Infrastructure & Security
Infrastructure, operational safety, and security posture
Principles
Non-custodial by default; users retain control via their own wallets
Defense-in-depth across data, models, and execution
Observability-first: metrics, traces, logs for all critical paths
Controls
Secret and key management with strict RBAC
Rate limits and backpressure to protect venues and users
Health checks, graceful degradation, and safe fallbacks
Operational safety
Kill-switches for strategies and models
Canary and staged rollouts with automated rollback
Incident runbooks and post-mortems for continuous improvement
Privacy
Only minimum necessary metadata is processed for routing and risk controls
User configuration stays tied to wallet identity; export and delete supported
Last updated

