Token Details

FieldValue
NameAIVA
Ticker / Symbol$AIVA
StandardERC-20
NetworkEthereum main-net
Total Supply (hard-cap)1 000 000 000 AIVA
Initial Market-Cap~ $300 000 at TGE
DEX Liquidity Lock6 months
Decimals18

Utility & Flywheel — Fuel for Every Click

AIVA isn’t just a unit of account; it is the fuel, meter, and incentive layer of the protocol.

Each UI frame rendered, each function call, and every on-chain execution either burns AIVA or redistributes it to the stakeholders who secure and extend the network. The table below breaks down the core revenue mechanisms and why they matter.

MechanismHow it WorksWhy it Matters
Gas & UI CreditsEach live-generated component (chart, table, swap widget, etc.) consumes micro-$AIVA. Power-users, bots, and SaaS integrations continuously buy credits to keep pipelines running.Usage-linked burn = deflation tied to real demand, not hype.
Execution Fee (0.30 %)Levied on every swap, stake, booking, or cross-chain transfer routed through an AIVA UI. Split: 50 % burn • 30 % stakers • 20 % treasury.Users finance future dev while stakers secure paths and earn flow-based yield.
Path Royalty0.10 % micro-toll on each call to a third-party MCP path. 70 % → path creator • 20 % burn • 10 % treasury.Turns any integration into a cash-flow asset, magnetising builders to the ecosystem.
Staked GovernanceLocked $AIVA = voting power on fee curves, treasury grants, whitelist / slash decisions for high-impact paths.“Skin-in-the-game” curation keeps spam out and quality high.
Collateral Layer (v2)High-risk or high-TVL paths can require bonded $AIVA as economic insurance.Aligns security with value-at-risk; encourages long-term holding.

Flywheel Summary

  1. More users ⇒ more renders & execs ⇒ more $AIVA burned.
  2. Higher volumes ⇒ larger fee pool ⇒ higher staking APR ⇒ more tokens locked.
  3. More builders ⇒ richer path catalog ⇒ more use-cases ⇒ step 1 repeats.

The circulating supply shrinks while utility, yield, and builder upside expand—a mutually reinforcing loop that rewards participation without promising price appreciation.

$AIVA is a pure-utility token used for gas, governance, and security bonding. It is not designed or marketed as an investment contract

Tokenomics

Category% SupplyVesting Summary
DEX Liquidity70 %
Execution Path Mining15 %Emission 4 yrs
Team & Advisors10 %1 yr cliff + 3 yrs line
Private Investors5 %1 yr cliff + 2 yrs line

Total Supply hard-capped at 1 000 000 000 $AIVA.

Launch & Liquidity Parameters

Anti-Sniper Guard (immutable)

Time from TGETaxMax Buy/Wallet
0-1 min40 %0.60 % supply
2-4 min30 %0.60 % supply
5-10 min20 %0.60 % supply
10-15 min10 %0.60 % supply
>15 min5 % flat (permanent)Wallet limits lift after 60 min

Tax allocation (100 %) → protocol multisig treasury

  • Core dev & audits
  • MCP hackathon grants
  • Liquidity incentives & marketing

Why it works

  • Fair entry window, no gas-war sniping
  • Standing 5 % fee funds runway and R&D
  • Rules locked and public—users know cost forever
  • Treasury spend governed by AIVA stakers

Result: a launch that discourages bots, rewards real users, and secures a sustainable budget to push AIVA toward becoming Web3’s default interface layer.

Long-Term Sustainability

  • Utility First, Everywhere. Every click a user saves or path a dev exposes requires $AIVA—ensuring baseline demand regardless of market cycles.
  • Builder Magnetism. 70 % path royalties + upcoming hackathon grants create an onboarding funnel for third-party talent that compounds network effects.
  • Elastic Security. Staking and optional path-bonding scale economic guarantees in proportion to value-at-risk, keeping the protocol solvent without central intermediaries.
  • Treasury-Backed R&D. A constant 20 % protocol cut funds audits, liquidity programs, and strategic partnerships—feeding long-term resilience.
  • Opt-in Premium Layer. AIVA Pro fees are discretionary; power-users subsidise core UX while retail enjoys fee-less base usage.

Result: a self-feeding economy where growth in personalised, zero-click interfaces directly translates into token utility, network security, and continuous burn—without relying on speculative narratives.