Maroo
A Compliant, Open Sovereign Layer 1 Blockchain for the Korean Won Economy
January 2026
Hashed Open Finance Hashed ShardLab Delight Labs
Table of Contents
- Overview
- Problem Definition
- Related Projects and Comparison
- Maroo Design Principles
- Platform Architecture
- 5.1 Core Components
- 5.2 Network and Consensus
- 5.3 Execution Environment
- 5.4 Node Roles
- 5.5 Identity and Account Model
- 5.6 Transaction Model and Regulatory Compliance
- 5.7 Privacy Design
- Conclusion
- References
Appendix: List of Diagrams
1. Overview
1.1 Vision and Mission
Maroo is a compliant, open sovereign Layer 1 blockchain for the KRW-denominated economy. The Korean digital economy is already thriving across online and mobile platforms. Yet practical on-chain financial infrastructure for everyday use by individuals and businesses remains nonexistent. Today’s major blockchains were never designed to accommodate customer experience, data protection, or regulatory compliance. This creates friction for regulators and consumers, while raising adoption barriers for developers and enterprises looking to build real-world applications.
Maroo’s vision is to build an open, trustworthy, and sustainable blockchain infrastructure for the KRW-denominated economy. We achieve this by designing a blockchain that embraces both regulatory alignment and permissionless innovation. This is a new paradigm where compliance and openness coexist.
1.2 Core Values
Maroo overcomes the limitations of existing blockchains through five core mechanisms.
KRW-Native Blockchain: All gas fees on Maroo are paid in a KRW-pegged stablecoin (hereafter called OKRW). Users and developers can predict and manage costs in a stable, familiar unit. Users need not hold ETH or other volatile tokens. This removes compounded volatility (gas price swings plus token price swings) that plagues other networks. Corporate finance teams can budget infrastructure costs in KRW without holding crypto assets on their balance sheets.
As the Maroo ecosystem grows and transaction volume increases, demand for OKRW naturally rises. This creates a flywheel: blockchain growth and KRW adoption reinforce each other.
Public, but Regulated: Maroo is a permissionless chain. Anyone can create a wallet and send transactions. However, it distinguishes between a Regulated Path and an Open Path based on counterparty identity, transaction size, asset type, and applicable laws. The Regulated Path requires pre-approval and compliance checks; the Open Path operates without such gates. This lets experimental innovation and heavily regulated activities coexist on the same infrastructure.
Programmable Compliance Layer (PCL): Maroo enforces compliance logic at the transaction level. It evaluates factors like amount thresholds, jurisdiction, KYC/KYB/KYA status, sanctions lists, and Travel Rule requirements. A Legal Oracle feeds regulatory parameters into the PCL, which then allows or rejects Regulated Path transactions accordingly.
Verifiable Privacy: Users control what to reveal (counterparties, amounts, asset types) on a per-transaction basis. Regulators access data through Observer Nodes under scope limits defined by law and enforced by the PCL. This design preserves user privacy while enabling legally grounded regulatory oversight.
AI Agent Oriented Design: As AI agents become mainstream economic actors, Maroo provides KYA (Know Your Agent) verification and transaction modules for autonomous agents, while protecting user privacy through clearly defined access permissions and delegation scopes. This ensures both accountability and boundaries for AI-driven economic activity.
2. Problem Definition
Since Bitcoin’s 2008 whitepaper, blockchain and digital assets have expanded dramatically. The stablecoin market alone grew from ~$28 billion in 2020 to ~$300 billion in 2025 (Citi, 2025). Yet real-world adoption remains limited. According to the IMF (2025), approximately 80% of stablecoin transactions consist of arbitrage and rebalancing by bots, serving crypto trading liquidity rather than everyday commerce. For non-USD currencies, the picture is even bleaker: over 90% of fiat-backed stablecoins are pegged to USD (TRM Labs, 2025).
Why has mainstream adoption remained limited? One major reason: the infrastructure that individuals, businesses, and governments need to use stablecoins in daily life simply doesn’t exist yet. Below, we outline the key limitations blockchain must address for digital assets to achieve mainstream adoption.
2.1 The Public Blockchain Gap
Public blockchains function as open financial operating systems. Anyone can create accounts, transfer assets, and deploy smart contracts. Products once exclusive to banks and card companies can now be built and launched by anyone with code. Leveraging open source, interoperability, and composability, entirely new financial and non-financial services have emerged rapidly. The Ethereum/EVM ecosystem has spawned on-chain trading, DeFi lending, derivatives, NFTs, gaming, and real-world asset (RWA) tokenization, all built on this openness.
But from the standpoint of financial infrastructure for everyday KRW transactions, even next-generation blockchains face critical gaps:
- No Privacy: Every participant’s financial activity is visible to everyone. Personal spending habits, corporate cost structures, trade secrets: all exposed. No rational actor wants to run their finances on a fully transparent ledger.
- No Real-Time Regulatory Compliance: Anonymity makes it impossible to determine jurisdiction or applicable rules in real time. Enforcement becomes reactive. AML, sanctions, and investigations happen after the fact.
- Structural KYC/AML Gaps: Addresses don’t equal identities. Applying KYC/AML consistently at the network level is nearly impossible. When AI agents enter the picture, linking owners to agents, defining permissions, and enforcing spending limits per transaction becomes even harder.
- Fragmented Enforcement: Local rules (licenses, limits, Travel Rule obligations) can’t be enforced as chain-wide standards. Compliance ends up fragmented across individual apps and operators.
The bottom line: existing public chains lack the regulatory and accountability foundations needed for financial infrastructure for everyday use.
2.2 The Traditional Finance Gap
Traditional finance has robust frameworks for regulation, auditing, and consumer protection. However, it struggles with programmable money and global interoperability.
Bank accounts, brokerage accounts, and card networks achieve some compatibility through APIs, but each runs on separate ledgers. Complex cases like cross-border remittances involve high fees, multi-day processing, and multiple intermediaries.
Consider Korea’s card and payment gateway (PG) infrastructure. Korea leads the world in card and mobile payment adoption. But merchants pay for it through fees (0.4% to 3.5% depending on size and channel) and delayed settlement (typically 3 business days). Refund costs add further friction. This structure poorly serves small-ticket, high-frequency, or cross-border transactions. Regulators have introduced fee caps and faster settlement cycles for small merchants, but structural issues remain.
Looking ahead, automated payment actors (i.e., AI agents executing high-frequency, conditional, micro-transactions in real time) will strain this infrastructure further. In automation-heavy scenarios, PG fee structures and settlement delays become serious design constraints.
2.3 The Regulation-Innovation Tradeoff
Today’s choices are binary:
- Option 1: Accept full regulatory control. Build infrastructure that operates only under banks and central authorities, disconnected from open ecosystems and global developer communities.
- Option 2: Prioritize openness. Launch a permissionless chain where anyone can deploy anything, but sacrifice regulatory alignment, auditability, and legal accountability.
The fundamental tradeoff is exactly what Maroo is built to resolve. Can a single infrastructure satisfy both regulatory requirements and innovation?
2.4 The Privacy-Transparency Dilemma
Blockchains are inherently transparent ledgers. But real-world finance demands privacy for individuals’ assets and spending patterns, confidentiality for corporate trade secrets, and audit access for regulators.
Full transparency exposes everything, creating privacy, competitive, and security risks. Full opacity blocks even legitimate oversight, enabling money laundering, fraud, and consumer harm.
Maroo takes a different approach: tiered transparency. Ordinary users enjoy strong privacy for personal finances. Higher-level entities (institutions, issuers, public bodies) face greater transparency and accountability requirements.
Personal data stays private by default. Disclosure happens only according to objective, pre-agreed criteria encoded in chain governance to specified parties, within specified scope. When these rules run as smart contracts in a trustless manner, the rules are enforced in a consistent, transparent, and verifiable manner.
2.5 The AI Agent Accountability Gap
Maroo is designed for a future where AI agents operate as economic actors. Global tech and fintech players are already deploying agents that search, compare, and purchase on users’ behalf. OpenAI launched Instant Checkout (with Stripe) in September 2025; Google announced the Agent Payments Protocol (AP2) with Mastercard and PayPal; Amazon is testing Buy For Me; Visa and Mastercard are building agent-specific payment rails for 2026 launch. Coinbase and Cloudflare released the x402 protocol, enabling AI agents to pay for APIs and content autonomously using stablecoins.
Traditional assets are merging with on-chain protocols. AI is starting to hold, manage, and transact assets directly. AI as economic actor is rapidly becoming reality, exposing the limits of infrastructure designed for humans alone.
Key requirements for the agent era:
-
Verify Agent Identity (KYA): Ensure verifiable identity for developers and operators. Beyond traditional KYC, establish agent identity, developer/operator attribution, and delegation relationships. This clarifies legal and financial accountability.
-
Enforce Scoped Delegation: Limit agent access to the minimum necessary, including user identity, payment methods, and assets. Apply explicit limits on amounts, counterparties, and time windows. Block actions outside scope technically.
-
Enable Real-Time Revocation: Detect abnormal behavior instantly. Revoke permissions immediately for malicious or compromised agents.
-
Maintain Audit Trails: Record every agent transaction to enable post-facto verification, dispute resolution, and compliance. Document who acted, on whose behalf, with what authority, and what happened.
Existing blockchain account models (one private key fully controls one account) can’t handle this. Delegating limited permissions to agents, expressing owner-agent relationships on-chain, verifying agent identity, blocking out-of-scope actions, and revoking permissions instantly: none of this exists at the protocol level today.
3. Related Projects and Comparison
Global blockchain players are each tackling “infrastructure that satisfies regulation, privacy, and openness” differently. Since 2024-2025, stablecoin-focused chains, compliance-ready L1s/L2s, and payment-optimized networks have emerged rapidly, all answering the same question: how to overcome the limitations of existing public blockchains.
Approaches fall into three categories:
- Protocol-level standardization: Standardize asset types, fee units, settlement rules, and compliance at the protocol layer, rather than leaving each app to implement its own.
- Atomic enforcement: Bundle compliance checks with transaction execution; auto-revert if conditions aren’t met.
- Hybrid models: Run a separate native token economy while providing payment-optimized features.
3.1 Comparison Framework
Maroo proposes six comparison axes, analyzing the tradeoffs each choice creates.
- (1) Chain Architecture & Governance: Is finality and policy enforcement independent, or dependent on an external chain? Who participates in consensus, upgrades, and parameter changes?
- (2) Network Economics: Fee policy, validator incentives, sustainability model.
- (3) Compliance & Identity Integration: App-level discretion vs. protocol-level enforcement.
- (4) Privacy Design: Full anonymity vs. selective disclosure compatible with audits.
- (5) AI/Agent Readiness: Control and accountability when agents transact.
- (6) Developer Experience: EVM compatibility, tooling, documentation quality.
3.2 Axis-by-Axis Analysis
(1) Chain Architecture & Governance
The first fork: does finality and policy enforcement happen independently, or depend on an external base chain?
Independent L1s emphasize fast finality and predictable settlement. L2s on Ethereum inherit base-layer security but face constraints on consensus rules, upgrades, and compliance parameters.
For national-scale stablecoin infrastructure, diverse stakeholders (regulators, bank consortiums, tech operators) must participate directly in governance. An independent L1 with self-contained governance fits better than an L2 bound by external chain rules.
(2) Network Economics
Second fork: what’s the unit for fees, settlement, and accounting? And how much does the network depend on volatile tokens?
Arc uses USDC for gas, aligning cost awareness with a stable unit. Codex uses ETH, passing volatility to users. Hybrids like Stable and Plasma simplify user paths with stablecoins while maintaining separate token economies for security and governance.
Maroo targets single-unit cost awareness in KRW. Fees should be predictable and not subject to sudden spikes from network congestion.
(3) Compliance & Identity Integration
Codex bundles compliance checks into execution for atomic enforcement (auto-revert on failure). Tempo standardizes policy enforcement at the transfer layer through policy stores and token standards. Arc and Stable lean toward issuer/institutional compliance, but app reusability varies by how primitives are exposed.
Maroo provides a protocol-level compliance module (PCL) that consistently enforces identity and policy checks on the Regulated Path, with a common interface apps can reuse.
(4) Privacy Design
Privacy is shifting from “full anonymity” toward selective disclosure compatible with audits.
Stable includes confidential transfers at the protocol level. Plasma offers selective, auditable confidential payments. Tempo and Arc plan selective privacy with auditability.
Maroo’s goal: selective privacy plus selective disclosure for sensitive flows like payments, with flexibility to adopt emerging privacy tech.
(5) AI/Agent Readiness
When agents join payment systems, the core challenge shifts from automation to control and accountability.
Tempo brings sponsorship, batching, scheduling, and delegation keys close to the transaction layer, delivering automation basics quickly. But most projects stop short of systematizing accountability and identity (KYA).
Maroo standardizes session keys, spending limits, and policy-based approvals for real-world payments, plus KYA (Know Your Agent) verification and auditable evidence to handle accountability on the Regulated Path.
(6) Developer Experience
Payment chains need more than EVM compatibility. Developer experience (DX) determines success.
Codex leverages OP Stack for tool reuse. Arc documents EVM differences clearly so developers know what’s changed. Tempo guides developers through practical pitfalls like “no native token.”
Maroo uses a KRW-first EVM where standard tools work out of the box. Differences (KRW fees, compliance, privacy, agent features) are clearly documented in SDKs. Testnet, explorer, indexing, monitoring, and regulatory observability ship from day one.
3.3 Comparison Summary
| Axis | Maroo | Tempo | Arc | Codex | Plasma | Stable |
|---|---|---|---|---|---|---|
| (1) Chain Architecture & Governance | Strong | Strong | Strong | Partial | Strong | Strong |
| (2) Network Economics | StrongOKRW Native | StrongStablecoin Gas | StrongUSDC Gas | WeakETH Gas | Partial | Partial |
| (3) Compliance & Identity Integration | StrongDual Track + PCL | Partial | Partial | Strong | Weak | Partial |
| (4) Privacy Design | StrongVerifiable Privacy | Partial | Partial | Weak | Partial | Partial |
| (5) AI / Agent Readiness | StrongKYA + Agent Verification | Strong | Partial | Weak | Weak | Weak |
| (6) Developer Experience | StrongKRW-first EVM | Partial | Strong | Partial | Partial | Partial |
4. Maroo Design Principles
4.1 Design Goals and Principles
Maroo’s goal in one sentence:
A compliant and open Layer 1 blockchain for the KRW-denominated economy
Maroo follows these design principles:
KRW-Native Blockchain
All fees are paid in OKRW (KRW-pegged stablecoin). This eliminates dual-volatility risk and creates a flywheel: more usage drives more OKRW demand.
Principle 1. Single Native Asset
- OKRW is the chain’s only native asset.
- All fees are paid in OKRW with no separate governance or utility token.
Principle 2. Stable, KRW-Denominated Fees
- Users and developers see all blockchain costs in KRW.
- Fee structure is stable and predictable, independent of volatile token prices.
Principle 3. Ecosystem-Linked Growth
- More transactions mean more OKRW demand and circulation.
- Blockchain growth and KRW adoption reinforce each other.
Public, but Regulated
Maroo is permissionless. Anyone can create wallets and send transactions. But it separates traffic into Regulated Path and Open Path.
Principle 4. Permissionless Access
- Anyone can create a wallet and transact.
- No prior approval required for wallet creation.
Principle 5. Dual-Track Transactions
- Regulated Path: Pre-approval and compliance verification required.
- Open Path: Standard transactions without prior approval.
- Both paths are explicitly tagged at the chain level.
Principle 6. Independent Governance
- Key stakeholders participate directly in consensus, upgrades, and compliance logic.
- Laws and regulations apply at the chain level through governance.
Programmable Compliance Layer (PCL)
Maroo evaluates and enforces compliance logic at the transaction level, covering amounts, jurisdictions, KYC/KYB/KYA status, sanctions lists, and Travel Rule.
Principle 7. Dynamic Regulatory Parameters
- Compliance rules are defined in code.
- A Legal Oracle feeds updated parameters to the chain as laws and policies evolve.
Principle 8. Transaction-Level Evaluation
- PCL evaluates Regulated Path transactions at execution and decides allow/reject.
- Goes beyond static blacklists by verifying complex conditions in real time.
Principle 9. Developer Reusability
- SDK exposes PCL parameter structures and query interfaces.
- Developers implement compliance without parsing raw regulations themselves.
Verifiable Privacy
Users control disclosure (sender, receiver, amount, asset type) on a per-transaction basis, balancing privacy with regulatory needs.
Principle 10. Selective Privacy
- Users choose what to reveal per transaction.
- Privacy levels range from full disclosure to full concealment.
Principle 11. Verifiable Compliance
- Zero-knowledge proofs (ZKPs) let users prove regulatory compliance without exposing sensitive data.
Principle 12. Controlled Access
- Regulators and Observer Nodes access data under pre-defined procedures and scope limits.
- Ordinary user transactions aren’t over-exposed.
AI Agent Oriented Design
Maroo provides KYA (Know Your Agent) verification, defining accountability and limits for autonomous economic actors.
Principle 13. Agent Identity Verification (KYA)
- Agent identity, owner, and permission scope are verifiable on-chain.
- Agent-owner relationships are explicitly recorded for clear accountability.
Principle 14. Delegation and Limits
- Clear access permissions and delegation scopes constrain what agents can do.
- Multi-layer limits: spending caps, session keys, policy-based approvals.
Principle 15. Sanction Mechanisms
- Malicious or compromised agents can be immediately revoked.
- Supports both agent-level and owner-level bulk sanctions.
4.2 Layer 1 vs. Layer 2
Whether to build an independent L1 or an L2 atop an existing chain is a foundational architecture decision, affecting governance, regulatory application, and developer experience.
Independent Governance and Compliance
Typical Ethereum L2s delegate data availability and final settlement to Ethereum. Transaction ordering and fee policies often depend on individual sequencer operators. While L2s inherit Ethereum’s security, they face constraints when stakeholders need direct participation in consensus, parameters, and upgrades.
Maroo requires chain-level governance for decisions like: who serves as validators, who updates the Legal Oracle and PCL parameters, and who intervenes (and how) for abnormal transactions. This demands an independent L1 not subordinate to external chain rules.
EVM Compatibility and Developer Experience
Choosing L1 doesn’t mean abandoning EVM benefits. Maroo runs an EVM-compatible execution environment:
- Deploy and execute Solidity smart contracts.
- OKRW functions like ETH as the native fee token. Familiar EVM patterns apply.
- Standard tools (Hardhat, Foundry) work out of the box.
- Core modules (Identity, PCL, Privacy) are exposed as precompiles. Developers use Maroo’s compliance features without leaving standard EVM workflows.
Summary: Maroo doesn’t reject Ethereum’s global security model. We chose an independent L1 to enable direct stakeholder participation in consensus and compliance while preserving EVM compatibility for developers.
5. Platform Architecture
5.1 Core Components
Maroo’s platform centers on five core modules: Maroo Core (consensus, execution, OKRW), Identity/Authentication Layer, Compliance Layer, and Privacy Layer, supported by node infrastructure. The diagram below shows how these connect to serve end users, institutions, and AI agents.
%%{init: {"theme": "base"} }%%
flowchart TB
subgraph Users["End Users & Institutions"]
U1["Individuals / Merchants"]
U2["Banks / Financial Institutions"]
U3["AI Agents"]
end
subgraph Access["Access Layer"]
Apps["Wallets / Apps / Banking Apps"]
API["SDK / API"]
end
subgraph Maroo["Maroo Core"]
Cons["Consensus & Execution<br/>(BFT + EVM + OKRW)"]
subgraph Modules["Core Protocol Modules"]
ID["Identity & Authentication"]
Compliance["Compliance Layer<br/>(PCL + Legal Oracle)"]
PRIV["Privacy Layer"]
end
end
subgraph Nodes["Node Roles"]
Val["Validator Nodes"]
Full["Full / RPC Nodes"]
Obs["Observer Nodes"]
end
U1 --> Apps
U2 --> Apps
U3 --> Apps
Apps --> API
API --> Cons
API --> ID
API --> Compliance
API --> PRIV
Cons --> Val
Cons --> Full
Cons --> Obs
style U1 fill:#64748B,stroke:#64748B,color:#fff
style U2 fill:#64748B,stroke:#64748B,color:#fff
style U3 fill:#64748B,stroke:#64748B,color:#fff
style Apps fill:#64748B,stroke:#64748B,color:#fff
style API fill:#64748B,stroke:#64748B,color:#fff
style Cons fill:#0096AA,stroke:#0096AA,color:#fff
style ID fill:#0096AA,stroke:#0096AA,color:#fff
style Compliance fill:#FF8C50,stroke:#FF8C50,color:#fff
style PRIV fill:#0096AA,stroke:#0096AA,color:#fff
style Val fill:#0096AA,stroke:#0096AA,color:#fff
style Full fill:#0096AA,stroke:#0096AA,color:#fff
style Obs fill:#FF8C50,stroke:#FF8C50,color:#fff
| Component | Description |
|---|---|
| Maroo Core | BFT consensus, EVM execution, OKRW native currency |
| Node Roles | Validator Nodes, Observer Nodes, Full/RPC Nodes |
| Identity & Authentication | Storage and query interface for KYC/KYB/KYA credentials |
| Compliance Layer | Dual-track model, PCL, Legal Oracle |
| Privacy Layer | Per-field disclosure controls and cryptographic protections (ZKP) |
5.2 Maroo Core
Maroo Core is the foundation: consensus, execution environment, and native currency.
5.2.1 Network and Consensus
Financial infrastructure demands instant finality. Maroo uses a battle-tested BFT consensus algorithm (e.g., Tendermint/CometBFT). The network has no forks. Once transactions finalize, they’re irreversible.
Given national-scale requirements, we assume up to several dozen validators, all deployed onshore in Korea.
Performance Targets:
- Sub-1-second confirmation for 95%+ of transactions
- Tens of millions of transactions per month
- Theoretical peak of 10,000 TPS
- 1,000-5,000 TPS baseline, scaling with private transaction mix
5.2.2 Execution Environment
Maroo targets EVM compatibility for developer experience. Solidity contracts deploy and run natively. OKRW serves as the gas token, familiar to any EVM developer.
Precompiles / Core Modules
- Identity, PCL, Privacy, Legal Oracle are callable from EVM contracts. Performance-critical components may be implemented at the core level.
Tool Compatibility
- Hardhat, Foundry, and other Ethereum tools work out of the box.
Parallel Execution
- Future option: switch to a parallel execution engine via transaction dependency analysis.
5.3 Node Roles
Three node types operate the network:
Validator Nodes
- Propose and validate blocks; participate in consensus.
- Vote on protocol upgrades and parameter changes.
Observer Nodes (Regulatory)
- Operate outside of consensus.
- Provide regulators with transaction flow access via dashboards and dedicated explorers.
- Decrypt and view data under pre-defined procedures, regardless of privacy settings.
Full/RPC Nodes
- Serve RPC and query requests for users, services, and developers.
- Scale horizontally to handle read-heavy traffic.
5.4 Identity and Account Model
5.4.1 Unverified vs. Verified Accounts
Maroo is permissionless. But accounts split into two types based on verification status: Unverified (Unknown) and Verified (Known).
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
subgraph Wallets["Accounts on Maroo"]
Addr("Wallet Address<br/>(ECDSA / AA)")
Unknown("Unverified Account<br/>(No KYC/KYB/KYA)")
KnownInd("Verified Individual<br/>(KYC Level N)")
KnownCorp("Verified Corporation<br/>(KYB Level N)")
KnownAgent("AI Agent Account<br/>(Linked to Owner)")
end
subgraph IdentityOff["Off-chain Identity Providers"]
KYCProv("KYC Provider")
KYBProv("KYB Provider")
KYAProv("KYA / Agent Provider")
end
subgraph IdentityOn["On-chain Identity Layer"]
IdContract("Identity & Auth<br/>Smart Contract")
end
Apps("Apps / Banks /<br/>Public Services")
Addr -->|"Create Wallet"| Unknown
Unknown -->|"1. KYC Request"| KYCProv
KYCProv -->|"2. KYC Verification<br/>(On-chain)"| IdContract
IdContract -->|"3. Status: KYC Done"| KnownInd
Unknown -->|"1. KYB Request"| KYBProv
KYBProv -->|"2. KYB Verification"| IdContract
IdContract -->|"3. Status: KYB Done"| KnownCorp
KnownInd -->|"Agent Registration"| KYAProv
KYAProv -->|"Agent Verification"| IdContract
IdContract -->|"Owner ↔ Agent Link"| KnownAgent
Apps -->|"Query Identity/Level"| IdContract
IdContract -->|"isVerified,<br/>expirationDate etc."| Apps
style Addr fill:#64748B,stroke:#64748B,color:#fff
style Unknown fill:#64748B,stroke:#64748B,color:#fff
style KnownInd fill:#64748B,stroke:#64748B,color:#fff
style KnownCorp fill:#64748B,stroke:#64748B,color:#fff
style KnownAgent fill:#64748B,stroke:#64748B,color:#fff
style KYCProv fill:#FF8C50,stroke:#FF8C50,color:#fff
style KYBProv fill:#FF8C50,stroke:#FF8C50,color:#fff
style KYAProv fill:#FF8C50,stroke:#FF8C50,color:#fff
style IdContract fill:#0096AA,stroke:#0096AA,color:#fff
style Apps fill:#64748B,stroke:#64748B,color:#fff
Unverified Accounts
- Function as standard wallets without KYC/KYB/KYA.
- Pay OKRW fees, send transactions, deploy contracts.
- May require additional verification for Regulated Path or specific financial services.
Verified Accounts
- Possess identity confirmation via KYC/KYB/KYA.
- Include subtypes such as Individual, Corporate, and Special Purpose (AI agents, bots).
This model keeps the chain permissionless while letting regulated services require verified accounts.
5.4.2 KYC/KYB/KYA Framework
- KYC (Know Your Customer): Individual identity verification
- KYB (Know Your Business): Corporate/institutional verification
- KYA (Know Your Agent): AI agent and bot verification: public registry of verified automated actors
Verification happens off-chain through authorized providers. On-chain, only Verifiable Credentials are stored: “This address has Level-2 KYC, expires YYYY-MM-DD.” Create, update, and revoke actions require multi-sig or governance approval.
5.4.3 AI Agent Account Model
Maroo’s on-chain agent model draws from proposals like ERC-8004 (AI Agent Registry), adapted for our regulatory and consortium structure. We start simple with an agent registry plus owner address, and expand as standards mature.
Owner Address
- Every agent must have an individual or corporate account as owner.
Agent Registry
- On-chain registry for agent address, owner address, permissions, spending limits, KYA level.
Sanction Mechanisms
- Suspend a specific agent, or bulk-suspend all agents under a single owner.
5.4.4 On-chain Identity Interface
The identity module exposes an interface like:
Input: (type, address)
type = 0→ Individualtype = 1→ Corporatetype = 2→ AI Agent
Output: (isVerified, expirationDate)
isVerified: Does this address meet required KYC/KYB/KYA levels?expirationDate: When is re-verification needed?
Example: A financial app requires re-verification for transactions over KRW 1M if the account is 6+ months old. The app queries expirationDate before the transaction, prompts re-verification if expired, then creates a Regulated Path transaction. This loosely couples chain-level identity with app-level UX, enabling patterns like Sign-In with Ethereum while meeting compliance requirements.
5.5 Transaction Model and Compliance
5.5.1 Dual-Track Transaction Model
Maroo’s transaction model addresses both regulatory requirements and permissionless innovation through two paths.
%%{init: {"theme": "base", "themeVariables": {"actorBkg": "#64748B", "actorTextColor": "#fff", "actorBorder": "#64748B"}} }%%
sequenceDiagram
participant U as User
participant App as Maroo App
participant PCL as PCL
participant Chain as Maroo L1
participant Obs as Observer
rect rgba(255,140,80,0.15)
Note over U,Chain: Regulated Path
U->>App: 1) Payment Request (with Identity)
App->>PCL: 2) Pre-screening (KYC status, limits)
PCL-->>App: 3) Approval + Auth ID
App->>Chain: 4) Tx + Auth ID (Tag: Regulated)
Chain-->>Obs: 5) Metadata (Regulated Stream)
end
rect rgba(100,116,139,0.15)
Note over U,Chain: Open Path
U->>App: 1') General Tx Request
App->>Chain: 2') Tx (Tag: Open)
Chain-->>Obs: 3') Metadata (Open Stream)
end
Regulated Path
- Only PCL-approved transactions proceed.
- Transactions include approval proofs.
- Explicitly tagged
Regulatedat chain level.
Open Path
- Standard transactions without pre-approval.
- Tagged
Openat chain level. - Subject to monitoring and post-facto enforcement.
Two key benefits:
(1) Space for Experimentation Startups and developers can experiment freely on the Open Path. As products mature, they migrate to the Regulated Path.
(2) Clear Institutional Standards Banks, securities firms, and public agencies can define policy: “Only Regulated Path transactions count as official records.” Problematic Open Path transactions can be tracked, sanctioned, and recovered through observer infrastructure.
Maroo occupies the middle ground, neither fully permissioned nor fully permissionless. Both layers coexist on one chain.
5.5.2 Programmable Compliance Layer (PCL)
PCL isn’t a monolithic smart contract embedding all rules. It’s a policy engine that reads parameters from a Legal Oracle and enforces them. Example parameters the Legal Oracle might publish:
- Daily transfer limit for retail users: KRW 10M
- Prohibited remittance destinations (countries, industries)
- Sanctioned addresses and entities
- Temporary regulations (e.g., emergency restrictions)
PCL references these when evaluating Regulated Path transactions. When regulations change, only the Legal Oracle updates; PCL logic stays stable. Separating parameter supply (oracle) from policy evaluation (PCL) lets laws evolve quickly while the chain’s core logic remains reliable.
For developers and operators, Maroo provides:
- SDK/libraries documenting PCL parameter structures
- Standardized query interfaces for Travel Rule thresholds, restricted lists, etc.
Developers build compliant apps without parsing raw regulations themselves.
5.5.3 Legal Oracle
The Legal Oracle brings legal and regulatory changes on-chain, publishing and updating parameters that PCL references.
Example Input Data:
- Per-transaction, daily, monthly limits
- Prohibited/restricted jurisdictions and industries
- Temporary event-driven regulations
- Travel Rule threshold amounts
Operating Entities: Designated Legal Oracle administrators (regulators, bank consortiums, legal institutions) participate via multi-sig or governance procedures. New parameters require threshold signatures, preventing unilateral changes by any single party.
PCL always references the latest Legal Oracle parameters. For example, if Travel Rule applies above KRW X, the Legal Oracle publishes this; PCL auto-reverts non-compliant transactions.
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
subgraph Gov["Off-chain Oracle Governance"]
Reg("Regulators")
FIs("Banks / Financial Institutions")
Legal("Legal & Compliance Experts")
Committee("Oracle Committee (Multi-sig)")
end
subgraph PolicyData["On-chain Policy Data"]
Oracle("Legal Oracle Contract")
Identity("Identity & Auth")
end
subgraph Enforcement["On-chain Enforcement & Usage"]
PCL("Programmable Compliance Layer")
Apps("Regulated Apps / Banks")
Obs("Observer Nodes / Dashboard")
end
Reg -->|"1) High-level Rules"| Committee
FIs -->|"2) Risk Limits"| Committee
Legal -->|"3) Policy Draft / Interpretation"| Committee
Committee -->|"4) Signed Parameter Update Tx"| Oracle
Oracle -->|"5) Limits / Lists / Flags"| PCL
Identity -->|"6) KYC / KYB / KYA Status"| PCL
Apps -->|"7) Regulated Tx + Proof"| PCL
PCL -->|"8) Allow / Reject / Tag"| Apps
PCL -->|"9) Tx Classification / Risk Signal"| Obs
Obs -->|"10) Supervisory Report"| Reg
style Reg fill:#64748B,stroke:#64748B,color:#fff
style FIs fill:#64748B,stroke:#64748B,color:#fff
style Legal fill:#64748B,stroke:#64748B,color:#fff
style Committee fill:#FF8C50,stroke:#FF8C50,color:#fff
style Oracle fill:#FF8C50,stroke:#FF8C50,color:#fff
style Identity fill:#0096AA,stroke:#0096AA,color:#fff
style PCL fill:#FF8C50,stroke:#FF8C50,color:#fff
style Apps fill:#64748B,stroke:#64748B,color:#fff
style Obs fill:#FF8C50,stroke:#FF8C50,color:#fff
SDK and sample code document Legal Oracle-PCL interactions (parameter formats, versioning, queries), enabling regulators, banks, and developers to build on the same compliance layer.
5.5.4 Incident Response and Recovery
Maroo doesn’t ignore real-world situations requiring post-facto remedy (hacks, phishing, clearly illegal fund flows). But rather than chain-wide rollbacks, we provide protocols for limited state correction under pre-defined procedures.
Possible actions include asset freezing, burning illegal assets, and re-issuance for victim relief, depending on circumstances. These functions activate only with legal basis and proper procedures, not as standing intervention powers. All enforcement is audit-logged to minimize abuse.
Technically, instead of rollbacks that “erase the past,” we prioritize new transactions that limit or invalidate prior state. This practical compromise accommodates real-world legal requirements while preserving blockchain immutability.
5.6 Privacy Design
Maroo brings KRW payment infrastructure on-chain. Core use cases (daily payments, salaries, benefits, P2P transfers, AI agent payments) are highly sensitive. Maroo’s privacy goal isn’t “hide everything.” It’s a tiered visibility model where access level depends on the viewer.
Public by default, selectively private when needed, yet always verifiable that the system is operating correctly.
5.6.1 Privacy by Viewer
Rather than uniform disclosure, Maroo designs for four viewer types: general public / transaction parties / operators / regulators (observers).
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
subgraph Pub["General Public"]
P["Minimal Metadata<br/>(Tx Hash, Block/Time,<br/>Raw/Regulated Tag)"]
end
subgraph Party["Transaction Parties / Operators"]
T["Parties: Own Tx Details<br/>Operators: Delegated/Policy Scope<br/>Partial or Aggregated"]
end
subgraph Obs["Observers / Regulators"]
O["Procedure & Scope Limited<br/>Sensitive Field Access<br/>+ Audit Trail"]
end
Pub -->|"Auth/Policy"| Party
Party -->|"Legal Procedure<br/>+ Scope Limit"| Obs
style P fill:#64748B,stroke:#64748B,color:#fff
style T fill:#0096AA,stroke:#0096AA,color:#fff
style O fill:#FF8C50,stroke:#FF8C50,color:#fff
- General Public: Minimal metadata maintains network transparency.
- Parties: Full access to their own transaction details.
- Operators: Many payments flow through services (wallets, PGs, payroll SaaS). Operators access only what delegation or policy permits, such as partial or aggregated data.
- Regulators/Observers: Detailed access when needed, but under protocol-defined procedures and scope limits, not blanket surveillance.
5.6.2 Controlled Access, Key Management, and Compliance Integration
Regulator access isn’t unlimited. It follows a procedure-based controlled access path. Access may not require user consent, but must always be premised on legal basis, approval procedures, and minimized scope. Requests, approvals, and access are all audit-logged. Multi-party approval (threshold/distributed) plus role separation prevents any single entity from accessing unilaterally.
Privacy features integrate with the PCL. Even protected transactions must verifiably satisfy regulatory requirements while minimizing sensitive data exposure. When needed, controlled access paths allow fact verification, always within scope limits. Even in protected mode, double-spend prevention, balance rules, and policy compliance remain consistently enforced.
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
U("User / Service")
subgraph Core["Maroo Core"]
C["EVM / Execution"]
S["Encrypted Storage<br/>(Optional)"]
end
D["PCL<br/>(Policy Evaluation)"]
R("Observer")
P["Legal Procedure / Policy"]
K["Controlled Keys<br/>(Threshold/Approval)"]
U -->|"1) Submit Tx<br/>(Public/Protected)"| D
D -->|"2) Rule/Policy Verification<br/>(Minimize Sensitive Data)"| C
C -->|"3) (Optional) Encrypted Commit<br/>(Protected Mode)"| S
R -->|"4) Access Request<br/>(Case/Period/Target/Field)"| P
P -->|"5) Approval/Scope Confirm"| K
K -->|"6) Auth/Decryption Shard"| R
R -->|"7) Scoped Query"| S
style U fill:#64748B,stroke:#64748B,color:#fff
style C fill:#0096AA,stroke:#0096AA,color:#fff
style S fill:#0096AA,stroke:#0096AA,color:#fff
style D fill:#FF8C50,stroke:#FF8C50,color:#fff
style R fill:#FF8C50,stroke:#FF8C50,color:#fff
style P fill:#FF8C50,stroke:#FF8C50,color:#fff
style K fill:#FF8C50,stroke:#FF8C50,color:#fff
5.6.3 Privacy Implementation Approaches
Maroo adopts two complementary approaches. They differ in where privacy is enforced, with tradeoffs in security assumptions, institutional onboarding, UX, and throughput.
(A) Gateway-Based Access Control
Control sensitive data access through authenticated gateways. Mask and filter query responses by role and permission. Public data stays open; sensitive fields return at limited resolution per policy. This enables rapid differential visibility. Regulators can access unmasked data under procedure and scope limits.
The network also publishes disclosures for transparency: state roots, aggregate statistics, policy enforcement summaries. This is verifiable minimum information allowing third parties to confirm ledger integrity and operational consistency.
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
subgraph External["External (Public Internet)"]
U["User / Wallet"]
P["Service Operator"]
O["Observer"]
end
subgraph Gateway["Authenticated Gateway"]
G["Gateway<br/>(Auth + Policy + Masking)"]
end
subgraph Net["Validator Network"]
S["Sentry / RPC Edge"]
V["Validator / Consensus"]
DB["Chain State"]
end
subgraph Disclose["Public Disclosure"]
D["Disclosure<br/>(State Root / Auth / Summary)"]
end
U --> G
P --> G
O --> G
G --> S --> V --> DB
DB --> V --> S --> G
DB -->|"Publish"| D
D -->|"Verification/Audit Basis"| External
style U fill:#64748B,stroke:#64748B,color:#fff
style P fill:#64748B,stroke:#64748B,color:#fff
style O fill:#FF8C50,stroke:#FF8C50,color:#fff
style G fill:#FF8C50,stroke:#FF8C50,color:#fff
style S fill:#0096AA,stroke:#0096AA,color:#fff
style V fill:#0096AA,stroke:#0096AA,color:#fff
style DB fill:#0096AA,stroke:#0096AA,color:#fff
style D fill:#64748B,stroke:#64748B,color:#fff
Advantages: Fast institutional onboarding with no need for new wallet types, proof generation, or ZK key management. Quick time-to-market with low technical uncertainty.
Risks: High operational dependency creates human-error attack vectors. Query and simulation paths expand the attack surface. Security relies on operations, auditing, and controls.
(B) ZKP-Based Shielded Pool
Provide a Shielded Pool at the protocol level using encrypted notes and zero-knowledge proofs. Users prove legitimate ownership and prevent double-spending without revealing sensitive fields. Regulatory integration happens through selective disclosure and controlled access. Similar approaches include Zcash, Aztec, and Railgun; however, achieving production-grade UX, throughput, and policy integration remains challenging.
%%{init: {"flowchart": {"htmlLabels": true}, "theme": "base"} }%%
flowchart LR
subgraph Client["Client / Wallet"]
W["Wallet (Proof Generation)"]
end
subgraph Chain["Maroo Core"]
Bank["Public Balance<br/>(Account-based)"]
Pool["Shielded Pool<br/>(Notes + Merkle Tree)"]
Verify["ZK Verification<br/>(On-chain)"]
Null["Nullifier Set<br/>(Double-spend Prevention)"]
end
subgraph Audit["Authorized Audit"]
Obs["Observer"]
Keys["Controlled Keys<br/>(Threshold/Approval)"]
end
W -->|"Deposit"| Bank -->|"Move to Pool"| Pool
W -->|"Withdraw: Proof + Nullifier"| Verify -->|"If Valid"| Pool
Verify --> Null
Obs -->|"Request (Scoped)"| Keys -->|"Approval"| Obs
Obs -->|"Read (Scoped, Controlled Access)"| Pool
style W fill:#64748B,stroke:#64748B,color:#fff
style Bank fill:#0096AA,stroke:#0096AA,color:#fff
style Pool fill:#0096AA,stroke:#0096AA,color:#fff
style Verify fill:#0096AA,stroke:#0096AA,color:#fff
style Null fill:#0096AA,stroke:#0096AA,color:#fff
style Obs fill:#FF8C50,stroke:#FF8C50,color:#fff
style Keys fill:#FF8C50,stroke:#FF8C50,color:#fff
Advantages: Privacy approaches trust-minimization, not relying on access controls alone.
Risks: Cutting-edge and experimental. Proof overhead may constrain throughput and cost. Wallet/SDK proof and note management may burden UX. PoC validation is essential.
5.6.4 Implementation Roadmap
These approaches aren’t mutually exclusive. The question is which scenarios to prioritize under which trust assumptions. PoC priorities:
- Is differential visibility UX actually achievable?
- Do procedures and controls prevent regulatory access abuse?
- Does PCL compliance verification integrate naturally in protected mode?
Details will evolve based on PoC results and legal requirements. Technical specifics (cryptographic stacks, key management, audit procedures, performance benchmarks) will be documented separately.
6. Conclusion
Most economic activity in Korea is already digital. Salaries, taxes, utilities, commerce, investments: all denominated in KRW. Mobile banking and simple payments mean most transactions are already digital.
But for this digital economy to move fully on-chain, it needs what existing public blockchains lack: a compliance framework regulators can trust, a transparency structure that protects privacy while enabling audits, and an accountability architecture suitable for AI agents operating as economic participants.
Maroo is a compliant, open sovereign Layer 1 for the KRW-denominated economy, built to address these needs:
- OKRW as native currency: fees, settlement, accounting all in KRW.
- Dual-track structure: balancing openness with regulatory alignment.
- Programmable Compliance Layer (PCL): adapting flexibly to evolving laws.
- Verifiable privacy: balancing user privacy with legitimate oversight.
- KYA-based agent accounts: defining clear accountability and limits for AI actors.
The blockchain transformation of everyday finance isn’t a distant future; it’s happening now. The global stablecoin market is surging. Major nations are building CBDC and tokenized asset infrastructure. AI is emerging as a financial actor. At this inflection point, Korea’s ability to build robust KRW-native blockchain infrastructure will be decisive for digital economy competitiveness.
This litepaper is a first draft outlining the problem and Maroo’s design direction. It’s meant to start conversations with regulators, financial institutions, tech companies, the developer community, startups, and researchers. Maroo aims to propose and build new digital infrastructure for the KRW-denominated economy, together with external researchers and technical contributors, and play a meaningful role in Korea’s path to digital economy leadership.
7. References
- [R01] BIS — Annual Economic Report 2023
- [R02] Ethereum Yellow Paper
- [R03] FATF — Updated Guidance for a Risk-Based Approach to Virtual Assets and VASPs (Oct 2021)
- [R04] FATF Recommendations (2012; updated June 2025)
- [R05] CometBFT Documentation
- [R06] W3C Verifiable Credentials Data Model 1.1
- [R07] EIP-4361: Sign-In with Ethereum
- [R08] Safe{Wallet}/Safe — Multisig Documentation
- [R09] BIS — CBDC information security and operational resilience
- [R10] Adi Shamir — How to Share a Secret (1979)
- [R11] Zcash Protocol Specification
- [R12] Tempo Documentation
- [R13] Circle Pressroom (includes Arc announcements)
- [R14] Codex Documentation
- [R15] Financial Services Commission (Korea) — 2025 Card Fee Reform Plan
- [R16] Trulioo Documentation
- [R17] CyberArk — Conjur Open Source Suite (Docs)
- [R18] Anthropic — Constitutional AI: Harmlessness from AI Feedback (arXiv)
- [R19] Oxford Martin AIGI — Verification for International AI Governance (PDF)
- [R20] PYMNTS — Will the stablecoin industry’s compliance dilemma be solved?
Appendix: List of Diagrams
- Maroo’s 5 Core Mechanisms Overview
- Problem Definition and Maroo’s Solution
- 6-Axis Comparison Framework
- Maroo Platform Architecture
- Node Roles and Data Flow
- Unverified vs. Verified Account Model
- Regulated Path vs. Open Path
- Legal Oracle → PCL → App Flow
- Data Visibility by Viewer Type
- Privacy Implementation Approaches