Andamio LogoAndamio

Andamio Project Protocol

How Andamio enables credential-gated collaboration with full auditability

Project Protocol: The Andamio Story in Action

The Project Protocol showcases how Andamio's layered architecture creates open yet gated access to collaborative work. It is like a digital commons where access is earned through verifiable contributions rather than controlled by gatekeepers.

Let's explore how the magic happens.

The Journey: From Credentials to Contribution

1. Self-Sovereign On-chain Identity (SSOI): Anyone can mint an access token and create their unique identity.

2. Earning Credentials: Contributors complete Courses, earning verifiable credentials stored in their local course states.

3. Project Enrollment: When a project requires specific skills, contributors with the necessary credentials can enroll.

4. Collaborative Work: Enrolled contributors complete project tasks, with all progress tracked in tamper-proof local project states.

The Three Pillars in Action

(A) Credential-Gated Access

Projects can require specific course completions before allowing enrollment. The contributor state scripts verify credentials by checking course completion tokens in the contributor's state history.

(B) Complete Auditability

Every action is recorded on-chain: who enrolled when, what tasks were completed, how rewards were distributed. The treasury scripts and escrow validators create an immutable audit trail of all project activity.

(C) Open Access System

While projects can set requirements, the system remains permissionless. Anyone can:

  • Create their identity (mint access token)
  • Gain credentials (complete courses)
  • Join qualified projects (meet requirements)
  • Launch their own projects (become a project creator)

No gatekeepers, just verifiable requirements and transparent processes.

Loading system diagram...
This may take a moment

Use Cases

Andamio is built to enable trust across networks of distributed collaborators. Contributors can prove their skills, project creators can verify qualifications, and everyone can audit the entire process. The result is a merit-based system where reputation is earned and verifiable, not claimed or centrally controlled.

This foundation enables diverse applications:

1. Integrated Learning Organizations: Companies or institutions can design connected courses and projects where completing Course A unlocks Project B, creating structured "learning-to-earning" and "gig to full-time" pathways.

2. Interoperable Applications: Developers can build applications that leverage Andamio's credential verification. Examples include hiring platforms, grant systems, and reputation networks, all using the same underlying trust infrastructure.

3. Cross-Organizational Ecosystems: Imagine courses from University X qualifying contributors for projects at Company Y, or credentials from Organization A being recognized in Organization B's hiring, all verified on-chain without middlemen.

The Project Protocol demonstrates how Andamio protocols compose: global identity from the foundation layer, credentials from Course Protocol, and collaborative structures from Project Protocol. It's a powerful, interoperable system for distributed work and learning.