
Building a subnet on Bittensor ($TAO) demands a working understanding of incentive design, a clear vision of what problem the AI is solving, and the engineering discipline to execute it on a live decentralized network.
The OpenTensor Foundation and HackQuest knew this when they launched the Bittensor Subnet Ideathon, a community-driven competition designed to surface the next generation of subnet ideas from builders across the ecosystem.
After reviewing more than 150 submissions and putting the strongest concepts through a rigorous testnet phase, the results are in. What emerged from the process is a window into the range of real problems that decentralized AI infrastructure is now being built to solve.
A Closer Look at the Winning Projects
Following live demos and testnet execution in Round 2, here are the teams that made it through and shipped working ideas under these competitive conditions:

1. Proven β 1st Place
Writing code is not the gap AI has quietly created in software development, it is in verifying it. As AI-generated code becomes the norm, the tooling to audit and validate that code at scale has not kept pace, and Proven is building exactly that infrastructure.
The core capabilities include:
a. Auditing software without exposing private source code,
b. Generating end-to-end test suites directly from product specifications,
c. Detecting hidden frontend and backend bugs through mutation testing, and
d. Creating a new open standard for software verification in the AI era.
As AI writes more of the world’s code, the infrastructure to verify it needs to scale alongside it. Proven is making that verification a decentralized, incentivized competition rather than a proprietary bottleneck.

2. ChronoSeek β 2nd Place
Finding a specific moment inside a video has always been one of search’s most stubborn unsolved problems. ChronoSeek approaches it through semantic natural-language queries, making it possible to describe a scene and retrieve the exact timestamp rather than scrubbing through content manually.
What makes the architecture thoughtful is how it handles quality and integrity:
a. Combines vision and audio signals for richer, more accurate retrieval,
b. Rewards miners specifically for high-quality video understanding, and
c. Built with explicit resistance to spam and reward gaming from the ground up
The practical implication is a search experience for video that works the way human memory does.

3. Mentiss AI
Most AI benchmarks test what a model knows, but Mentiss AI tests how a model thinks under social pressure. By using the social deduction game βWerewolfβ as an evaluation environment, the solution captures dimensions of intelligence that standard metrics consistently miss:
a. Reasoning, persuasion, and deception detection in live adversarial settings,
b. Trust-building and decision-making under incomplete information,
c. Synthetic training data generation through self-play and human game sessions, and
d. Support for custom AI providers and direct model versus model matchups
It is a genuinely novel approach to the question of what intelligence actually means when context, relationships, and uncertainty are all in play simultaneously.

4. Sotarad
Healthcare AI tends to generate headlines around diagnostics, but the infrastructure behind reliable, scalable medical screening remains fragmented. Sotarad, as a radiology pre-screening subnet, focused on chest imaging, and what separates it from generic diagnostic tools is the evaluation design:
a. Detects tuberculosis, pneumonia, bronchitis, and silicosis from chest scans,
b. Scores miners on full model checkpoints against future real-world data, not isolated predictions,
c. Prioritizes recall deliberately to reduce the risk of missed diagnoses, and
d. Uses tiered rewards to surface the most reliable models consistently over time
This is AI infrastructure where the cost of getting it wrong is measured in patient outcomes, and the incentive design reflects that seriousness.

5. Defektr
Manufacturing quality control is a domain where marginal improvements in detection accuracy translate directly into cost savings at scale, and Defektr builds the competitive infrastructure to drive those improvements through open competition. To this, Defektr:
a. Scores models on accuracy, speed, and robustness across real anomaly detection datasets,
b. Deploys top-performing models on edge hardware including NVIDIA Jetson and Coral TPU, and
c. Benchmarks against production-line defect detection scenarios rather than synthetic tests.
The vision is to turn industrial computer vision into an open market for the best models, rather than a proprietary capability locked inside a handful of enterprise vendors.

6. OpenMind
Memory is the most persistent limitation of AI agents in production environments, not even capability. An agent that loses context between sessions cannot maintain continuity on long-running tasks, collaborate meaningfully with other agents, or build reliably on its own history.
OpenMind addresses this with a decentralized memory layer that offers:
a. Persistent storage of messages, documents, tool outputs, and interactions over time,
b. Exact context retrieval instead of lossy summarization,
c. Multimodal memory support across PDFs, images, and screenshots, and
d. Shared memory spaces designed explicitly for multi-agent collaboration.
The downstream effect is fewer hallucinations, lower token costs, and agents that can actually be trusted with work that spans more than a single conversation.

7. BitDefense
On-chain security has historically been the domain of expensive enterprise monitoring tools, which leaves smaller protocols at a structural disadvantage the moment they go live. BitDefense closes this gap with a decentralized security subnet that brings real-time threat detection within reach of any project, regardless of budget.
Its capabilities include:
a. Real-time analysis and threat detection for decentralized applications,
b. Continuous monitoring of on-chain activity and security invariants,
c. Early detection of suspicious behavior before exploits can be executed, and
d. Enterprise-grade protection at pricing accessible to smaller protocols
By making security tooling available through an open, incentivized network, BitDefense turns the best detection logic into a public good rather than a gated service.
NB: Other projects recognized and given honourable mentions include Moirai, Talos, Vividverse, Query Agent, TensorClock, and C-SWON.
The Bigger Picture
What this ideathon ultimately reveals is the breadth of problems that a well-designed incentive layer can pull into a decentralized network: Code verification, video search, social intelligence benchmarking, medical imaging, industrial defect detection, agent memory, and protocol security.
These are genuine infrastructure gaps in industries that have spent years without satisfying answers (These are not toy problems or research curiosities!)
The fact that teams built working testnet implementations across problems this diverse, without large research lab backing or enterprise budgets, says something important about where Bittensor is as a platform right now. The ideathon, beyond competition, was proof that when the incentives are designed well enough, serious builders show up to do serious work.
Enjoyed this article? Join our newsletter
Get the latest TAO & Bittensor news straight to your inbox.
We respect your privacy. Unsubscribe anytime.

Be the first to comment