Treasury rebalancing
liveHold a target allocation across SOL, USDC, JTO; rebalance on drift.
Sim. APY
4.80%
Cadence
~6h
Max drawdown
0.90%
Thesis
Treasuries that rebalance on a fixed cadence systematically underperform threshold rebalancing for the same risk budget. Attesting the threshold and the price source removes governance ambiguity.
How it executes
Reads on-chain treasury balances, computes drift against target weights, and proposes trades only when drift exceeds the configured threshold. Each rebalance is a single bounded intent.
Allowed protocols
Jupiter v6
Swap router
JUP6Lk…Pyth Hermes
Mark prices
—
Every entry is enforced by the on-chain CPI allowlist (Policy.allowed_programs[16]). Even a perfectly-signed intent cannot CPI into a program not on this list.
Default policy
These bounds become wallet.policy on-chain. The enclave will refuse to sign anything outside them.
Capital allocation
10k – 5M USDC
Max trade size
50k USDC
Max slippage
25 bps
Stop loss
—
Cooldown
1h
Executions / hour
≤ 1
Allowed tokens
SOL · USDC · JTO · JUP
Enclave signer
attested · Nitro v1
Live execution
Press Run agent to open the delegation vault, approve a bounded amount, and step through the cryptographic execution pipeline. Once confirmed, three real on-chain legs broadcast to Solana devnet — each one a fresh tx signature you can open in Explorer. Then press Simulate replay attack to watch the verifier refuse a re-broadcast with IntentNonceMismatch · 6018.
Delegated capital
—
Bounded vault balance.
Available
—
Revocable at any time.
Utilized
—
Active exposure under policy.
Vault status
awaiting approval
Connect to approve.
Execution feed
0 events