Platform Developers Tools Testnet Community
Sandbox Sections Overview Sandbox Modes Validation Matrix Workflow Toolchain Incentives Wallets & Signing Smart Contracts Foundation

Controlled Build Environment

Infinite Sandbox

Infinite Sandbox is the controlled environment for rehearsing verifiable AI workloads before public network exposure. Simulate the full local devnet, run compliance checks against citation-backed policy rules, inspect Digital Seals, and move cleanly into the developer documentation, the toolchain stack, and the testnet rollout path without changing your operational model.

Local Devnet Regulatory Sandbox Seal Replay Release Readiness
Scroll to inspect the sandbox surface

Compliance-Aware from Day One

Run citation-backed checks across GDPR, UAE data law, PDPA, HIPAA, and sanctions controls before a workload reaches public infrastructure.

Protocol-Realistic Local Surface

Rehearse against the documented 10-service devnet with validators, prover, data services, explorer, faucet, and monitoring already in the workflow.

Promotion Path Built In

Use the same surface to prepare for testnet validation, community review, grants, and Seals-based incentive programs described in the tokenomics.

10 Services Docker Compose devnet topology
4 Regimes Citation-backed policy coverage
15% Allocation Ecosystem and grants support

Overview

A sandbox built around actual protocol surfaces

Infinite Sandbox is not a detached demo environment. It is a controlled rehearsal layer for the same devnet, compliance, seal, and diagnostic surfaces described in the Aethelred protocol documentation.

CORE

What It Is

Protocol-aware validation before public rollout

Use Infinite Sandbox to collapse prototype, compliance review, seal inspection, and launch-readiness into a single controlled workflow. Instead of validating only application code, teams validate the operational assumptions around proof, jurisdiction, transfer policy, and network behavior as well.

Primary Outcome

Reduce divergence between local iteration, testnet rehearsal, and production operating procedures.

Operational Scope

Devnet orchestration, compliance checks, attestation review, diagnostics, and promotion readiness.

Dev Surface Local devnet, SDK integration, explorer visibility, and faucet-backed rehearsal.
Control Surface Sanctions, consent, transfer, retention, and seal validation signals.
Promotion Surface Diagnostics, readiness gates, and handoff into testnet and community review.

Why teams use Infinite Sandbox

It turns Aethelred integration into a controlled systems exercise instead of a last-minute launch drill.

  • Rehearse local network behavior with validators, prover, explorer, faucet, and monitoring in the loop.
  • Run compliance checks against policy rules linked to actual legal citation domains instead of generic linting only.
  • Inspect Digital Seal outcomes before promoting workflows toward public testnet usage.
  • Exercise diagnostic and readiness paths already exposed through the documented Rust and TypeScript developer CLIs.
  • Connect engineering rehearsal to the ecosystem pathways described in the grants and Seals incentive programs.

Devnet Topology

10 Services

Validator Mesh

3 Validators

Rust CLI Surface

15 Command Groups

Citation Domains

4 Policy Regimes

Seals Program

700M AETHEL

Sandbox Modes

Four ways to validate before launch

Infinite Sandbox covers the local runtime, the compliance plane, the proof plane, and the release gate that sits between engineering and public deployment.

DEV

Local Devnet

Rehearse against the full local network surface

The documented local environment includes three validators, a zkML prover with GPU passthrough, PostgreSQL, Redis, an API gateway with WebSocket support, block explorer, faucet, and Prometheus plus Grafana monitoring.

Best For

Contract testing, SDK integration, explorer-driven debugging, and end-to-end staging of inference flows.

Output

A repeatable local rehearsal surface that exposes the same operational seams you will need on testnet.

3 Validators Explorer Faucet Monitoring
LAW

Regulatory Sandbox

Check workloads against citation-backed policy controls

The protocol documentation describes a regulatory sandbox module that checks workloads against GDPR, UAE Federal Decree-Law, PDPA, and HIPAA references while supporting OFAC SDN, EU, and UN sanctions screening.

Best For

Teams that need to inspect cross-border transfer logic, consent posture, data handling, and counterparty screening before launch.

Output

Structured signals for missing consent, transfer risk, sanctions conflicts, retention issues, and unencrypted PII exposure.

GDPR HIPAA PDPA Sanctions
SEAL

Seal Replay

Inspect proof-backed execution after each workload

Digital Seals are minted when a supermajority of validators agrees on a result. Infinite Sandbox lets teams center their validation workflow around seal existence, provenance, and verification rather than only application-side success states.

Best For

Attestation review, post-run verification, support playbooks, and proof-aware application QA.

Output

Confidence that the workload completed with the expected proof and can be promoted into wider network testing.

Digital Seal Verification Attestation Provenance
SHIP

Release Gate

Promote only after offline checks and diagnostics pass

The broader infrastructure documentation describes sandbox offline tests and a required gate in CI. Combined with diagnostics, hardware detection, linting, profiling, and benchmarking, Infinite Sandbox becomes the release checkpoint before public exposure.

Best For

Teams that need a disciplined handoff from development into public testnet and later production pathways.

Output

A clearer go or no-go decision on network readiness, policy readiness, and operational readiness.

Diagnostics Hardware Detection CI Gate Benchmarking

Validation Matrix

What Infinite Sandbox can validate

The sandbox is most useful when teams are explicit about the control surfaces they want to prove before launch. These are the documented checks that matter operationally.

Control Surface Checks Performed Operational Outcome
Sanctions Screening OFAC SDN, EU, and UN list screening before workload promotion. Reduces the chance that a workflow proceeds with prohibited counterparties or addresses.
Consent Governance Purpose-specific consent tracking with support for withdrawal-aware review. Creates a clearer audit trail for regulated data handling across AI workflows.
Data Transfer Controls Source and destination tracking with cross-border transfer violation detection. Flags jurisdiction mismatches before they become production incidents.
PII and Retention Signals for unencrypted PII exposure, missing consent, and retention-policy violations. Surfaces privacy and governance drift while remediation is still cheap.
Seal Integrity Digital Seal existence, verification path, and proof-aware workload completion review. Confirms that application success is backed by verifiable protocol evidence.
Network Readiness Local orchestration, diagnostics, wallet flow, explorer checks, and promotion readiness. Reduces last-mile integration risk when moving into the public testnet environment.

Protocol-native controls, not a substitute for release discipline

Infinite Sandbox helps engineering teams validate policy and proof assumptions early. Final legal review, key management, and production sign-off still belong in your release process.

Review Testnet Path

Workflow

A disciplined promotion path for builders

Infinite Sandbox is most effective when it is treated as the rehearsal stage between implementation and public network exposure.

01

Provision the local surface

Start from the documented local devnet topology so validators, prover, data services, explorer, faucet, and monitoring are in the same rehearsal loop.

Open local devnet details →
02

Run workloads and inspect seals

Submit test jobs, confirm completion, and center validation around Digital Seal output and verification rather than application logging alone.

Review developer quick starts →
03

Review compliance and diagnostics

Use the policy-aware sandbox and diagnostic surfaces to catch transfer, consent, sanctions, retention, and environment issues before promotion.

See compliance tooling →
04

Promote into testnet and community review

Move validated flows into the public rollout path, then use community channels and governance feedback to tighten the production handoff.

Open community channels →

Toolchain

The surfaces that power Infinite Sandbox

The sandbox experience is assembled from the same documented tools already exposed across the developer site. No parallel toolchain is required.

RUST

Primary CLI

aeth for deep developer operations

The Rust CLI exposes project scaffolding, model management, job submission, seal management, validator operations, profiling, benchmarking, configuration, compliance checking, and hardware detection from one surface.

TS

Local Orchestration

aeth for devnet and offline verification

The TypeScript CLI is optimized for local development, Docker Compose orchestration, network diagnostics, offline seal verification, and wallet operations that sit directly inside sandbox rehearsal loops.

IDE

Editor Surface

Sovereign Copilot for compliance-aware iteration

The VS Code extension brings real-time compliance linting, cost estimation, and in-editor TEE simulation into the development loop so teams can surface policy and runtime issues before execution leaves the workstation.

SDK

Integration Surface

Multi-language SDKs and APIs for promotion-ready apps

Python, TypeScript, Rust, and Go SDKs keep the same job, seal, and verification abstractions from local rehearsal into public network integration, supported by the API surfaces documented on the developers page.

Incentives

Sandbox activity sits inside the broader ecosystem path

The tokenomics already reserves meaningful capacity for ecosystem growth, grants, and Seals-based incentives. Infinite Sandbox is where teams can prepare their work before participating in those broader programs.

Ecosystem & Grants

The tokenomics allocates 15% of supply to ecosystem and grants programs designed to support developer adoption, partnerships, and tooling expansion.

15% Allocation Developer Grants Partnerships

Seals Program

The Seals program allocates 700,000,000 AETHEL to community incentives, and the supporting documentation explicitly counts developer activity and testnet validation as part of the broader points-based engagement path.

700M AETHEL Developer Activity Testnet Validation

Ongoing Incentives

The whitepaper also reserves additional capacity for ongoing incentives, testnet bonuses, and early-registration programs. Sandbox readiness is the disciplined way to arrive prepared for those public phases.

Testnet Bonuses Ongoing Incentives Public Rollout

Move from sandbox rehearsal into public readiness

Use Infinite Sandbox to harden your workflow, then continue into the testnet launch path, the builder community, and the foundation governance and grants process.

Open Community Hub