full product story. In practical terms: define a rule, store it in XRC-137, publish an XRC-729 orchestration (OSTC), then start a session.

The rule logic is deterministic. External API calls are not. XDaLa validates returned data, evaluates the rule, and records the decision result on-chain.

1 · Rule

1. Define the rule

Write an XRC-137 JSON rule that says which inputs are expected and what should happen when the result is valid or invalid.

Minimal XRC-137 example
{
  "payload": {
    "Amount": { "type": "int64" }
  },
  "rules": [
    "[Amount] > 0"
  ],
  "onValid": {
    "payload": {
      "result": "ok",
      "amount": "[Amount]"
    }
  },
  "onInvalid": {
    "payload": {
      "result": "invalid",
      "reason": "Amount must be > 0"
    }
  }
}
2 · Deploy

2. Put the rule on-chain

Deploy an XRC-137 contract and store the rule JSON in it. That contract becomes the on-chain container for one rule document.

Canonical interface shape
interface IXRC137 {
  function getRule() external view returns (string memory);
  function setRule(string calldata jsonOrBlob, bytes32 rid, string calldata suite) external;
  function isEncrypted() external view returns (bool);
  function getEncrypted() external view returns (bytes32 rid, string memory suite);
}

After deployment, call setRule(ruleJson, 0x00..00, "") to store plain JSON, then verify via getRule().

3 · Orchestration

3. Publish the orchestration

Publish an XRC-729 orchestration (OSTC) that maps a process step such as S1 to the rule contract and defines the valid and invalid next paths.

Minimal orchestration example
{
  "id": "hello_xdala",
  "structure": {
    "S1": {
      "rule": "0x<your_XRC137_rule_contract>",
      "onValid": {},
      "onInvalid": {}
    }
  }
}

Your client typically pins an ostcHash (keccak256 of the UTF-8 JSON) for auditability and later binds that hash into the signed session permit.

4 · Session

4. Start the session

Fetch xgr_getCoreAddrs and xgr_getNextProcessId, build and sign an EIP-712 SessionPermit, then call xgr_validateDataTransfer to submit the current step for validation.

Minimal RPC call shape
{
  "jsonrpc": "2.0",
  "id": 1,
  "method": "xgr_validateDataTransfer",
  "params": [
    {
      "stepId": "S1",
      "payload": { "Amount": 42 },
      "permit": { "...": "SessionPermit (EIP-712) + signature" },
      "orchestration": "0x<your_XRC729_contract>"
    }
  ]
}

The signed SessionPermit binds the session to values such as ostcId, ostcHash, sessionId, maxTotalGas and expiry. XDaLa then evaluates the submitted data against the rule, selects onValid or onInvalid, and the orchestration determines the next path and resulting actions.

Want the full contract interfaces, OSTC schema, typed-data definitions and RPC details? Jump into Docs.

Use cases

What you can build

XDaLa is strongest where a normal smart contract is too static: approvals, exceptions, policy checks, multi-step execution and auditable handoffs.

Build the process layer — not just the endpoint.
Policy-gated transfers

Movement with guardrails

Enforce roles, limits, approvals, or whitelists before value moves. Make exceptions explicit and auditable.

Who can move value — and under which conditions?
Automations

From events to execution

Trigger multi-step actions on schedules or external facts. Spawn sub-flows and loop with safeguards.

When a rule evaluates true, the process can continue.
Private data · public proof

Confidence without exposure

Keep sensitive details private while producing verifiable evidence for decisions and outcomes.

Reveal the outcome — not the plaintext.
Enterprise workflows

Multi-party, accountable

Coordinate teams and systems with tamper-evident trails and clear hand-offs between steps.

Every step has an owner, a reason and a trace.
Examples

Concrete examples

A few patterns teams can ship with XDaLa on XGR — adaptable to your rules, data model and process design.

Structured flows instead of isolated transactions.
ISO-style transaction flows

Structured payments, policy-first

Validate structured payment data, enforce limits and approvals, then settle — with verifiable evidence, without exposing sensitive details.

Data feeds & attestations

Act on real-world facts

Consume signed feeds such as prices, FX, weather, IoT oracles or attestations and trigger actions when thresholds or conditions are met.

Order processing

From order to settlement

Coordinate order → fulfillment → settlement with milestone-based releases, exceptions, and approvals — all auditable.

KYC / AML & sanctions

Checks before action

Run policy checks before transfers or contract calls. Keep private inputs private while keeping the proof on-chain.

Treasury automation

Streams, splits, and caps

Automate multi-sig approvals, streaming payouts, vesting schedules, and budget caps tied to events or time.

Marketplace & escrow

Trust with clear rules

Hold funds in escrow, define dispute windows, and resolve outcomes automatically with a transparent audit trail.

Positioning

Built in Europe. Built for builders.

Serious infrastructure for real-world automation: privacy-aware, implementation-focused and designed to stay compatible with how builders already work.

European quality. Builder-grade execution.

From the heart of Europe

Created by XGR.Network GmbH, we champion privacy, security, and responsible innovation — with European quality at our core. Impact features are supported as optional primitives, not as a blanket promise.

Builder-first experience

Clean APIs, familiar tooling, fast confirmations. Go from idea to production without reinventing your stack.

Auditable by design

Keep the important evidence on-chain so teams, partners, and auditors can verify outcomes without friction.