Execution Architecture
5 specialized nodes. Each with a defined role, authorized actions, and cryptographic audit trail.
Rebalance Node
ACTIVEAutonomous rebalancing between USDC and CETES (Etherfuse) based on operator thresholds. Operates 24/7 with zero human intervention.
Cycle / Trigger
Continuous / 24h active — Spread exceeds operator-configured threshold
Authorized Action
Swap USDC↔CETES via Etherfuse, up to daily limit
Audit Trail
HMAC-SHA256 + IPFS anchor per execution
Compliance Sentinel
ACTIVEReal-time validation of vault movements against compliance policies. Rejects unauthorized multisig attempts.
Cycle / Trigger
Continuous — Any vault event
Authorized Action
Transaction validation, event filtering, policy enforcement
Audit Trail
Audit logs anchored on IPFS
Settlement Hub
ACTIVEOrchestrates x402 micro-billing and MPP session-scoped institutional flows. Direct integration with Horizon Horizon API.
Cycle / Trigger
On-demand — Authenticated API calls
Authorized Action
Payment verification, on-chain settlement
Audit Trail
Transaction hash anchored per payment
Audit Node
ACTIVEGenerates CNBV-ready reports and ensures every vault operation is signed with HMAC-SHA256 and anchored to IPFS.
Cycle / Trigger
Continuous — Every signed execution
Authorized Action
IPFS pinning, report generation, signature verification
Audit Trail
Self-auditing — every report is verifiable on IPFS
Vault Operations Node
2-OF-3 MULTISIGCritical treasury operations requiring human 2-of-3 multisig authorization. This node never executes autonomously.
Cycle / Trigger
Manual only — Multisig request from Owner/Cosigners
Authorized Action
Withdrawals >$10K · Emergency Pause · Governance Changes
Audit Trail
On-chain multisig event history
What we removed and why
Previous versions showed 26 experimental agent names (Astra, Titan, Eliza, etc.) running "spread condition" checks. These were testnet research nodes that confused the institutional narrative. The 5 nodes above represent the actual production architecture — each with a defined role, authorized scope, and audit trail.
Access Experimental LabsJARGUS Internal Security AuditINTERNAL ONLY
This platform has undergone internal security verification using the JARGUS Automated Framework (78/78 vectors passed). JARGUS is a proprietary self-assessment tool — it does not replace professional third-party audits from firms such as OpenZeppelin, Trail of Bits, Halborn, or CertiK. A formal external audit is required before mainnet. Testnet only.
