- cost,
- and throughput limits tied to account identity.
Core model
Burst combines:- a fixed deployment cost of
0.1 SOL, - per-account rate limiting,
- execution wallet enforcement,
- and protocol-level validation before launch.
Burst does not rely on one anti-spam switch.It combines economic cost, account binding, and execution controls.
Why it exists
Open launch systems fail when token creation becomes too cheap to abuse. Spam deploys do more than clutter a feed. They fragment discovery. They dilute liquidity quality. They make real launches harder to identify. Burst tries to keep token creation open without letting deployment throughput become unbounded.Enforcement model
1. Deployment cost
Each token deployment requires0.1 SOL paid at creation.
This is the first economic filter.
It helps:
- prevent zero-cost spam,
- introduce real capital cost to mass deployments,
- and align deployers with some minimum level of intent.
2. Execution wallet enforcement
All deployments must originate from the user’s Burst-issued execution wallet. That means:- users cannot deploy from arbitrary wallets,
- deployments tie back to a single account identity,
- and multi-wallet spam becomes harder to scale.
3. Per-account rate limiting
Each Burst account is subject to deployment throughput limits. Burst applies this as a rolling time window rather than fixed intervals. That means:- small bursts can still be allowed,
- but sustained rapid deployment gets blocked.
- bot loops,
- scripted mass launches,
- and rapid identity flooding.
4. Deployment cooldown
After each deployment, Burst can apply a short cooldown period. This prevents back-to-back launches from running indefinitely. It also means even well-funded attackers cannot flood instantly. Cooldowns can be:- fixed,
- or adjusted dynamically based on system conditions.
5. Global throughput limits
Burst also enforces a system-wide deployment ceiling. This protects core infrastructure during spikes. That includes:- indexing systems,
- merge layer processing,
- metadata resolution,
- and Meteora pool creation flow.
- deployments can be throttled,
- delayed,
- or rejected.
6. Identity and behavior correlation
Burst does not enforce limits purely by wallet address. It correlates behavior across:- execution wallet,
- account identity,
- funding source,
- and device or session signals.
- detect multi-account spam,
- apply shared limits across linked identities,
- and restrict abusive deployment patterns that simple wallet limits would miss.
Market pressure
Open access remains
Anyone can still launch a token.Burst does not gate creation behind manual approval.
Abuse gets more expensive
Mass deployment requires money, account throughput, and clean behavior.
Technical enforcement flow
Before a deployment is accepted, Burst validates the request at the protocol layer.validateDeployment.ts
.png?fit=max&auto=format&n=O9wqb87Qq03-iso6&q=85&s=776684f017a79312a9f0920271b745a5)