Version 0.1 | December 2025
Symbiont is a decentralized trust and orchestration protocol inspired by biological network optimization systems. Drawing from the adaptive behavior of Physarum polycephalum (slime mold) and mycorrhizal fungal networks, Symbiont enables multi-agent systems to establish trust, detect adversarial behavior, and intelligently route tasks without central authority.
graph TB
subgraph "Biological Inspiration"
BIO1[Physarum polycephalum<br/>Slime Mold]
BIO2[Mycorrhizal Networks<br/>Forest Fungi]
BIO3[Plant Defense<br/>Signaling]
end
subgraph "Symbiont Protocol"
CONN[Connection<br/>Dynamics]
TRUST[Trust<br/>Computation]
DEF[Defense<br/>Signaling]
CORE[Core Protocol]
ORCH[Intelligent<br/>Orchestration]
end
BIO1 -->|Network Optimization| CONN
BIO2 -->|Resource Exchange| TRUST
BIO3 -->|Threat Response| DEF
CONN --> CORE
TRUST --> CORE
DEF --> CORE
CORE --> ORCH
style BIO1 fill:#7d9f85
style BIO2 fill:#7d9f85
style BIO3 fill:#7d9f85
style CORE fill:#b8956b
style ORCH fill:#6b8fa3
| Feature | Description |
|---|---|
| Emergent Trust | Trust emerges from interaction patterns, not central authority |
| Adaptive Connections | Connections strengthen through positive reciprocity (like slime mold tubes) |
| Collective Defense | Defense signals propagate through trusted connections |
| Adversary Detection | Behavioral analysis identifies strategic adversaries |
| Intelligent Routing | Workflows route to the most trusted, capable nodes |
At the heart of Symbiont lies the Physarum Equation, which governs how connection strengths evolve:
graph LR
subgraph "Inputs"
Q[Q: Interaction<br/>Volume]
R[r: Reciprocity]
QS[q: Quality]
T[τ: Tone]
end
subgraph "Transforms"
Q --> FLOW[Flow Factor]
R --> SIG[Reciprocity Sigmoid]
QS --> QMULT[Quality Multiplier]
T --> TMULT[Tone Multiplier]
end
subgraph "Output"
FLOW --> PHI[Φ: Reinforcement]
SIG --> PHI
QMULT --> PHI
TMULT --> PHI
PHI --> W[Δw: Weight Change]
end
style PHI fill:#b8956b
style W fill:#7d9f85
| Symbol | Description | Range |
|---|---|---|
| w | Connection weight | [0, 1] |
| Q | Interaction volume (flow) | [0, ∞) |
| r | Reciprocity score | (-∞, +∞) |
| q | Quality score | [0, 1] |
| τ | Tone score | [-1, 1] |
| D | Defense dampening | [0, ∞) |
Complete documentation is available in the /docs directory:
| Document | Description | Audience |
|---|---|---|
| Introduction | High-level overview and motivation | All readers |
| Biological Foundations | The science behind the protocol | Students, researchers |
| Core Principles | Seven design principles and philosophy | All readers |
| Glossary | Terminology, symbols, and constants | Quick reference |
| Document | Description | Audience |
|---|---|---|
| Architecture Overview | System design, layers, and components | Developers, architects |
| Node Architecture | Individual node structure and lifecycle | Implementers |
| Network Topology | Network structure, evolution, properties | System designers |
| Data Flow | How information moves through the system | All technical readers |
| Document | Description | Audience |
|---|---|---|
| The Physarum Equation | Core mathematical dynamics | Researchers, advanced developers |
| Trust Computation | How trust emerges and is calculated | All technical readers |
| Reciprocity System | Exchange balance tracking | Implementers |
| Defense Signaling | Threat detection and propagation | Security-focused readers |
| Convergence Protocol | How agents reach consensus | Distributed systems developers |
| State Machines | Node, defense, connection state transitions | Implementers |
| Document | Description | Audience |
|---|---|---|
| Getting Started | Installation and first simulation | New users |
| Running Simulations | Advanced simulation and metrics | Experimenters |
| Understanding Trust | Interactive trust calculation walkthrough | Students |
| Building Workflows | Creating multi-agent workflows | Developers |
| Document | Description | Audience |
|---|---|---|
| Core Types | Type definitions and structures | Implementers |
| Constants | Protocol parameters and ranges | Configuration |
| Mathematical Functions | Helper functions and implementations | Implementers |
| Node API | Node interface and methods | Developers |
| Document | Description | Audience |
|---|---|---|
| Master Reference | Complete protocol specification | All readers |
| Language-Agnostic Spec | Implementation guide for any language | Implementers |
| Complete Specification | Full technical specification | Advanced readers |
symbiont/
├── symbiont-core/ # Core protocol library
│ └── src/
│ ├── types.rs # Core types (NodeId, Score, Weight)
│ ├── node.rs # Node structure and behavior
│ ├── connection.rs # Connection dynamics (Physarum)
│ ├── trust.rs # Trust computation
│ ├── defense.rs # Defense signaling
│ ├── routing.rs # Task routing
│ ├── workflow.rs # Workflow orchestration
│ ├── handoff.rs # Task handoff protocol
│ ├── detection.rs # Adversary detection
│ ├── convergence.rs # Convergence protocol
│ ├── math.rs # Mathematical functions
│ └── constants.rs # Protocol constants
│
├── symbiont-sim/ # Simulation harness
│ └── src/
│ ├── network.rs # Network simulation
│ ├── agents.rs # Agent behavior models
│ ├── scenarios/ # Test scenarios
│ └── metrics.rs # Metrics collection
│
├── symbiont-cli/ # Command-line interface
│ └── src/main.rs
│
└── docs/ # Documentation
├── concepts/ # Foundational concepts
├── architecture/ # System architecture
├── protocol/ # Protocol specification
├── tutorials/ # Step-by-step guides
├── api/ # API reference
└── master design docs/ # Master specifications
- Rust 1.70 or later
- Cargo package manager
# Clone the repository
git clone https://github.com/your-org/symbiont.git
cd symbiont
# Build all crates
cargo build --release
# Run tests
cargo test# Trust emergence in honest network
cargo run -p symbiont-cli -- simulate trust-emergence
# Strategic adversary injection
cargo run -p symbiont-cli -- simulate strategic --inject-at 100
# Workflow chain routing
cargo run -p symbiont-cli -- simulate workflow-chain
# With verbose output
cargo run -p symbiont-cli -- simulate trust-emergence -v| Scenario | Description |
|---|---|
trust-emergence |
Observe trust dynamics in honest network |
strategic |
Strategic adversary builds trust then defects |
free-rider |
Free riders take but don't contribute |
sybil |
Sybil cluster attack |
workflow-chain |
Sequential workflow routing |
workflow-fan-out |
Parallel workflow with merge |
Key parameters governing protocol behavior:
| Constant | Symbol | Default | Description |
|---|---|---|---|
| Reinforcement Rate | γ | 0.1 | Rate of connection strengthening |
| Decay Rate | α | 0.01 | Natural connection weakening |
| Reciprocity Sensitivity | β | 2.0 | Sigmoid steepness |
| Memory Factor | λ | 0.9 | EMA weighting |
| Flow Exponent | μ | 0.5 | Sublinear flow scaling |
| Initial Weight | W_INIT | 0.3 | Starting connection weight |
| Minimum Weight | W_MIN | 0.01 | Connection removal threshold |
| Maximum Weight | W_MAX | 1.0 | Maximum connection strength |
See Constants Reference for the complete list.
graph TB
subgraph "Core Principles"
P1[Trust Through<br/>Interaction]
P2[No Central<br/>Authority]
P3[Behavioral<br/>Adaptation]
P4[Reciprocity<br/>Balance]
P5[Collective<br/>Defense]
P6[Graceful<br/>Degradation]
P7[Verifiable<br/>State]
end
P1 --> GOAL[Robust<br/>Decentralized<br/>Trust]
P2 --> GOAL
P3 --> GOAL
P4 --> GOAL
P5 --> GOAL
P6 --> GOAL
P7 --> GOAL
style GOAL fill:#b8956b
- Trust Through Interaction — Trust emerges from consistent, high-quality, reciprocal interactions
- No Central Authority — No master node, no oracle, no single point of failure
- Behavioral Adaptation — Trust adapts to changing behavior over time
- Reciprocity Balance — Sustainable relationships require balanced exchange
- Collective Defense — The network defends itself through coordinated signaling
- Graceful Degradation — The system continues functioning when components fail
- Verifiable State — All state changes are traceable and cryptographically signed
See CONTRIBUTING.md for guidelines on contributing to this project.
See SECURITY.md for security policy and reporting vulnerabilities.
This project is licensed under the MIT License - see the LICENSE file for details.
-
Tero, A., et al. (2010). "Rules for Biologically Inspired Adaptive Network Design." Science, 327(5964), 439-442.
-
Simard, S. W. (2018). "Mycorrhizal Networks Facilitate Tree Communication, Learning, and Memory." In Memory and Learning in Plants. Springer.
-
Meyerson, D., Weick, K. E., & Kramer, R. M. (1996). "Swift Trust and Temporary Groups." In Trust in Organizations. Sage.
-
Heil, M., & Ton, J. (2008). "Long-distance signalling in plant defence." Trends in Plant Science, 13(6), 264-272.
Symbiont v0.1 — Trust emerges from interaction. Orchestration emerges from trust.