LIVE
Nirium← Marketing

Execution Architecture

5 specialized nodes. Each with a defined role, authorized actions, and cryptographic audit trail.

ConnectionStellar Testnet
Latency~13ms
ProtocolSoroban v21
NetworkHorizon API

Rebalance Node

ACTIVE

Autonomous rebalancing between USDC and CETES (Etherfuse) based on operator thresholds. Operates 24/7 with zero human intervention.

Cycle / Trigger

Continuous / 24h activeSpread exceeds operator-configured threshold

Authorized Action

Swap USDC↔CETES via Etherfuse, up to daily limit

Audit Trail

HMAC-SHA256 + IPFS anchor per execution

Last execution: success · Monitoring: continuous

Compliance Sentinel

ACTIVE

Real-time validation of vault movements against compliance policies. Rejects unauthorized multisig attempts.

Cycle / Trigger

ContinuousAny vault event

Authorized Action

Transaction validation, event filtering, policy enforcement

Audit Trail

Audit logs anchored on IPFS

Uptime: 100% · Policies enforced: active

Settlement Hub

ACTIVE

Orchestrates x402 micro-billing and MPP session-scoped institutional flows. Direct integration with Horizon Horizon API.

Cycle / Trigger

On-demandAuthenticated API calls

Authorized Action

Payment verification, on-chain settlement

Audit Trail

Transaction hash anchored per payment

Active protocols: x402 · MPP

Audit Node

ACTIVE

Generates CNBV-ready reports and ensures every vault operation is signed with HMAC-SHA256 and anchored to IPFS.

Cycle / Trigger

ContinuousEvery signed execution

Authorized Action

IPFS pinning, report generation, signature verification

Audit Trail

Self-auditing — every report is verifiable on IPFS

Audit trail status: 100% anchored

Vault Operations Node

2-OF-3 MULTISIG

Critical treasury operations requiring human 2-of-3 multisig authorization. This node never executes autonomously.

Cycle / Trigger

Manual onlyMultisig request from Owner/Cosigners

Authorized Action

Withdrawals >$10K · Emergency Pause · Governance Changes

Audit Trail

On-chain multisig event history

Requires human signatures — no autonomous risk

What we removed and why

Previous versions showed 26 experimental agent names (Astra, Titan, Eliza, etc.) running "spread condition" checks. These were testnet research nodes that confused the institutional narrative. The 5 nodes above represent the actual production architecture — each with a defined role, authorized scope, and audit trail.

Access Experimental Labs

JARGUS Internal Security AuditINTERNAL ONLY

This platform has undergone internal security verification using the JARGUS Automated Framework (78/78 vectors passed). JARGUS is a proprietary self-assessment tool — it does not replace professional third-party audits from firms such as OpenZeppelin, Trail of Bits, Halborn, or CertiK. A formal external audit is required before mainnet. Testnet only.

TESTNET ONLY

Live Activity Feed

Telemetry Feed // ConnectionCONNECTING
[--:--:--]
Protocol
system
System connection established. Execution network broadcasting on-chain...
[--:--:--]
Titan
info
Vault architecture synchronized — 3 asset classes active
[--:--:--]
Astra
success
Liquidity route optimized for USDC — Spread minimized