Verifiable Execution Layer
Strategies remain private while their execution is verifiable:
Provable Objects: Includes authorization parameters, risk thresholds, and abnormal protection triggers.
Execution Commitment Mechanism: Generates cryptographic commitments to validate input states, execution parameters, and result boundaries.
Non-Exposing Proofs: Supports zero-knowledge proof (ZKP) interfaces to verify that strategies operate within authorized bounds, do not breach risk limits, and trigger protections according to rules.
This ensures strategy security and transparency while preserving the confidentiality of core models.
Last updated
