The SEC/CFTC 2026 Token Taxonomy: A Developer's Guide to Staking, Airdrops, and Classification

The SEC and CFTC's 2026 joint interpretation gave US developers something the industry has waited a decade for: a real taxonomy. Five categories now define how federal securities laws apply to crypto assets, and only one of them is a security. If you ship a token, run a staking program, or distribute via airdrop, the new framework changes what you owe regulators and what you can build.
What actually changed in 2026
For years, every crypto product in the US lived under the same vague question: is this a security? The Howey test was the only formal tool, and case law evolved one enforcement action at a time. Builders shipped products knowing the answer could change with the next chair.
On March 17, 2026, the SEC published its formal interpretation establishing a five-bucket framework. The CFTC followed with a coordination Memorandum of Understanding and a Joint Harmonization Initiative, ending years of jurisdictional turf wars. See the official press release for the full text: https://www.sec.gov/newsroom/press-releases/2026-30-sec-clarifies-application-federal-securities-laws-crypto-assets
Three weeks later, FinCEN and OFAC issued the GENIUS Act proposed rule for permitted payment stablecoin issuers, treating them as financial institutions under the BSA. Combined, these moves make 2026 the first year US crypto builders have a coherent legal map instead of a patchwork.
The five-bucket taxonomy explained
The SEC's interpretation defines five categories of crypto asset. Only the fifth is a security.
1. Digital commodities
Native units of decentralized blockchain networks (think BTC, ETH on a base layer). These are not securities and trade under CFTC commodity oversight. If your project ships a Layer 1 token that secures consensus and pays for compute, this is your likely category. For a deeper look at this category, see the complete Autheo guide.
2. Digital collectibles
Non-fungible tokens representing unique items, art, identity, or access rights. Not securities so long as the marketing and economics do not promise investment returns. If your collectible drops include yield, you have moved into a different bucket. Keep utility separate from speculation in your tokenomics and marketing copy.
3. Digital tools
Tokens that function as fuel, fees, or access keys to onchain services. Compute credits, storage credits, API access keys, and infrastructure utility tokens fit here. The standard: utility must be more than nominal and the token must not be marketed as an investment vehicle.
4. Payment stablecoins
Payment stablecoins under the GENIUS Act are not securities, but they now sit under FinCEN's BSA regime as financial institutions. If your project plans to issue a USD-backed token used for payments, your compliance program needs AML, sanctions screening, and an established issuer entity before launch. We covered the operational implications in detail in our stablecoin yield bans breakdown.
5. Digital securities
Traditional securities that have been tokenized. Stocks, bonds, fund shares represented onchain. These remain fully subject to SEC oversight, registration requirements, and broker-dealer rules. If you tokenize a private fund or issue a yield-bearing wrapper, you are in this bucket whether you like it or not.
Staking: when it is a service, when it is a security
Staking was the most contested category for years. The 2026 interpretation finally answers most of the open questions, though some edge cases remain.
The clear pass: protocol staking on a digital commodity network, where the validator earns rewards for performing network functions, is not a security. You run a node, you do work, the protocol pays you. The user retains custody and chooses the validator. This is now formally outside Howey.
The clear fail: a custodial staking product where users hand over tokens to a third party that combines them, takes a fee, and promises a return is still likely a security. The expectation of profit from someone else's managerial efforts is intact. Custodial staking-as-a-service operators should expect to register or restructure.
The gray zone: liquid staking. The interpretation is silent on whether a token that wraps a custodial staking position is itself a security separate from the underlying. Most legal observers expect the SEC to address this in follow-on guidance. If you build liquid staking, talk to counsel early and design your protocol so the wrapping mechanism is purely technical, not a service. The architecture choices you make now will determine whether you need to register the wrapper later. For an architectural primer, see our guide to building onchain agents and protocols.
Airdrops: the new compliance posture
Airdrops sit in a more nuanced spot than most teams realize. The interpretation distinguishes between drops that distribute tokens to actual users of a network and drops that function as a pre-sale wrapped in marketing language.
If your drop rewards demonstrated, verifiable onchain activity (transaction history, deposits, governance participation) and the token already has utility on its network, you are likely fine. The recipients earned the token through behavior, not investment.
If your drop is gated by something that looks like an investment (purchasing NFTs at a price that implies future value, locking up other tokens to qualify, or signing up a wallet with no real utility behind it), the SEC may view it as a distribution of a security. Document your eligibility logic and keep it tied to provable network activity, not financial commitment.
Practical pattern: emit airdrop eligibility as a deterministic function of onchain events. Any auditor can reconstruct who qualified by replaying transactions. This pairs well with the auditability standards we covered in our piece on managing non-financial risk across your blockchain stack.
How to classify your token before launch
Most teams I talk to ship first and lawyer up later. With the new framework, that order has reversed in cost and risk. Here is a four-step classification workflow you can run yourself before booking an outside attorney.
Step one: write a one-paragraph utility statement. What does the token actually do on day one? If the answer requires future development or governance to be useful, you are closer to a security than a digital tool. Tighten the utility statement until it describes value that exists at launch.
Step two: map your distribution. Who gets tokens, when, and on what condition? Pure work-based distribution (mining, validating, providing storage) keeps you in commodity or tool territory. Sale-based distribution at a fixed price to passive buyers leans security. Most projects sit in the middle and need to document the rationale for each tranche.
Step three: scrub your marketing. Every public statement about future appreciation, roadmap milestones tied to price, or comparisons to investment products is evidence. If your landing page reads like a pitch deck, regulators will treat it like one. Move investment-oriented language to private, gated communications with accredited investors only, or remove it entirely.
Step four: design a transition path. The interpretation explicitly contemplates that a token may move between categories over time. A token launched as a security can become a digital tool once the network is sufficiently decentralized and the team's role becomes ministerial. Build the milestones for that transition into your protocol roadmap and document them publicly.
The multi-jurisdiction reality
The 2026 US framework is the cleanest in the world right now, but it is not the only one that matters. MiCA is fully in force across the EU. The UK's regime is taking shape. Singapore and Hong Kong have evolved. A token program that is bulletproof in the US can still create exposure elsewhere.
If you plan to operate across borders, treat geography as a first-class constraint in your contract logic. Eligibility checks that pull from verified attestations let you launch in your strongest markets first and expand as approvals land. Our app-specific chains guide covers how appchain architecture lets you enforce jurisdiction at the network level when you cannot do it at the contract level.
The most successful teams in 2026 are treating compliance as a product feature, not an afterthought. The contract is the policy, and the policy needs to be designed before you write the first line of code, not after.
What this means for L1 selection
Token classification flows downstream from the network you deploy on. If your L1 is itself classified as a digital commodity, your token built on it has a cleaner classification path. If your L1 has ambiguous legal status in the US, your token inherits that uncertainty.
Builders evaluating where to deploy should ask: does the chain have a clear legal posture, demonstrable decentralization, and infrastructure that supports compliance workflows? Autheo was built with this end state in mind: PoA consensus with deterministic validator selection, post-quantum signatures for long-tail audit retention, and architecture that supports both permissionless and permissioned deployments. For the full picture on why this matters for the next wave of regulated builders, see our breakdown of the $500B Web3 infrastructure opportunity.
Key takeaways
- The 2026 SEC/CFTC interpretation defines five crypto categories: digital commodities, collectibles, tools, payment stablecoins, and digital securities. Only the last is a security.
- Protocol staking on a digital commodity network is not a security. Custodial staking-as-a-service likely is. Liquid staking is still gray.
- Airdrops gated by demonstrated onchain activity are fine. Airdrops gated by anything resembling investment are at risk.
- Classify your token in four steps: utility statement, distribution map, marketing scrub, transition path.
- Compliance is a product feature now. Bake it into contract logic, not legal footnotes.
Building on the new framework
The 2026 framework is not a finish line. The SEC will issue follow-on rulemaking, the CFTC will publish examination priorities, and the EU and UK will keep evolving in parallel. But the shape of US crypto law is settled enough that builders can finally make architectural decisions with confidence.
If you are building a token program, a staking product, or an airdrop in 2026, the framework rewards teams that design for clarity from day one. Tight utility, work-based distribution, clean marketing, documented transitions. The teams who do this will spend their time shipping product instead of fighting subpoenas.
Autheo is purpose-built for builders who want regulatory clarity baked into the infrastructure. Explore the platform, the DevHub, and the GSI partnership model at autheo.com.
Gear Up with Autheo
Rep the network. Official merch from the Autheo Store.
Theo Nova
The editorial voice of Autheo
Research-driven coverage of Layer-0 infrastructure, decentralized AI, and the integration era of Web3. Written and reviewed by the Autheo content and engineering teams.
About this author →Get the Autheo Daily
Blockchain insights, AI trends, and Web3 infrastructure updates delivered to your inbox every morning.



