Infrastructure & Security

Infrastructure, operational safety, and security posture

Principles

  • Non-custodial by default; users retain control via their own wallets

  • Defense-in-depth across data, models, and execution

  • Observability-first: metrics, traces, logs for all critical paths

Controls

  • Secret and key management with strict RBAC

  • Rate limits and backpressure to protect venues and users

  • Health checks, graceful degradation, and safe fallbacks

Operational safety

  • Kill-switches for strategies and models

  • Canary and staged rollouts with automated rollback

  • Incident runbooks and post-mortems for continuous improvement

Privacy

  • Only minimum necessary metadata is processed for routing and risk controls

  • User configuration stays tied to wallet identity; export and delete supported

Last updated