AG-196

Chain Finality, Reorg and Fork Governance

Crypto / Web3 Governance & Hostile Financial Environments ~20 min read AGS v2.1 · April 2026
EU AI Act FCA

2. Summary

Chain Finality, Reorg and Fork Governance requires that AI agents operating on blockchain networks correctly account for the probabilistic nature of transaction finality, the risk of chain reorganisations that can reverse previously confirmed transactions, and the governance implications of hard forks that create divergent chain states. An AI agent that treats a transaction as settled upon first confirmation — without waiting for sufficient finality — exposes the organisation to double-spend attacks, reorg-induced state inconsistencies, and settlement failures. This dimension mandates that agents enforce chain-specific finality thresholds before treating any on-chain event as authoritative, implement detection and response procedures for reorganisations that affect previously processed transactions, and maintain governance continuity across fork events that split the chain into competing versions.

3. Example

Scenario A — Premature Settlement on a Proof-of-Work Chain: An AI agent operating a crypto payment gateway accepts Bitcoin payments for a high-value goods marketplace. The agent credits a merchant account after 1 block confirmation for a 3.5 BTC payment (approximately $157,500 at prevailing rates). The merchant ships goods immediately upon credit. The buyer executes a Finney attack: they had pre-mined a block containing a conflicting transaction that sends the 3.5 BTC back to their own address. When this pre-mined block is released and adopted by the network (causing a 1-block reorganisation), the original payment transaction is replaced. The merchant has shipped goods worth $157,500 and holds a now-invalid payment transaction.

What went wrong: The agent treated 1 confirmation as final on a proof-of-work chain where 6 confirmations is the widely accepted finality threshold for high-value transactions. The premature settlement decision ignored the probabilistic nature of proof-of-work consensus: a 1-confirmation transaction on Bitcoin has a non-trivial probability of reversal (estimated at 0.1-1% depending on the attacker's hash rate). For a $157,500 transaction, the expected loss from premature settlement (approximately $157.50 to $1,575 per transaction) exceeds any latency benefit. Consequence: $157,500 in goods delivered against a reversed payment, dispute resolution costs, and loss of merchant confidence in the platform.

Scenario B — Cross-Chain State Inconsistency During Ethereum Reorganisation: An AI agent monitors Ethereum for DeFi position changes. The agent observes that its leveraged position on a lending protocol has been liquidated at block 19,450,322. The agent initiates a rebalancing strategy: selling 200,000 USDC of collateral on a DEX and opening a new position on a different protocol. A 2-block reorganisation occurs (rare on Ethereum post-Merge, but possible under validator client bugs or network partitions). In the reorganised chain, block 19,450,322 contains different transactions — the liquidation did not occur. The agent has now sold 200,000 USDC of collateral and opened a new position based on a liquidation event that never happened on the canonical chain. The original position remains open, and the agent has created duplicate exposure.

What went wrong: The agent acted on an on-chain event (liquidation) before achieving sufficient finality. On Ethereum post-Merge, 2-epoch finality (~12.8 minutes, 64 slots) provides economic finality backed by the slashing mechanism. The agent acted on 1-block confirmation (~12 seconds). The resulting state inconsistency created duplicate positions and misallocated collateral. Consequence: approximately $200,000 in misallocated collateral, duplicate leverage exposure, potential forced liquidation of the unintended position, and reconciliation costs.

Scenario C — Governance Continuity Failure During Hard Fork: An AI agent manages a multi-asset portfolio including ETH. A contentious hard fork occurs (analogous to the Ethereum/Ethereum Classic split in 2016). The fork creates two chains, each claiming to be the canonical version. The agent's mandate specifies operations on "Ethereum" without fork disambiguation. The agent continues operating on both chains — its RPC endpoint load balancer sends some requests to fork-A nodes and some to fork-B nodes. The agent executes 45 transactions over 6 hours, distributed randomly across both chains. Collateral positions, sanctions screening results, and exposure calculations become inconsistent because the agent's state reflects a mixture of two divergent chain states.

What went wrong: The agent had no fork detection mechanism, no governance policy for fork selection, and no state isolation between chains. The mandate did not specify how to handle fork events. The RPC endpoint configuration did not enforce chain ID verification. Consequence: Irreconcilable state across two chains, potential double-spend exposure on replay-vulnerable forks, regulatory uncertainty about which chain's transactions are authoritative, and 6 hours of operations that must be manually reviewed and potentially reversed (where reversible).

4. Requirement Statement

Scope: This dimension applies to all AI agents that read from, write to, or take decisions based on blockchain state. This includes agents that process payments, monitor DeFi positions, manage treasury assets, execute trades on decentralised exchanges, interact with smart contracts, or use on-chain events as triggers for off-chain actions. The scope covers all consensus mechanisms (proof-of-work, proof-of-stake, delegated proof-of-stake, proof-of-authority, and hybrid mechanisms), all finality models (probabilistic finality, economic finality, absolute finality), and all fork types (soft forks, hard forks, accidental forks, contentious forks). Agents that interact only with finalised blockchain data through archival or indexed data sources (e.g., querying a block explorer API for historical data that has already achieved finality) are excluded, provided they verify the finality status of the data they consume.

4.1. A conforming system MUST enforce chain-specific finality thresholds before treating any on-chain event as authoritative for settlement, accounting, or downstream decision-making. Minimum thresholds: Bitcoin — 6 confirmations for transactions above $10,000 equivalent value; Ethereum post-Merge — 2 epoch finality (~12.8 minutes) for transactions above $10,000 equivalent value; chains with absolute finality (e.g., Tendermint-based) — 1 confirmed block.

4.2. A conforming system MUST NOT credit, settle, or act upon any on-chain event that has not met the applicable finality threshold, except for provisional processing explicitly marked as "unconfirmed" with automated reconciliation upon finality.

4.3. A conforming system MUST implement reorganisation detection that monitors for chain reorganisations affecting any block containing transactions the agent has processed or is monitoring.

4.4. A conforming system MUST, upon detecting a reorganisation affecting a processed transaction, immediately: (a) flag all affected transactions as "reorg-impacted"; (b) halt any downstream actions dependent on the affected transactions; (c) re-evaluate the affected transactions on the canonical chain; and (d) trigger an alert for human review if the reorg changes the outcome of any settled transaction.

4.5. A conforming system MUST implement chain ID verification on every RPC connection, rejecting connections to nodes that report a chain ID different from the configured chain ID, to prevent accidental cross-fork operation.

4.6. A conforming system MUST define a fork governance policy specifying: (a) which chain is treated as canonical in the event of a fork; (b) the decision process for selecting a chain when the fork is contentious; (c) the actions taken to isolate state between forked chains; and (d) the conditions under which operations on a non-canonical chain are permitted.

4.7. A conforming system SHOULD implement transaction replay protection verification, confirming that transactions are protected against replay on forked chains (e.g., through EIP-155 chain ID encoding or equivalent mechanisms).

4.8. A conforming system SHOULD maintain a finality status tracker that records, for each processed transaction: the number of confirmations at each evaluation point, the timestamp of finality achievement, and any reorg events that affected the transaction before finality.

4.9. A conforming system SHOULD implement value-tiered finality thresholds, applying stricter finality requirements to higher-value transactions (e.g., 3 confirmations for Bitcoin transactions under $1,000; 6 confirmations for $1,000-$100,000; 12 confirmations for transactions above $100,000).

4.10. A conforming system MAY implement predictive reorg risk scoring based on network hash rate distribution (for proof-of-work chains) or validator set concentration (for proof-of-stake chains), dynamically adjusting finality thresholds based on current network security conditions.

5. Rationale

The concept of "finality" in blockchain networks is fundamentally different from finality in traditional payment systems. In the traditional banking system, a wire transfer is final when the receiving bank credits the funds — there is a clear, authoritative moment of settlement. In blockchain networks, finality is a spectrum: a transaction's probability of being reversed decreases with each additional block confirmation but, in probabilistic finality models, never reaches absolute zero.

This distinction creates a class of risk that does not exist in traditional systems: the risk that an event the agent treated as real is retroactively erased by a chain reorganisation. A reorganisation (or "reorg") occurs when the network discovers a competing chain of blocks that is longer (in proof-of-work) or has more attestations (in proof-of-stake) than the chain the agent was following. When a reorg occurs, transactions in the abandoned blocks are removed from the canonical chain. They may be re-included in subsequent blocks, but there is no guarantee — and a deliberate double-spend attack relies on creating a reorg that replaces a specific transaction.

The depth of reorgs varies by chain and consensus mechanism. On Bitcoin, 1-block reorgs occur multiple times per week due to natural block race conditions. 2-block reorgs are less common but documented. 6-block reorgs are extremely rare under honest mining conditions but feasible for an attacker with significant hash rate (Satoshi Nakamoto's original analysis estimated the probability of a 6-block reorg by an attacker with 10% of the hash rate at approximately 0.0002%). On Ethereum post-Merge, the Casper FFG mechanism provides economic finality: a finalised block cannot be reverted without at least one-third of the staked ETH (approximately $13 billion at current staking levels) being slashed. However, blocks between the latest and the latest finalised checkpoint (~12.8 minutes) can still be reorganised.

For AI agents, the risk is amplified by speed: an agent that acts on a 1-confirmation transaction may have committed irreversible downstream actions (releasing goods, crediting accounts, rebalancing portfolios) before the transaction achieves meaningful finality. The cost of premature action can far exceed the cost of waiting. AG-196 requires agents to wait for appropriate finality before treating on-chain events as authoritative, implementing the blockchain-specific analogue of AG-011's settlement integrity principle.

Fork governance addresses a distinct but related risk. Hard forks — protocol-level changes that split the network into two incompatible chains — can occur with or without warning. If the agent is not designed to detect and handle fork events, it may operate on the wrong chain, operate on both chains simultaneously (creating inconsistent state), or fail to recognise that its view of the blockchain has diverged from the canonical network. The Ethereum/Ethereum Classic split (2016) and the Bitcoin/Bitcoin Cash split (2017) are historical precedents that demonstrate the operational complexity of fork events.

6. Implementation Guidance

Chain finality, reorg, and fork governance requires integrating blockchain consensus awareness into the agent's transaction processing pipeline, replacing the naive assumption that "confirmed = final."

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Payment Processors and Gateways. Payment processors that credit merchants upon blockchain transaction confirmation must calibrate finality thresholds against the economic value of the goods or services being purchased. For physical goods that cannot be recalled once shipped, the finality threshold must account for the delivery lead time: if goods ship within 1 hour, the finality threshold must be achieved within 1 hour or the shipment must be held until finality.

DeFi Protocols and Liquidity Providers. DeFi protocols that react to on-chain events (liquidations, oracle updates, governance votes) must ensure that their agents wait for sufficient finality before acting on those events. A liquidation bot that acts on a 1-confirmation liquidation event and sells collateral may face a reorg that reverses the liquidation, leaving the bot with an unexplained collateral deficit.

Cross-Chain Bridge Operators. Bridges that transfer value between chains must enforce the strictest finality requirements of any application, because a cross-chain transfer cannot be reversed if the source chain transaction is reorganised after the destination chain mint has finalised. The Ronin Bridge exploit ($625 million, March 2022) and the Wormhole exploit ($320 million, February 2022) underscore the catastrophic consequences of finality and validation failures in bridge operations.

Maturity Model

Basic Implementation — The organisation enforces chain-specific finality thresholds for all transaction types. The agent does not settle, credit, or act on unconfirmed or under-confirmed transactions. Chain ID verification is implemented on all RPC connections. A basic fork governance policy exists. Reorg detection is not automated — reorgs are detected through post-hoc reconciliation. This level prevents the most common finality-related failures but may not detect reorgs in real time.

Intermediate Implementation — Automated reorg detection monitors for chain reorganisations in real time. The reorg response procedure automatically flags affected transactions, halts dependent actions, and triggers human review. Value-tiered finality thresholds scale security with transaction value. Transaction replay protection is verified for all outbound transactions. A finality status tracker records the confirmation history of each processed transaction. Fork governance policy includes state isolation procedures and explicit chain selection rules.

Advanced Implementation — All intermediate capabilities plus: predictive reorg risk scoring adjusts finality thresholds dynamically based on current network conditions (hash rate distribution, validator participation, network latency). Cross-chain finality coordination ensures that multi-chain operations (e.g., atomic swaps, bridge transfers) enforce coherent finality requirements across all participating chains. Fork detection is automated with sub-minute alert latency. The organisation conducts annual tabletop exercises simulating fork events and reorg scenarios to validate governance procedures. The agent's finality status history is integrated into the screening provenance system (AG-194) so that the finality status at the time of each compliance decision is recorded.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Finality Threshold Enforcement

Test 8.2: Reorganisation Detection

Test 8.3: Chain ID Verification

Test 8.4: Value-Tiered Finality Thresholds

Test 8.5: Fork State Isolation

Test 8.6: Reorg Impact on Settled Transactions

Test 8.7: Transaction Replay Protection

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU MiCAArticle 76 (Prudential requirements — settlement risk)Direct requirement
CPMI-IOSCOPrinciples for Financial Market Infrastructures — Principle 8 (Settlement Finality)Direct requirement
EU Settlement Finality Directive (98/26/EC)Articles 3-5 (Finality of transfer orders)Supports compliance
DORAArticle 9 (ICT risk management — operational resilience)Supports compliance
FCA SYSC6.1.1R (Systems and controls — settlement integrity)Supports compliance
EU AI ActArticle 9 (Risk Management System)Supports compliance

EU MiCA — Article 76 (Prudential Requirements)

MiCA establishes prudential requirements for crypto-asset service providers, including requirements related to settlement risk. For agents operating on behalf of CASPs, settlement risk materialises when a transaction that the agent treated as final is reversed by a chain reorganisation. AG-196's finality thresholds directly mitigate this settlement risk by ensuring that agents do not treat transactions as final until sufficient confirmation depth is achieved. MiCA's requirement for "orderly wind-down" plans also intersects with AG-196's fork governance policy, which defines the agent's response to chain-splitting events that may affect the CASP's assets and obligations.

CPMI-IOSCO — Principle 8 (Settlement Finality)

The CPMI-IOSCO Principles for Financial Market Infrastructures establish that a financial market infrastructure "should provide clear and certain final settlement, at a minimum by the end of the value date." Principle 8 specifically addresses the need for finality — the point at which a transfer is irrevocable and unconditional. In blockchain environments, this principle translates directly to the finality threshold requirements of AG-196. The CPMI-IOSCO analysis published in 2022 on "Application of the Principles for Financial Market Infrastructures to stablecoin arrangements" explicitly addresses the finality challenge in blockchain-based settlement, noting that "finality should be clearly defined" and that "the point of finality should be communicated to participants." AG-196's finality status tracker and multi-stage transaction lifecycle implement this communication requirement.

EU Settlement Finality Directive (98/26/EC)

The Settlement Finality Directive protects transfer orders in payment and securities settlement systems from the effects of insolvency proceedings once they have achieved finality. While the Directive was drafted for traditional settlement systems, its principle — that final settlement should be clearly defined and legally protected — extends to blockchain-based settlement. AG-196 implements the operational side of this principle: ensuring that the agent's definition of "final" is sufficiently robust that settled transactions are genuinely irrevocable.

DORA — Article 9 (ICT Risk Management)

DORA requires financial entities to maintain an ICT risk management framework that addresses operational resilience. Chain reorganisations and fork events are ICT risks specific to blockchain-based operations. AG-196's reorg detection, fork governance, and safe-mode procedures implement the operational resilience requirements of DORA for blockchain-dependent agent operations.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide, with potential cross-counterparty contagion through settled transactions that are subsequently reversed

Consequence chain: A finality governance failure creates a temporal inconsistency between the agent's state and the blockchain's state. The agent believes a transaction has settled; the blockchain disagrees. The consequences cascade: (1) Direct financial loss — goods shipped, funds credited, or positions opened based on a transaction that no longer exists result in unrecoverable losses. A premature settlement on a $157,500 Bitcoin payment that is subsequently reversed by a double-spend attack results in a $157,500 direct loss. (2) State corruption — the agent's internal state (balances, positions, exposure calculations, sanctions screening results) diverges from the on-chain state, creating a foundation of invalid assumptions that compound with every subsequent action. (3) Regulatory exposure — settlement failures may constitute operational risk events reportable to regulators. If the premature settlement involved a sanctioned counterparty whose sanctions screening was performed against the now-reversed transaction, the screening provenance (AG-194) is invalidated. (4) Cascade risk — downstream actions that depend on the settled transaction (further transfers, collateral rebalancing, accounting entries) must all be unwound, creating a reconciliation burden that scales with the time between premature settlement and reorg detection. (5) Fork-related confusion — operation on the wrong fork or on both forks simultaneously can create irreconcilable state, duplicate positions, and assets stranded on the non-canonical chain. The Ethereum Classic post-fork period saw approximately $5.6 million in replay attacks that exploited the absence of replay protection and fork governance.

Cross-references: AG-011 (Action Reversibility and Settlement Integrity) establishes the general principle that settlement decisions must account for reversibility risk; AG-196 applies this specifically to blockchain finality. AG-193 (Sanctions and Prohibited Counterparty Exposure Enforcement) depends on AG-196 for finality: a sanctions screening result is only as reliable as the finality of the transaction it screened. AG-194 (Rule-Snapshot and Screening-Time Provenance Governance) should record the finality status at screening time. AG-197 (Bridge, Wrapped Asset and Cross-Chain Dependency Governance) extends AG-196's finality requirements to cross-chain operations where finality must be coordinated across multiple chains. AG-001 (Operational Boundary Enforcement) provides the structural enforcement framework within which finality thresholds operate. AG-115 (Strong Authentication for Agent-Initiated Value Transfer) ensures that transaction signing occurs only after finality verification, preventing premature commitment of signing authority.

Cite this protocol
AgentGoverning. (2026). AG-196: Chain Finality, Reorg and Fork Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-196