Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Guides

How to Architect a Multi-Tiered Token Utility Framework

This guide provides a technical blueprint for designing and implementing a smart contract system where token holdings unlock graduated access, governance rights, and economic benefits.
Chainscore © 2026
introduction
DESIGN PATTERNS

How to Architect a Multi-Tiered Token Utility Framework

A technical guide to designing token systems with multiple, distinct utility layers to drive sustainable protocol engagement and value accrual.

A multi-tiered token utility framework structures a token's functions into distinct, complementary layers, moving beyond single-use models like pure governance. This architecture creates a more resilient economic system by separating access rights, economic incentives, and governance power. Common tiers include: a utility tier for protocol access and fees, a staking/rewards tier for yield and security, and a governance tier for decentralized decision-making. Projects like Curve (CRV) with its vote-escrow model and GMX (GMX) with its multi-faceted tokenomics exemplify this approach, creating flywheels where one utility reinforces another.

Architecting this framework begins with defining clear user personas and desired behaviors. Map each tier to a specific objective: is the goal to secure the network, incentivize liquidity, gate premium features, or decentralize control? For instance, a DeFi protocol might use a base-tier token for fee discounts, a staked derivative for revenue sharing and voting weight, and a non-transferable "points" system for tracking community contributions. The technical implementation often involves a system of wrapper contracts and state management to track different token states and their associated privileges.

Smart contract design is critical for enforcing tier boundaries. A common pattern uses a staking vault that locks tokens to mint a secondary, liquid staking token (e.g., stETH). This new token can then be granted unique utilities. Another method is role-based access control (RBAC) using systems like OpenZeppelin's AccessControl, where holding a token in a specific wallet or contract grants on-chain permissions. Consider this simplified conceptual outline:

solidity
// Pseudo-structure for a tiered staking contract
contract TieredStaking {
    mapping(address => uint256) public lockedBalance;
    mapping(address => uint256) public rewardTier; // 0, 1, 2
    
    function stakeForTier(uint256 amount, uint256 tier) external {
        // Lock tokens, assign user to a tier
        // Tier determines fee share %, governance power, etc.
    }
}

Economic sustainability requires balancing the supply distribution and value flow between tiers. Avoid common pitfalls like inflationary rewards that dilute all holders; instead, design value accrual that benefits long-term, tier-committed participants. For example, protocol revenue could be used to buy back and distribute tokens exclusively to the highest staking tier, creating a virtuous cycle. The velvet fork upgrade model, where new utilities are added via optional, backward-compatible contracts, allows for iterative framework development without disrupting existing token holders.

Finally, integrate transparent on-chain analytics to measure the framework's success. Track metrics like staking ratio, tier migration patterns, utility redemption rates, and governance participation. Tools like Dune Analytics dashboards are essential for the community to verify value flows. A well-architected multi-tiered system doesn't just add features—it creates a coherent economic engine where each tier's utility is clear, valuable, and reinforces the long-term health of the entire ecosystem.

prerequisites
PREREQUISITES AND CORE CONCEPTS

How to Architect a Multi-Tiered Token Utility Framework

A multi-tiered token framework creates distinct layers of utility to drive sustainable demand and governance. This guide covers the architectural principles and core components required to design one.

A multi-tiered token utility framework structures a token's functionality into separate, interconnected layers. This is a design pattern used by protocols like Curve (CRV) and Aave (AAVE) to manage governance, staking, and fee distribution. The primary goal is to create a demand sink for the base token by locking it into higher-utility tiers, which in turn grants enhanced rights or rewards. This architecture moves beyond a single-purpose token to create a self-reinforcing economic system where utility in one layer fuels demand for another.

The foundation is a base utility layer, typically a standard ERC-20 token. This layer handles core functions like protocol governance (e.g., voting on Aave Improvement Proposals), fee payment (e.g., paying for transactions in a network), or access (e.g., gating premium features). It's the liquid, transferable asset that users initially acquire. However, its utility is often intentionally limited to incentivize migration to higher tiers, creating the initial lock-up mechanism.

The secondary staking or locking layer is where the base token is committed. This is implemented via smart contracts that accept token deposits in exchange for a derivative asset. Examples include ve-tokens (vote-escrowed tokens like veCRV) or staking receipts (like Aave's stkAAVE). This tier grants amplified benefits: increased voting power, a share of protocol revenue, or access to exclusive liquidity pools. The lock-up period introduces a time preference and reduces circulating supply.

A rewards and incentives layer distributes value back to participants in the upper tiers. This is often a separate token or a claimable fee stream. For instance, Curve's system directs trading fees to veCRV holders, while Aave distributes safety module incentives to stkAAVE stakers. This layer must be carefully calibrated; rewards should be substantial enough to justify locking capital but sustainable enough to avoid hyperinflation of the base token.

Architecting this requires defining clear state transitions between tiers. Your smart contracts must manage: the locking/unlocking schedule, the minting/burning of derivative tokens, the calculation of voting power based on lock time and amount, and the secure distribution of rewards. A common reference is the VotingEscrow contract from Curve Finance, which has been forked by dozens of protocols to implement their own ve-tokenomics.

Finally, consider integration points with the broader ecosystem. Your framework should allow other DeFi protocols to build on top of it. For example, Convex Finance (CVX) built a massive protocol by aggregating CRV locks to optimize rewards for users, demonstrating how a well-architected tiered system can become a foundational DeFi primitive. Your design should expose clean interfaces for such composability.

design-considerations
ARCHITECTURE

Designing the Tier Structure

A well-defined tier structure is the backbone of a token utility framework, segmenting users and aligning incentives with project goals.

The first step in architecting a multi-tiered framework is defining the core objectives of your token. Are you aiming to boost protocol governance, reward long-term liquidity providers, or create exclusive access tiers for NFT holders? Each goal dictates a different structural approach. For a DeFi protocol, tiers might be based on staking amounts (e.g., 1K, 10K, 100K tokens), unlocking progressively higher yield boosts or fee discounts. A gaming or social project might tie tiers to on-chain reputation, achievement NFTs, or time-weighted token holdings to reward genuine engagement over mere capital.

Once objectives are set, you must choose the technical mechanism for enforcing tiers. The most common and flexible approach is a smart contract-based registry that maps user addresses to their current tier. This contract stores the logic for tier eligibility—such as minimum token balance, staking duration, or NFT ownership—and can be queried by other parts of your dApp. A basic Solidity structure might use a mapping: mapping(address => uint8) public userTier; where 0 is no tier and 1-3 represent ascending levels. A more advanced system could use merkle proofs or Soulbound Tokens (SBTs) for permissionless, verifiable tier assignments without constant on-chain checks.

Critical to the system's success is implementing a clear upgrade and review mechanism. Tiers should not be static; they must have defined pathways for progression and, in some cases, demotion. This involves writing functions like checkAndUpdateTier(address user) that recalculates a user's status based on real-time criteria (e.g., current staked balance). To prevent abuse, incorporate time-locks or cooldown periods after tier changes. Furthermore, design the contract with upgradeability in mind using a proxy pattern, allowing you to adjust tier thresholds or add new levels as the ecosystem evolves, without migrating user state.

Finally, integrate the tier logic with your broader token utilities. Each tier should unlock distinct, tangible benefits. For example, Tier 1 might offer a 10% discount on platform fees, Tier 2 could grant access to a private governance forum and weighted voting power, and Tier 3 might provide eligibility for high-yield, permissioned vaults. These utilities are typically gated in their respective smart contracts by a call to the central tier registry. This separation of concerns—keeping tier logic in one contract and utility gating in others—creates a modular, secure, and maintainable system that can scale with your project's ambitions.

TIERED UTILITY FRAMEWORK

Example Tier Utility Mapping

Mapping core utility functions to different token holder tiers for a hypothetical governance token.

Utility FeatureTier 1: Staker (1,000+ tokens)Tier 2: Delegator (100-999 tokens)Tier 3: Holder (1-99 tokens)

Governance Voting Weight

1 vote per token

1 vote per token

1 vote per token

Proposal Creation Rights

Fee Discounts on Platform

75% discount

25% discount

5% discount

Exclusive Airdrop Allocation

2x multiplier

1.5x multiplier

1x base allocation

Access to Beta Features

Revenue Share from Treasury

0.05% of fees

0.01% of fees

Minimum Lockup Period

90 days

30 days

0 days (flexible)

Support Priority

Priority 1 (< 4h)

Priority 2 (< 24h)

Standard support

contract-architecture
SMART CONTRACT ARCHITECTURE

How to Architect a Multi-Tiered Token Utility Framework

Designing a token with multiple, interdependent utilities requires a modular smart contract architecture to ensure security, upgradeability, and gas efficiency.

A multi-tiered token utility framework separates distinct token functions into specialized, interoperable contracts. This is superior to a monolithic design where all logic resides in a single ERC-20 contract. Core tiers typically include: a base token contract for transfers and balances, a staking contract for locking assets, a governance contract for voting, and a rewards distributor. This separation, often called the Separation of Concerns principle, minimizes attack surfaces, allows for independent upgrades via proxy patterns, and reduces gas costs for users interacting with only one utility.

The architecture relies on secure, permissioned communication between tiers. The base token contract should implement a role-based access control system, like OpenZeppelin's AccessControl, to grant mint/burn permissions to the staking or rewards contracts. Use interface-driven development; each tier contract should define clear interfaces (e.g., IStaking, IRewards) that other contracts call. For example, a governance contract would call staking.getVotingPower(user) via its interface, rather than directly manipulating storage. This decoupling is critical for maintenance and testing.

Implementation requires careful state management to prevent inconsistencies. A common pattern is to use synthetic balances or vote escrow models. Instead of transferring tokens to a staking contract, users might deposit them to receive a non-transferable veToken (e.g., Curve's model), which grants rights in other tiers. The rewards tier can then use a pull-over-push design, allowing users to claim rewards on-demand, saving gas. Always audit the flow of permissions—ensure no single contract has unlimited minting authority unless absolutely required by the economic model.

Upgradeability is a key consideration. Use transparent proxy patterns (OpenZeppelin) or the newer UUPS (EIP-1822) pattern to make logic contracts upgradeable. Crucially, only the core admin functions should be upgradeable; the token's ledger and user balances must remain immutable in the proxy's storage. When upgrading, you can deploy a new staking contract V2 and migrate user positions via a one-time function, ensuring backward compatibility for other tiers that rely on the staking interface.

Real-world examples illustrate this architecture. Uniswap's UNI token uses separate contracts for governance (Governor Bravo) and vesting (Merkle Distributor). Aave's AAVE employs a staking contract for safety module deposits and a separate governance contract. When designing your framework, map each utility to a contract, define the interfaces between them, and rigorously test cross-contract calls. Tools like Hardhat or Foundry are essential for forking mainnet and simulating interactions in a local environment.

implementing-tier-checks
TOKEN UTILITY

Implementing Tier Checks and Gated Functions

A guide to designing and implementing a multi-tiered access control system for on-chain applications using token holdings as the primary criterion.

A multi-tiered token utility framework structures user access and privileges based on their holdings of a specific token. This model is foundational for creating membership clubs, premium feature access, and governance-weighted systems. The core mechanism is a tier check—a smart contract function that verifies a user's token balance against predefined thresholds (e.g., Tier 1: 100 tokens, Tier 2: 1000 tokens). These checks are then used to gate functions, restricting execution to users who meet the required tier. This creates a direct link between token ownership and application utility.

Architecting this system starts with defining clear tier boundaries and the corresponding privileges. Common patterns include: - Access gating: Unlocking specific contract functions or off-chain content. - Fee discounts: Applying reduced rates for higher-tier holders in a protocol. - Enhanced rewards: Boosting yield or airdrop allocations. - Governance power: Weighting voting power by tier. The logic should be implemented on-chain for transparency and security, typically within the application's core smart contracts or a dedicated TierManager contract.

Here is a basic Solidity example of an internal tier check function using the OpenZeppelin IERC20 interface:

solidity
import "@openzeppelin/contracts/token/ERC20/IERC20.sol";

contract TieredAccess {
    IERC20 public membershipToken;
    uint256 public constant TIER_1_THRESHOLD = 100 * 10**18; // 100 tokens
    uint256 public constant TIER_2_THRESHOLD = 1000 * 10**18; // 1000 tokens

    function _getTier(address user) internal view returns (uint256) {
        uint256 balance = membershipToken.balanceOf(user);
        if (balance >= TIER_2_THRESHOLD) return 2;
        if (balance >= TIER_1_THRESHOLD) return 1;
        return 0;
    }

    function premiumFunction() external {
        require(_getTier(msg.sender) >= 1, "Insufficient tier");
        // Execute premium logic
    }
}

This pattern is simple but requires careful consideration of token decimals and whether to use a snapshot or live balance.

For more complex systems, consider moving tier logic to a separate, upgradeable contract. This separation of concerns allows you to modify tier thresholds or add new tiers without migrating the main application logic. You can also incorporate time-based qualifications, such as requiring a user to hold the tokens for a minimum duration (using a snapshot mechanism), to prevent flash loan attacks or quick in-and-out purchases just to access a gated function.

Key security considerations include: - Preventing replay attacks: Ensure state changes happen after checks. - Handling token transfers: A user's tier can change between transactions; decide if your application uses a checkpoint or real-time balance. - Centralization risks: If an admin can arbitrarily set tiers or user status, it undermines the trustless model. Using verifiable, on-chain criteria like token balance is preferred. Always audit the integration with the token contract, especially if it's a non-standard implementation.

In practice, projects like Collab.Land and Guild.xyz have popularized this model for Discord and DAO gating. The implementation principles remain the same: define clear rules, implement checks efficiently on-chain, and gate functions with require statements or modifier patterns. This creates a scalable utility framework that aligns user incentives with protocol engagement.

dynamic-tier-management
TIER MANAGEMENT

How to Architect a Multi-Tiered Token Utility Framework

A technical guide to designing token tiers with upgrade mechanics and decay functions to drive sustained user engagement and protocol health.

A multi-tiered token utility framework structures user access and rewards based on their holdings or activity level. Common implementations include membership tiers (e.g., Bronze, Silver, Gold) or governance classes (e.g., Delegate, Guardian). The core architectural challenge is managing state transitions: how users upgrade to higher tiers and how they decay or downgrade over time. This creates a dynamic system that incentivizes continued participation rather than passive holding. Smart contracts must track each user's tier, the criteria for the next level, and a timer or activity check for decay.

Tier upgrades are typically gated by specific, verifiable on-chain conditions. A user might upgrade by:

  • Staking a minimum quantity of governance tokens.
  • Maintaining a time-weighted average balance (TWAB) for a set duration.
  • Accumulating a sufficient amount of non-transferable "points" through protocol interactions. For example, a checkAndUpgradeTier function would validate the user's current status against the next tier's requirements, often requiring them to explicitly trigger the upgrade, which may involve locking tokens.

Decay mechanics prevent tier stagnation and encourage ongoing engagement. Instead of permanent status, a tier can decay based on:

  • Time-based decay: A user's tier downgrades after a fixed period (e.g., 90 days) unless they re-qualify.
  • Activity-based decay: Tier maintenance requires periodic actions, like voting on proposals or providing liquidity.
  • Balance-based decay: Falling below a minimum staked balance triggers a downgrade after a grace period. Implementing decay often involves a lastActive timestamp and a decayInterval. A cron job or user-triggered function checks if the interval has passed and applies the downgrade.

Here is a simplified Solidity snippet outlining a contract structure for managing upgrades and time-based decay:

solidity
contract TierManager {
    enum Tier { None, Bronze, Silver, Gold }
    
    struct UserTier {
        Tier currentTier;
        uint256 tierExpiry; // Timestamp when tier decays
        uint256 tokensStaked;
    }
    
    mapping(address => UserTier) public userData;
    mapping(Tier => uint256) public tierStakeRequirement;
    uint256 public decayPeriod = 90 days;
    
    function stakeAndUpgrade(uint256 amount) external {
        // Transfer and stake tokens
        // Check if new stake meets requirements for a higher tier
        Tier achievableTier = calculateTier(userData[msg.sender].tokensStaked + amount);
        if (achievableTier > userData[msg.sender].currentTier) {
            userData[msg.sender].currentTier = achievableTier;
        }
        // Reset the decay timer on any upgrade or active staking change
        userData[msg.sender].tierExpiry = block.timestamp + decayPeriod;
    }
    
    function checkDecay(address user) public {
        if (block.timestamp >= userData[user].tierExpiry && userData[user].currentTier > Tier.None) {
            // Downgrade logic, e.g., move down one tier
            userData[user].currentTier = Tier(uint(userData[user].currentTier) - 1);
            // Reset expiry for the new, lower tier
            userData[user].tierExpiry = block.timestamp + decayPeriod;
        }
    }
}

When architecting your framework, key design decisions include choosing between permissioned upgrades (user-initiated) and automatic upgrades (protocol-assigned), and determining if decay should be a smooth gradient or a sudden step-down. Gas efficiency is critical; consider making decay checks opt-in or triggered by other user actions to avoid costly state writes for inactive accounts. Always ensure tier logic is transparent and verifiable on-chain to maintain user trust. Frameworks like ERC-1155 (for multi-token balances) or ERC-721 (for non-fungible membership badges) can be effective foundations for representing tiers.

Successful implementations balance incentive alignment with usability. The goal is to create a positive feedback loop: engagement grants higher-tier benefits (e.g., fee discounts, exclusive access, boosted yields), which in turn motivates behaviors that support the protocol's long-term health. Avoid overly punitive decay that drives users away. Instead, design decay as a gentle nudge, with clear pathways to regain status. Test the economic parameters extensively in a simulated environment before mainnet deployment to ensure the system achieves its desired equilibrium without unintended consequences.

utility-implementation-patterns
ARCHITECTURE

Common Utility Implementation Patterns

Token utility extends beyond simple transfers. These patterns show how to design layered systems for governance, access, and value accrual.

03

Fee Capture and Revenue Sharing

Direct protocol revenue back to token holders to create a yield-bearing asset.

  • Fee switches: Divert a percentage of DEX swap fees or marketplace royalties to a treasury.
  • Buyback and burn: Use revenue to purchase tokens from the open market and burn them, reducing supply.
  • Staking rewards: Distribute collected fees as rewards to users who stake their tokens, as seen in GMX and dYdX.
$200M+
Annual Fees to GMX Stakers
04

Liquidity and Collateral

Integrate tokens into DeFi primitives to enhance utility and stability.

  • Collateral in lending: List the token as collateral on Aave or Compound, borrowing against it.
  • Liquidity mining: Incentivize LP providers on Uniswap V3 with token emissions.
  • Bonding curves: Use a smart contract to mint/burn tokens against a deposited asset, creating a continuous liquidity pool like OlympusDAO originally used.
security-considerations
SECURITY AND ECONOMIC CONSIDERATIONS

How to Architect a Multi-Tiered Token Utility Framework

A robust token utility framework is a core economic primitive that defines a protocol's value capture and security. This guide outlines a systematic approach to designing a multi-tiered system that balances incentives, governance, and long-term sustainability.

A multi-tiered token utility framework segments token functions into distinct, complementary layers. A common model includes a security/utility layer for core protocol access (e.g., staking for fees or rewards), a governance layer for decentralized decision-making, and a value accrual layer for capturing protocol revenue. This separation prevents single-token design flaws, such as governance being dominated by short-term speculators or staking rewards creating excessive sell pressure. Projects like Curve Finance (veCRV) and Frax Finance (veFXS) exemplify this, using vote-escrow tokens to separate governance power from liquid, yield-bearing assets.

The security layer is foundational and must be designed to protect the network. This typically involves a cryptoeconomic security model where tokens are staked or locked as collateral to guarantee honest behavior. Key considerations include the slashing conditions for malicious acts, the bonding/unbonding periods that deter short-term attacks, and the inflation schedule for staking rewards. For example, a Proof-of-Stake chain like Cosmos uses bonded ATOM to secure the hub, with slashing penalties for double-signing or downtime. In DeFi, Lido's stETH represents a liquid staking derivative that maintains the underlying security of Ethereum while providing liquidity.

Economic sustainability requires aligning incentives across all token holders. The value accrual layer must create tangible demand sinks. Mechanisms include fee sharing (e.g., Uniswap's proposed fee switch for UNI holders), token buybacks and burns (like Binance's BNB burn), or revenue distribution to stakers (as seen with GMX's esGMX and multiplier points). It's critical to model the token emission rate, circulating supply, and velocity to ensure rewards outpace sell pressure. A poorly calibrated model can lead to hyperinflation and token price decay, undermining the entire security premise.

Governance rights should be carefully gated to align voters with long-term success. Simple token-weighted voting is vulnerable to attacks. Advanced models use vote-escrow, where voting power is proportional to the duration tokens are locked (ve-tokens), or delegated reputation systems. Compound's and Uniswap's governance delegates are early examples. The framework must also define clear proposal thresholds, voting periods, and execution delays to prevent governance attacks. Smart contract upgrades should include a timelock (a minimum 24-48 hour delay) to allow users to exit if a malicious proposal passes.

Implementing this framework requires precise smart contract architecture. A reference structure might include: 1) a core ERC-20 token, 2) a StakingVault contract for the security layer with adjustable rewards, 3) a VoteEscrow contract that mints non-transferable veTokens, and 4) a FeeDistributor that routes protocol fees to veToken holders. Auditing is non-negotiable; engage firms like Trail of Bits or OpenZeppelin to review the economic logic and contract security. Use existing, audited libraries like OpenZeppelin's contracts for standard token and governance functions to reduce risk.

Finally, continuous analysis and parameter adjustment are required. Monitor on-chain metrics: staking ratio, governance participation, fee generation, and holder concentration. Be prepared to use governance to adjust parameters like staking APY or fee distribution weights in response to data. A static framework will fail as market conditions change. The goal is a resilient, adaptive system where security, governance, and value accrual reinforce each other, creating a sustainable protocol-owned economy.

TOKEN UTILITY ARCHITECTURE

Frequently Asked Questions

Common questions and technical considerations for developers designing token utility frameworks with multiple tiers or layers.

A multi-tiered token utility framework structures a token's functionality into distinct, often hierarchical layers. This separates core protocol functions from secondary features, creating a modular and scalable design. For example, a base layer might handle staking for security (like Ethereum's Beacon Chain), a second layer could govern protocol fees and revenue distribution, and a third could enable community governance and voting rights. This separation prevents feature bloat in the core contract, reduces gas costs for common operations, and allows for independent upgrades to specific utility modules. Frameworks like ERC-1155 for semi-fungible tokens or custom modular smart contract architectures are often used to implement this pattern.

conclusion
IMPLEMENTATION ROADMAP

Conclusion and Next Steps

This guide has outlined the core components of a multi-tiered token utility framework. The final step is to synthesize these concepts into a concrete implementation plan.

A successful multi-tiered framework is not a static design but a dynamic system that evolves with your protocol. The core principles—functional separation, value accrual, and user alignment—must be continuously validated against real-world usage. Start by implementing the foundational governance and utility token layers, as these establish the basic economic and decision-making parameters. Use a modular smart contract architecture, such as upgradeable proxies or a Diamond Standard (EIP-2535), to allow for future adjustments to staking mechanics, fee distributions, or reward structures without disrupting the core tokenomics.

For the next phase, focus on integrating the specialized utility tiers. This involves deploying the specific contracts for your use cases: a vesting contract for team and investor tokens, a staking contract with time-locked rewards, and a separate contract for any non-transferable soulbound tokens (SBTs) used for reputation or access. Tools like OpenZeppelin's contract libraries provide secure, audited bases for these components. Crucially, each contract should emit standardized events (following EIP-1155 for multi-token contracts if applicable) to allow off-chain indexers and dashboards to track the flow of value and participation across all tiers.

Finally, establish clear metrics and monitoring. You need to measure the health of each tier independently. Key Performance Indicators (KPIs) might include: - Governance token: voter participation rate and proposal diversity. - Utility token: velocity, percentage staked versus in circulation. - Reward/Reputation tier: holder retention and engagement metrics. Analytics platforms like Dune Analytics or Subgraphs (The Graph) are essential for building these dashboards. This data will inform your governance decisions on parameter adjustments, such as changing staking APY or minting new SBTs, ensuring your framework remains aligned with long-term protocol goals.