Defense model
- Layered task validation to prevent low-quality completion spam.
- Wallet behavior scoring to reduce suspicious reward concentration.
- Duplicate detection and anomaly flags before claim finalization.
- Integrity logs for verifiers and distribution operators.
