Status: Draft Last Updated: 2026-01-27
Table of Contents
- Executive Summary
- Sentinels and Beacons
- Diamond PAU Deployment
- Synome-MVP
- Checker Beacon
- Relay Beacon
- Core Halos and Legacy Cleanup
- Configurator Unit
- NFAT Smart Contracts
- NFAT Beacon
- Report Beacon
- Collateral Beacon
- Council Beacon
- Structuring Halo Legal
- SOFR Hedging
- Sequencing and Execution
Executive Summary
Phase 1 is pragmatically focused on delivering a minimal viable infrastructure for automated capital deployment. Phase 1 operates on a monthly settlement cycle; daily settlement is the Phase 2 target.
Seven deliverables in sequence order:
- Diamond PAU Deployment — Upgrade to Diamond PAU architecture (EIP-2535)
- Synome-MVP — Operational database for risk parameters and NFAT records
- MVP Beacons — Six low-power beacons for monitoring, reporting, execution, and governance
- Core Halos and Legacy Cleanup — Standardize legacy assets as Core Halos, wind down the rest
- Configurator Unit — Simplest form enabling spell-less operations
- NFAT Smart Contracts — Facility and Redeemer contracts for Structuring Halos
- Structuring Halo Legal — Legal infrastructure enabling autonomous NFAT operations
Sentinels and Beacons
To reduce overload of the term "sentinel," Phase 1 introduces a broader taxonomy: beacons.
Beacon Taxonomy
Beacons are autonomous operational components. They vary along two axes:
| Axis | Low | High |
|---|---|---|
| Power | Programs (deterministic, rule-based) | AI (adaptive, learning) |
| Authority | Controls independent entities (Halos, external systems) | Synome or smart contract capabilities (protocol-level) |
Sentinels are a subset of beacons — specifically, high-power (AI) beacons that will eventually manage Prime and Halo operations autonomously.
Phase 1: Low-Power Beacons
Phase 1 deploys low-power beacons (programs, not AI) to enable Core Halo and NFAT operations at smaller scale:
| Beacon | Type | Purpose |
|---|---|---|
| lpla-checker | Low Power, Low Authority | Monitor positions, calculate CRRs, track settlement |
| lpha-relay | Low Power, High Authority | Execute PAU transactions with rate limits |
| lpha-nfat | Low Power, High Authority | Manage NFAT Facility lifecycle, write NFAT records to Synome |
| lpha-report | Low Power, High Authority | Post 24h Prime performance summaries to Synome |
| lpha-collateral | Low Power, High Authority | Upload Core Halo / legacy RWA data to Synome (speculative) |
| lpha-council | Low Power, High Authority | Core Council toolkit for risk equations and report formats |
These MVP beacons provide the operational foundation. As scale increases, high-power (AI) sentinels will replace or augment them with adaptive decision-making.
Beacon Categories
Read-only (LPLA):
- lpla-checker — observes, calculates, alerts (no write authority)
Reporters (LPHA):
- lpha-report — writes Prime performance summaries to Synome
- lpha-collateral — writes Core Halo / legacy data to Synome (speculative — may not be needed)
- lpha-nfat — writes NFAT records to Synome (also executes)
Executors (LPHA):
- lpha-relay — executes PAU transactions
- lpha-nfat — executes NFAT lifecycle operations
Governance tooling (LPHA):
- lpha-council — Core Council interface for updating Synome
1. Diamond PAU Deployment
Phase 1 deploys the Diamond PAU architecture (EIP-2535 diamond proxy pattern) replacing the legacy PAU pattern. Diamond PAUs provide modular, upgradeable functionality without full contract redeployment.
Diamond PAU Architecture
| Component | Purpose |
|---|---|
| Diamond Proxy | Single entry point; delegates to facets based on function selector |
| Action Facets | Modular contract pieces implementing specific actions |
| DiamondCut Facet | Adds/removes/replaces facets via governance |
| DiamondLoupe Facet | Introspection — lists available facets and functions |
| RateLimits | Linear replenishment with configurable max and slope (unchanged) |
Benefits Over Legacy PAU
| Aspect | Legacy PAU | Diamond PAU |
|---|---|---|
| Adding actions | Requires full controller redeployment | Add new facet only |
| Upgrading logic | Replace entire controller | Replace single facet |
| Contract size | Limited by 24KB contract limit | Unlimited (split across facets) |
| Factory deployment | Manual per-Prime | Standardized factory for all Primes |
Phase 1 Action Facets
Core Facets:
NfatDepositFacet— Deposit into NFAT Facility queuesNfatWithdrawFacet— Withdraw from queues before deal executionCoreHaloFacet— Deploy into Core Halo positions
Migration Facets:
LegacyMigrationFacet— Wind down legacy positions during transition
Migration Path
Each Prime migrates from legacy PAU to Diamond PAU:
- Deploy Diamond PAU with initial facet set
- Migrate positions from legacy ALMProxy to new Diamond
- Grant cBEAMs to GovOps for new Diamond
- Wind down legacy PAU once migration complete
2. Synome-MVP
Synome-MVP is the operational database that stores risk parameters and NFAT state. It accepts signed statements from authorized parties and serves as the source of truth for the MVP beacons.
How It Works
┌─────────────────────────────────────────────────────────────────┐
│ INPUTS │
│ │
│ ┌───────────────────┐ ┌───────────────────┐ │
│ │ Core Council │ │ Operational │ │
│ │ GovOps │ │ GovOps (Halo) │ │
│ │ │ │ │ │
│ │ Signed statements │ │ NFAT deal params │ │
│ │ for risk params │ │ for lpha-nfat │ │
│ └─────────┬─────────┘ └─────────┬─────────┘ │
│ │ │ │
│ └──────────────┬──────────────┘ │
│ ▼ │
│ ┌─────────────────┐ │
│ │ SYNOME-MVP │ │
│ │ │ │
│ │ • Risk params │ │
│ │ • NFAT records │ │
│ │ • Position data │ │
│ └────────┬────────┘ │
│ │ │
└───────────────────────────┼──────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────────────┐
│ OUTPUTS │
│ │
│ ┌───────────────────┐ ┌───────────────────┐ │
│ │ lpla-checker │ │ lpha-nfat │ │
│ │ │ │ │ │
│ │ Reads risk params │ │ Reads NFAT params │ │
│ │ for CRR calcs │ │ for deal execution│ │
│ └───────────────────┘ └───────────────────┘ │
└─────────────────────────────────────────────────────────────────┘
Data Flows
| Source | Data | Consumer |
|---|---|---|
| Core Council GovOps | Signed risk parameter updates | lpla-checker (for CRR calculations) |
| Operational GovOps (Halo) | NFAT deal parameters | lpha-nfat (for deal execution) |
| lpha-nfat | Issued NFAT records | Synome-MVP (permanent record) |
What Synome-MVP Stores
- Risk parameters — CRR weights, thresholds, limits (signed by Core Council GovOps)
- NFAT records — Parameters for each issued NFAT (amount, APY, maturity, counterparty)
- Position data — Current state of Prime/Halo positions
3. Checker Beacon
The Checker Beacon (lpla-checker) is the Phase 1 monitoring system for position verification and settlement tracking.
Purpose: Monitor positions, calculate CRRs, and track settlement status (read-only reporting)
| Responsibility | Description |
|---|---|
| Position Verification | Verify on-chain positions match expected state |
| CRR Calculation | Calculate Capital Ratio Requirements using risk params from Synome-MVP |
| Settlement Tracking | Track daily settlement cycle progress |
| Alert Generation | Flag positions approaching risk thresholds |
Inputs: On-chain position data, price feeds, risk parameters from Synome-MVP
Outputs: CRR calculations, settlement status, verification results, alerts
Note: Checker Beacon is LPLA (Low Power, Low Authority) because it only reads and reports — no execution authority.
4. Relay Beacon
The Relay Beacon (lpha-relay) is the execution system that deploys assets via PAU into NFATs and legacy assets (Core Halos).
Purpose: Execute PAU transactions with rate limits and relay role
| Responsibility | Description |
|---|---|
| Rate-Limited Execution | Submit transactions within governance-approved rate limits |
| Relay Role | Act as authorized executor for PAU operations |
| NFAT Deployment | Deploy capital into NFAT Facilities |
| Legacy Deployment | Deploy capital into Core Halo legacy assets |
| Queue Processing | Process pending operations in priority order |
| Failure Handling | Retry failed transactions, escalate persistent failures |
Inputs: Execution requests from governance/operations, rate limit parameters from Configurator
Outputs: Executed transactions, execution logs
5. Core Halos and Legacy Cleanup
Before deploying Configurator, current Prime exposures must be reduced and simplified. Legacy assets either become Core Halos or are wound down.
Why Cleanup Matters
Each additional exposure creates complexity:
| Impact Area | Complexity Cost |
|---|---|
| Configurator | More allocation targets = more cBEAM surface area to manage |
| MVP Beacons | More exposures = more data to scrape, process, and monitor |
| Risk Framework | More positions = more CRR calculations, more edge cases |
| Operations | More integrations = more failure modes to handle manually |
Core Halos
Core Halos are legacy assets that are retained and standardized as Halo Units under Core Council maintenance:
| Aspect | Description |
|---|---|
| What they are | Existing Prime allocations worth keeping (e.g., Spark, established vault positions) |
| How they work | Wrapped as Halo Units with standardized interfaces |
| Governance | Halo Unit Artifacts describe properties, parameters, and oracle data (no dedicated PAU or smart contracts) |
| Integration | lpha-relay deploys into Core Halos using the same relay infrastructure as NFATs |
Initial scope: Core Halos cover all assets that aren't Structuring Halos — including Morpho vaults, SparkLend, and other DeFi integrations. These assets can later transition into standard Halos controlled by their respective Primes as the infrastructure matures.
Legacy Asset Decision Tree:
┌─────────────────────────────────────────┐
│ LEGACY PRIME EXPOSURE │
└──────────────────┬──────────────────────┘
│
▼
┌─────────────────────┐
│ Worth retaining? │
└──────────┬──────────┘
│
┌─────────┴─────────┐
│ │
▼ ▼
┌───────────┐ ┌───────────┐
│ YES │ │ NO │
└─────┬─────┘ └─────┬─────┘
│ │
▼ ▼
┌───────────┐ ┌───────────┐
│ Wrap as │ │ Wind down │
│ Core Halo │ │ position │
└───────────┘ └───────────┘
Cleanup Targets
- Promote to Core Halo: Valuable legacy assets standardized as Halo Units
- Wind down: Experimental, low-value, or redundant allocations
- Consolidate: Redundant exposures merged into fewer, larger positions
- Document: Each Core Halo's data requirements for MVP beacons
Acceptance Criteria
Primes enter Phase 1 with:
- Core Halos — Legacy assets wrapped as standardized Halo Units
- No orphan exposures — Everything either becomes a Core Halo or is wound down
- Consistent interfaces — All remaining positions accessible via standard PAU actions
6. Configurator Unit
The Configurator enables GovOps teams to manage Prime operations without requiring Sky Spells for routine changes.
How It Works
The Configurator uses a two-tier access model:
┌─────────────────────────────────────────────────────┐
│ aBEAMs (Core Council) │
│ • Add inits (pre-approved configs) via timelock │
│ • Grant cBEAMs to GovOps teams │
│ • Remove permissions instantly (emergency) │
└──────────────────────┬──────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────┐
│ Configurator Unit │
│ (BEAMTimeLock → BEAMState → Configurator) │
└──────────────────────┬──────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────┐
│ cBEAMs (GovOps Teams) │
│ • Set rate limits using approved inits │
│ • Increase rate limits (max 20% per 18h via SORL) │
│ • Decrease rate limits (always instant) │
│ • Set relayer/freezer addresses │
└──────────────────────┬──────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────┐
│ PAU (Controller + ALMProxy + RateLimits) │
└─────────────────────────────────────────────────────┘
Key concepts:
| Term | Meaning |
|---|---|
| aBEAM | Admin BEAM — Core Council role that manages inits and grants cBEAMs (via 14-day timelock) |
| cBEAM | Configurator BEAM — operational role held by GovOps for specific PAUs |
| Init | Pre-approved rate limit or controller action that GovOps can activate |
| Accordant | A GovOps is "accordant" to a PAU when they hold its cBEAM |
| SORL | Second-Order Rate Limit — constrains how fast rate limits can increase (20% per 18h) |
Typical flow:
- Core Council creates inits for a new allocation target (14-day timelock)
- Core Council grants cBEAM to GovOps for that PAU (14-day timelock)
- GovOps activates rate limits using the approved inits
- GovOps increases limits gradually via SORL (20% every 18 hours)
- GovOps can decrease limits instantly at any time
Safety properties:
- Additions require 14-day timelock (time to detect problems)
- Removals are instant (emergency response)
- Rate limit increases are gradual (SORL bounds damage from compromise)
- Decreases are always allowed (can always reduce exposure)
7. NFAT Smart Contracts
Two contracts enable Structuring Halos:
NFAT Facility
The Facility manages the complete NFAT lifecycle:
| Function | Description |
|---|---|
| Queue | Holds Prime capital awaiting deal execution |
| Claim | lpha-nfat claims capital from queue when deal is struck |
| Mint | Issues ERC-721 NFAT representing the claim |
| Deploy | Transfers funds to RWA endpoint via PAU |
NFAT Redeemer
The Redeemer processes NFAT redemptions:
| Function | Description |
|---|---|
| Receive | Accepts returned funds from RWA endpoint |
| Notify | Signals NFAT holder that redemption is available |
| Redeem | NFAT holder presents token, receives funds, NFAT burns |
Integration
- Facility and Redeemer connect via shared PAU
- lpha-nfat holds pBEAM for Facility operations
- All state changes logged to Synome
8. NFAT Beacon
The NFAT Beacon (lpha-nfat) manages the NFAT Facility lifecycle — from queue sweeping to RWA offboarding.
Purpose: Operate NFAT Facilities end-to-end
| Responsibility | Description |
|---|---|
| Queue Sweeping | Sweep assets from NFAT Facility queue when deals are ready |
| NFAT Issuance | Issue ERC-721 NFATs representing claims |
| Redemption Funding | Fund the NFAT redemption system when funds return |
| RWA Offboarding | Offboard funds to RWA endpoints |
| Record Keeping | Write issued NFAT parameters to Synome-MVP |
Inputs: Deal parameters from Synome-MVP (set by Operational GovOps), Facility queue state, RWA endpoint status
Outputs: Minted NFATs, deployment transactions, redemption funding, NFAT records to Synome-MVP
9. Report Beacon
The Report Beacon (lpha-report) posts Prime performance summaries to the Synome on a 24-hour cycle.
Purpose: Summarize how each Prime fulfilled its CRRs and encumbrance ratio since the last Synome update
| Responsibility | Description |
|---|---|
| CRR Fulfillment | Report whether Prime met its Capital Ratio Requirements |
| Encumbrance Ratio | Report Prime's encumbrance status |
| 24h Cycle | Post summary aligned with Synome update cadence |
| Historical Record | Maintain performance history in Synome |
Inputs: Prime position data, CRR calculations from lpla-checker, encumbrance data
Outputs: 24h performance summaries written to Synome-MVP
10. Collateral Beacon (Speculative)
The Collateral Beacon (lpha-collateral) uploads data for Core Halos and legacy RWA positions.
Note: This beacon is speculative and may not be needed depending on how Core Halo data flows are structured.
Purpose: Report Core Halo and legacy RWA data to Synome
| Responsibility | Description |
|---|---|
| Core Halo Data | Upload position data for legacy assets wrapped as Core Halos |
| Legacy RWA | Report relevant data for legacy real-world asset positions |
| Format Compliance | Follow report formats specified by lpha-council |
Inputs: Core Halo position state, legacy RWA data sources
Outputs: Collateral data written to Synome-MVP
11. Council Beacon
The Council Beacon (lpha-council) is the Core Council toolkit for managing Synome configuration.
Purpose: Enable Core Council to update risk equations and specify report formats
| Responsibility | Description |
|---|---|
| Risk Equations | Update equations in the Synome risk framework |
| Report Formats | Specify data formats for lpha-collateral and lpha-nfat reports |
| Configuration Management | Maintain Synome operational parameters |
Inputs: Core Council signed updates
Outputs: Updated risk equations and report format specifications in Synome-MVP
Note: lpha-council is governance tooling, not an autonomous beacon. It provides the interface through which Core Council configures the operational Synome.
12. Structuring Halo Legal
The legal infrastructure for Structuring Halos must be established before NFAT Facilities can operate. This framework enables lpha-nfat to execute deals autonomously within governance-approved bounds.
Design Principles (Inspired by Passthrough Halos)
| Principle | Application to Structuring Halos |
|---|---|
| Default Ownership to Sky | Fortification Conserver can assume control of NFAT Facility assets if legal intervention is needed |
| Standardized Structures | Buybox templates enable rapid deal execution without per-deal legal negotiation |
| Pre-signed Integration | Primes and counterparties pre-sign agreements covering the full buybox parameter range |
The Buybox Model
Each NFAT Facility defines a buybox — the acceptable parameter ranges for deals:
| Parameter | Example Range |
|---|---|
| Duration | 6-24 months |
| Size | 5M-100M per NFAT |
| APY | 8-15% |
| Counterparties | Approved Primes only |
| Asset Types | Senior secured loans, investment-grade bonds |
Deals within the buybox can be executed by lpha-nfat without additional governance approval. Deals outside the buybox require governance intervention.
Legal Isolation
Each NFAT represents a claim on a distinct Halo Unit — legally and operationally isolated:
- If one NFAT's underlying deal fails, other NFATs in the facility are protected
- Each Halo Unit functions as a serialized LLC equivalent
- Recourse is limited to the specific Unit's assets
Governance Artifacts
| Artifact | Contents |
|---|---|
| Halo Artifact | Overall governance, buybox definitions, recourse mechanisms, migration procedures |
| Unit Artifact | Per-NFAT operational parameters, legal recourse documentation, deal terms |
Deliverables
- Buybox Template — Reusable legal framework defining acceptable deal parameters
- Pre-signed Agreements — Standard agreements Primes sign to participate in NFAT Facilities
- Recourse Mechanisms — Procedures for Fortification Conserver intervention
- Artifact Templates — Governance documentation for Halo and Unit Artifacts
13. SOFR Hedging
Primes deploying into NFATs with duration must manage interest rate risk. When using the ALDM (Asset-Liability Duration Matching) system for duration matching, Primes have two options:
| Option | Description |
|---|---|
| Fully Hedged | Maintain a hedged interest rate position that provides variable yield based on SOFR movements |
| SOFR Plus Terms | Structure NFAT positions with SOFR plus spread pricing (floating rate) |
Why This Matters
Fixed-rate NFATs with duration create interest rate exposure. If SOFR rises, the Prime holds a below-market position. The duration matching system assumes either:
- The Prime has hedged this risk externally (swaps, futures), receiving variable SOFR exposure that offsets fixed NFAT duration, OR
- The NFAT itself is priced as SOFR + spread, so yield floats with the benchmark
Validation
lpla-checker validates that Primes deploying into duration NFATs have declared either:
- Hedge positions covering the interest rate exposure
- SOFR plus terms on the underlying NFAT
Primes without valid hedging or floating-rate terms cannot deploy into duration NFATs via the ALDM system.
Sequencing and Execution
Stage 0: Planning
Objective: Establish target timeline for full Phase 1 delivery
- Align all stakeholders on scope and dependencies
- Identify first cohort of Primes participating in initial NFAT deployments
- Confirm Structuring Halo partners and onboarding order
Stage 1: Diamond PAU Deployment
Objective: Deploy Diamond PAU architecture for first-cohort Primes
| Task | Description |
|---|---|
| Deploy Diamond PAU factory | Standardized factory for Diamond PAU deployment |
| Deploy first-cohort Diamond PAUs | Diamond PAUs for Primes joining initial NFAT rollout |
| Migrate from legacy PAUs | Migrate positions and wind down legacy controllers |
Stage 2: Operational Infrastructure
Objective: Deploy infrastructure enabling Prime deployment into Core Halos
| Task | Description |
|---|---|
| Deploy Synome-MVP | Operational database for risk parameters and position data |
| Deploy Checker Beacon | lpla-checker for CRR calculations and settlement tracking |
| Deploy Relay Beacon | lpha-relay for rate-limited PAU operations |
These components enable Primes to deploy into Core Halos with proper monitoring and execution infrastructure, even before Configurator removes the spell requirement.
Stage 3: Legacy Cleanup and Core Halos
Objective: Complete legacy cleanup and standardize retained assets
| Task | Description |
|---|---|
| Wind down remaining legacy | Close out exposures not becoming Core Halos |
| Standardize Core Halos | Wrap retained legacy assets as Halo Units |
| Document artifacts | Ensure all Core Halos have complete Halo Unit Artifacts (properties, parameters, oracle data) |
Stage 4: Configurator Deployment
Objective: Enable spell-less Prime operations
| Task | Description |
|---|---|
| Deploy Configurator Unit | BEAMTimeLock → BEAMState → Configurator stack |
| Register Core Halos | Add Core Halo allocation targets to Configurator |
| Grant cBEAMs | Provision GovOps teams for their respective PAUs |
| Prime deployment into Core Halos | All Primes can now deploy into Core Halos without spells |
Stage 5: Halo1 (First Structuring Halo)
Objective: Deploy and validate first Structuring Halo
| Task | Description |
|---|---|
| Deploy NFAT Smart Contracts | Facility and Redeemer contracts |
| Deploy NFAT Beacon | lpha-nfat for NFAT lifecycle management |
| Deploy Halo1 | First Structuring Halo with legal buybox |
| Onboard to Configurator | Create Halo1 inits, grant cBEAMs |
| Prime deployment | All Primes can deploy into Halo1 via spell-less Configurator flow |
| Validate end-to-end | Confirm NFAT issuance, deployment, and redemption flow |
Stage 6: First Structuring Halo Cohort
Objective: Complete initial Structuring Halo rollout
Deploy remaining first-cohort Structuring Halos:
| Halo | Description |
|---|---|
| Halo2 | Structuring Halo partner |
| Halo3 | Structuring Halo partner |
| Halo4 | Structuring Halo partner |
| Halo5 | Structuring Halo partner |
| Halo6 | Structuring Halo partner |
Each Structuring Halo follows the same pattern:
- Deploy legal buybox
- Onboard to Configurator (inits + cBEAMs)
- Primes deploy immediately — no spell required
Execution Timeline:
STAGE 0 STAGE 1 STAGE 2 STAGE 3 STAGE 4 STAGE 5 STAGE 6
Planning → Diamond → Operational → Legacy → Configurator → Halo1 → Full Cohort
PAU Deploy Infra Cleanup Deployment (First Halo) Deployment
+ Core Halos
│ │ │ │ │ │ │
▼ ▼ ▼ ▼ ▼ ▼ ▼
┌────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐
│Timeline│ │Diamond │ │Synome-MVP│ │Core Halos│ │Spell-less│ │NFAT │ │Halo2 │
│agreed │ │PAUs │ │Checker │ │ready │ │operations│ │contracts │ │Halo3 │
│ │ │deployed │ │Relay │ │ │ │enabled │ │Halo1 live│ │Halo4 │
│ │ │ │ │beacons │ │ │ │ │ │ │ │Halo5 │
│ │ │ │ │ │ │ │ │ │ │ │ │Halo6 │
└────────┘ └──────────┘ └──────────┘ └──────────┘ └──────────┘ └──────────┘ └──────────┘
End State
At completion of Stage 6:
- All first-cohort Primes operate without spells via Configurator
- Core Halos provide standardized access to legacy assets
- Six Structuring Halos (Halo1-Halo6) accepting NFAT deployments
- Full MVP beacons (lpla-checker, lpha-relay, lpha-nfat) operational
- Synome-MVP tracking all risk parameters and NFAT records