# ElizaOS Intel — 2026-04-01

## 1) Data Pattern Recognition (Quant + Trends)

### Development velocity & engineering focus
- **Security response time (high):** A critical supply-chain alert (axios **1.14.1** pulling **plain-crypto-js 4.2.1** malware) surfaced in Discord and was **already mitigated across at least 2 plugin repos** by pinning axios to **1.7.8** (`plugin-autocoder`, `plugin-coingecko`).  
  - Signal: engineering can execute quickly on clear, scoped incidents.
- **Strategic R&D load (growing):** Multi-repo discussion on **Dreamline x402 Policy Facilitator** indicates rising design complexity (governance patterns, registry chain selection, operator pre-auth visibility, escrow/protocol integration).  
  - Risk: design churn without a decision owner and explicit milestones.

### Community engagement & sentiment patterns
- **Sentiment (critical / dominated by token issues):**
  - Reported token drawdown: **~99.5% from peak** (multiple users; described as “worse than Luna/UST”).  
  - Recurrent allegations: **team dumping**, plus **migration outcome** where **~40% of community tokens allegedly transferred to team wallets**.
  - Engagement skew: discussion volume concentrates on **trust + communication failures**, not product usage.
- **Channel segmentation is now a structural UX issue:** confusion between main Discord (traders/investors) vs. “cozy dev Discord” (builders). Community explicitly links fragmentation to investor misunderstanding and missed narrative.

### Feature adoption & ecosystem traction
- **Orbis API marketplace traction (early but measurable):**
  - **300+ APIs listed**
  - **15 registered users**
  - **13 active paid subscriptions**
  - Providers keep **90%** of transaction revenue
  - Hackathon incentive: **1,700 USDC** prizes (providers/subscribers)
- Interpretation: Orbis has a tangible “agent commerce” wedge, but it’s not yet translating into broader confidence in ElizaOS due to narrative + token linkage gap.

### Pain point correlation across channels
- **Single dominant failure mode:** “Active GitHub ≠ belief”  
  - Discord repeatedly states development is happening, but **users cannot connect it to token value/utility or project direction**.
- **Token mechanics + operations coupling:** Paying devs in the token is perceived as forced sell pressure → “death spiral” narrative reinforced by price action and lack of transparency.
- **Tooling demand signal:** request for **Instagram Story scraping** alternatives; current baseline (Apify) cited at **~$0.30/story** → cost sensitivity and need for a sanctioned approach.

---

## 2) User Experience Intelligence (Impact/Themes + Opportunities)

### Feedback themes (categorized)
**A) Trust & Transparency (Critical impact, highest volume)**
- Missing/contradictory leadership comms (Shaw absence; prior buyback statement referenced as unfulfilled).
- Unclear token distribution, migration accounting, and treasury policy.
- Users explicitly ask whether the project is abandoned/scam (amplified by price + silence).

**B) Information Architecture & Onboarding (High impact)**
- Fragmented community spaces create “ecosystem blindness” (e.g., many unaware Milady was built on Eliza).
- Investors want a **single canonical hub** mapping projects → framework → token utility.

**C) Security Posture (High impact, acute)**
- Axios supply-chain incident validates need for a formalized dependency incident playbook and faster broadcast/verification loop.
- Ongoing scam warnings indicate active adversarial environment in community channels.

**D) Builder Economics / Tooling (Medium impact, niche but actionable)**
- Cost-effective scraping/ingestion tooling requested (Instagram Stories). Users want mention/URL extraction “by story URL.”

### Usage patterns vs intended design (mismatches)
- Intended: “Agent Commerce + x402” as flagship story.  
  Actual: market-facing audience primarily experiences **token losses + silence**, not product wins.
- Intended: separate dev vs investor spaces for focus.  
  Actual: separation is producing **narrative discontinuity** and perceived abandonment.

### Implementation opportunities (near-term)
- **Public “Reality Bridge” artifact:** weekly “Build → Ship → Why it matters” mapping (GitHub merges → user outcomes → token/utility implications).
- **Website ecosystem directory:** agents/apps/dApps/community projects with explicit “Built on ElizaOS” badges + owner links + status.
- **Security bulletin + dependency policy:** pinned advisory post + automated scanning + “known-good versions” list.
- **Approved ingestion toolkit guide:** options matrix for story scraping + cost/perf + compliance notes; ideally a plugin path.

---

## 3) Strategic Prioritization (Impact vs Risk + Critical Path)

### Top initiatives to prioritize (next 2–4 weeks)

#### P0 — Restore trust via verifiable transparency (User impact: Very High | Tech risk: Low–Med)
**Deliverables**
1. **Token/migration transparency pack (publish & pin):**
   - Migration ledger summary (what moved, where, why; reconcile the “40%” claim with auditable data)
   - Team/treasury wallets list (or controlled disclosure approach) + policy for movements
   - Developer compensation policy statement (how sell pressure is managed)
2. **Communication SLA:**
   - Named comms owner; **2 updates/week** minimum (even if “no change”)
   - “Single source of truth” page linked in Discord topic and website header

**Why now**
- Sentiment indicates trust is the gating function for every other initiative; without it, product progress won’t be believed.

**Resourcing**
- 1 lead (Ops/Comms) + 1 finance/token ops analyst + 1 engineer for data extraction/verification.

---

#### P0 — Institutionalize supply-chain security response (User impact: High | Tech risk: Low)
**Deliverables**
- Dependency incident playbook: detection → triage → pin/patch → broadcast → verification.
- Automated controls: Dependabot/Renovate rules + lockfile enforcement + “block compromised versions” policy.
- Publish a **Security Advisory** entry for axios incident: affected versions, pinned safe versions, repos verified.

**Why now**
- Fast patch happened, but without a visible process the community won’t credit competence; also reduces repeat risk.

**Resourcing**
- 1 security-minded engineer (can be part-time) + maintainer buy-in across plugin repos.

---

#### P1 — Ecosystem information architecture & community bridging (User impact: High | Tech risk: Medium)
**Deliverables**
- **Website Hub:** directory of projects + agents + plugins + “Built on ElizaOS” taxonomy.
- **Discord bridging:** implement proposed bridged room(s) to connect dev/investor spaces while preserving channel intent.
- A short canonical explainer: “ElizaOS vs Milady vs DegenAI vs SHAW — how they relate.”

**Dependencies**
- Needs a clear owner and a lightweight content model (schema) before implementation.

**Resourcing**
- 1 web dev + 1 PM/editor + community mod support.

---

#### P1 — x402 spend governance decisions (User impact: Medium–High (builders) | Tech risk: High)
**Decision points to force (to avoid design drift)**
- Target chain for on-chain registry (drives token standards, oracle availability, ecosystem integrations).
- Operator visibility requirement (pre-execution eventing vs post-balance-change).
- Minimal pre-authorization layer spec (machine policy checks vs explicit human authorization).

**Recommendation**
- Timebox to **2 weeks** for architecture selection; ship a minimal “safe default” policy facilitator that can evolve.

**Resourcing**
- 1 technical lead + 2 engineers + input from major contributors already active in discussions.

---

### Deprioritize / Avoid (until trust baseline improves)
- Net-new token-adjacent promises (e.g., buybacks) without auditable execution mechanisms.
- Expansive feature marketing that does not directly answer “why hold/use the token” with concrete utility and governance.

---

## Key Metrics to Track (starting immediately)
- **Sentiment:** % of daily discussion messages about (a) token distrust vs (b) product/build topics (target: shift 20–30% toward product within 30 days).
- **Comms reliability:** updates published/week (target: ≥2) + median response time to top-3 community questions (target: <48h).
- **Security hygiene:** % repos pinned/locked for critical deps + time-to-patch for new advisories.
- **Orbis growth:** registered users, paid subscriptions, API calls, provider earnings; correlate announcements to signup deltas.

---

## Actionable Recommendations (Executive)
1. **Ship transparency before features:** publish a migration + treasury + dev-compensation explainer with verifiable references; pin it everywhere.
2. **Make GitHub legible to non-devs:** weekly “what shipped + why it matters” mapping to user value and (where applicable) token utility.
3. **Formalize supply-chain defense:** convert the axios incident into a documented, repeatable security program and public advisory trail.
4. **Unify the ecosystem narrative:** implement the website hub + bridged Discord rooms to reduce fragmentation-driven confusion.
5. **Timebox x402 governance decisions:** assign a decision owner, pick target chain + operator visibility model, and ship a minimal safe pre-auth layer.