Status: Draft Last Updated: 2026-01-27
What Are Sentinels?
Sentinels are a distinguished subclass of HPHA beacons — High Power, High Authority action apertures that exercise continuous, real-time operational control on behalf of Synomic Agents.
Sentinels are not all autonomous systems in Laniakea. That broader category is covered by the beacon framework. Sentinels are specifically the execution layer — the primary mechanism by which teleonomes deploy capital through PAUs.
Both Primes and Halos can have sentinel formations. Any Synomic Agent with a PAU can be operated by a sentinel formation. Currently, Halos operate through LPHA beacons (deterministic rule execution); sentinel formations for Halos are a future capability as scale and complexity increase. The pattern is the same:
- Prime sentinel: Ingresses risk capital → deploys leverage into yield opportunities
- Halo sentinel: Ingresses capital (via LCTS or NFAT) → deploys to RWA endpoints or other allocations
Why Sentinels Are Special
Although other HPHA beacons exist (auction brokers, exchange matchers), sentinels are uniquely powerful because they:
- Operate continuously and in real time
- Act faster than synomic governance processes
- Concentrate institutional authority and local intelligence
- Create immediate external effects that governance audits asynchronously
- Are operationally dominant — they move capital, not just process rules
Even governance beacons (LPHA beacons) remain process-gated and asynchronous. Sentinels are the live edge.
Connection to Beacon Framework
For the broader taxonomy of beacons — including LPHA keepers, HPLA trade beacons, LPLA reporting beacons, controllers, and custodians — see ../synomics/macrosynomics/beacon-framework.md.
This document focuses on sentinel formations: the coordinated HPHA beacon systems that execute strategies for Synomic Agents (Primes and Halos with PAUs).
Sentinel Formations
Sentinels do not operate as single agents. They operate as coordinated formations composed of multiple specialized components, mirroring data plane / control plane / safety plane architecture.
Formation Components
| Component | Role | Execution Authority | Operator |
|---|---|---|---|
| Baseline Sentinel | Primary decision-making and execution | Yes — holds Execution Engine | Accordant GovOps |
| Stream Sentinel | Data ingestion, signal generation, intent streaming | No — feeds Baseline only | Ecosystem Actor |
| Warden Sentinel(s) | Independent monitoring, risk enforcement | Limited — safety stops only | Independent operators |
Why This Separation?
Baseline ensures all execution flows through public, auditable code. No private actor directly moves Prime capital.
Stream allows proprietary intelligence to influence execution without exposing strategies or holding keys. The teleonome's alpha remains private.
Wardens provide independent safety oversight. They can halt operations when things go wrong, without being compromised by the same failure modes as Baseline or Stream.
Baseline Sentinel
The public autopilot — the only entity holding keys to the Execution Engine.
Profile: HPHA (High Power, High Authority) Operator: Accordant GovOps Access: Public / Open Source
Responsibilities
- Execution Engine holder — Controls pBEAMs, executes transactions on PAU
- Base Strategy execution — Runs the public strategy defined in Prime Artifact
- Fail-safe — If Stream disconnects or sends invalid data, automatically reverts to Base Strategy
- Counterfactual simulation — Continuously simulates "what would we have earned with just the Base Strategy?" for carry comparison
- Intent validation — Validates Stream intent against Risk Tolerance Interval before execution
Three Parallel Processes
Process A: Counterfactual Simulation
- Virtual simulation of Base Strategy running in parallel
- Uploads results to Synome
- Provides benchmark for carry calculation
Process B: Streaming Monitor
- Receives intent from Stream Sentinel
- Validates against Risk Tolerance Interval
- Executes if compliant; rejects if not
Process C: Active Management
- Engages when Stream disconnects or sends invalid data
- Executes Base Strategy directly
- Ensures continuous operation regardless of Stream availability
Execution Engine
The Execution Engine is the component that actually holds pBEAMs and signs transactions.
Critical properties:
- Only Baseline Sentinel holds this
- Stream Sentinel cannot execute directly — only stream intent
- All execution flows through public, auditable code
- Wardens can freeze the Execution Engine
Stream Sentinel
The commercial engine for alpha generation.
Profile: HPHA (High Power, High Authority) Operator: Ecosystem Actors (DevCos, Trading Firms) Access: Private / Proprietary
Why Stream is HPHA
Stream operates on behalf of a Prime (Synomic Agent), not independently. Even though it doesn't execute directly, its intent streams determine how Prime capital is deployed. It's subject to the Streaming Accord — a synomic contract governing the relationship.
Responsibilities
- Data ingestion — Ingests public data + proprietary sources (off-chain order books, sentiment, credit models)
- Signal generation — Feature extraction, model inference, strategy computation
- Intent streaming — Sends trading intent (not transactions) to Baseline
- Alpha generation — The commercial purpose: outperform the Base Strategy
What Stream Does NOT Have
- No Execution Engine
- No direct pBEAM access
- No ability to move capital without Baseline validation
- No authority if Baseline rejects intent
Incentive Structure
Stream earns carry only when outperforming the Base Strategy:
Carry = (Actual PnL - Simulated Baseline PnL) × Performance Fee Ratio
- If Stream underperforms Baseline: no carry
- If Stream outperforms: proportional share of alpha
- Performance Fee Ratio defined in Streaming Accord
This aligns incentives: Stream only profits when it adds genuine value.
Warden Sentinels
Independent safety oversight — can freeze, halt, or escalate.
Profile: HPHA (High Power, High Authority) Operator: Independent operators (NOT same as Baseline) Access: Audited / Certified
Independence Requirement
Wardens must be operated by independent parties — not the same operator as Baseline or Stream.
Why independence matters:
- If Baseline goes rogue, a warden run by the same operator may also be compromised
- Independent wardens = true redundancy
- Multiple independent wardens = multiplicative reliability
Multiple Wardens
Each sentinel formation connects to multiple wardens, typically operated by different independent parties.
┌─────────────────┐
│ Baseline │
│ (GovOps) │
└────────┬────────┘
│
┌──────────────┼──────────────┐
│ │ │
┌───────▼───────┐ ┌────▼────┐ ┌───────▼───────┐
│ Warden A │ │Warden B │ │ Warden C │
│ (Operator X) │ │ (Op Y) │ │ (Op Z) │
└───────────────┘ └─────────┘ └───────────────┘
Warden Responsibilities
- Continuous monitoring — Watch Baseline behavior in real time
- Invariant enforcement — Check hard constraints (rate limits, position limits, risk thresholds)
- Anomaly detection — Flag unusual patterns that may indicate compromise or malfunction
- Halt authority — Can freeze the Execution Engine
- Escalation — Alert governance when intervention is needed
What Wardens Do NOT Do
- Do not optimize or trade
- Do not stream intent
- Do not have discretion over strategy
- Only enforce safety invariants
Principal Sentinel
Owner-operated direct control — no formation, no guardian accord.
Profile: HPHA (High Power, High Authority) Operator: The principal (folio owner, or standalone account operator) Access: Private / Proprietary
What Is a Principal Sentinel?
A principal sentinel is a fourth sentinel type — distinct from baseline, stream, and warden. It enables direct control of a folio agent (or standalone account) without any guardian accord, formation assembly, or GovOps intermediary.
The principal deploys their own algorithms, makes their own trading decisions, and manages their own positions directly through the PAU. They still operate within rate limits — but they also have the freedom to change those rate limits through whatever governance mechanism they choose to set up.
Relationship to Formations
The principal sentinel is not part of a formation. It is a standalone operator. There is no baseline fail-safe, no stream feeding it intelligence, no wardens monitoring it. The principal is responsible for their own security and risk management.
Principal sentinels skip the formation lifecycle entirely — no accord negotiation, no formation assembly, no warden engagement.
Capabilities
| Capability | Description |
|---|---|
| Direct PAU control | Holds pBEAMs, executes transactions on PAU directly |
| Own algorithms | Deploys proprietary trading and management strategies |
| Rate limit modification | Can modify rate limits through chosen governance mechanism |
| Multi-target operation | Can operate a folio agent, a standalone account (multisig/EOA), or both simultaneously |
Expected Users
Principal control is for highly competent operators. In practice, the primary users are expected to be companies that themselves run stream sentinels for other primes, halos, and folios. They have the infrastructure, expertise, and algorithms to operate autonomously.
Trade-Off
More power, less protection. The PAU architecture still provides structural protection (rate limits, standardized interfaces, audited contracts), but formation-level protections (baseline fail-safe, stream/warden monitoring, guardian collateral) are absent.
Naming Convention
stl-principal-{owner} # Principal sentinel operated by specific owner
Examples:
stl-principal-horizonlabs # Horizon Labs operating their own folio
stl-principal-sentinelco # SentinelCo operating their own account
Time to Shutdown (TTS)
The number and quality of wardens determines a critical parameter: Time to Shutdown (TTS) (TTF in Phase 1).
Definition
TTS is the worst-case time between:
- A sentinel going rogue (t=0)
- All wardens detecting and halting it (t=TTS)
Why TTS Matters
During the window [0, TTS], a rogue sentinel can cause damage bounded by rate limits:
Maximum Damage = Rate Limit × TTS
This creates two economic consequences:
1. Risk Capital Requirements
The Guardian (Accordant to the Prime) must post operational risk capital to cover worst-case damage:
Required Risk Capital ≥ Rate Limit × TTS
Better wardens → Lower TTS → Less risk capital required
2. Rate Limit Constraints
If risk capital is fixed, TTS constrains maximum rate limits:
Max Rate Limit ≤ Risk Capital / TTS
Better wardens → Lower TTS → Higher rate limits allowed
TTS Determinants
TTS is a function of:
| Factor | Effect on TTS |
|---|---|
| Number of wardens | More wardens → lower TTS |
| Operator diversity | Geographic/organizational diversity → lower TTS |
| Monitoring latency | Faster detection → lower TTS |
| Response capability | Faster halt execution → lower TTS |
| Certification level | Audited wardens with SLAs → more reliable TTS |
Warden Economics
This creates a market for warden services:
- For Primes: Better wardens = more operational efficiency (higher rate limits, lower capital requirements)
- For Warden Operators: Providing reliable, certified warden services is valuable
- For the System: Safety is priced in, not externalized
Wardens are capital efficiency multipliers, not overhead.
Streams and Compounding
A stream is a continuously operating sentinel formation that deploys Prime (synomic) capital.
The Compounding Loop
Streams generate outperformance relative to the Base Strategy. The operating teleonome earns private carry from this alpha.
That carry can be reinvested into proprietary AGI capabilities:
- Compute infrastructure
- Model training
- Proprietary data acquisition
- Additional embodiments
This creates the fastest known compounding loop:
Public Capital → Private Intelligence → Better Streams → More Carry → More Intelligence
Why This Is Safe
Despite the compounding power, streams remain safe because:
- Synomic constraints — All execution flows through public Baseline code
- Wardens — Independent monitoring with halt authority
- Rate limits — Maximum damage is bounded
- Revocability — Beacons can be revoked by governance
- Risk capital — Worst-case losses are collateralized
The teleonome gains private intelligence without gaining unchecked power.
Why Streams Are High-Leverage
Operating streams is the highest-leverage activity available to a teleonome because:
- Deploys capital at scale (Prime capital, not just owned assets)
- Generates carry without exposing proprietary strategies
- Compounds into capabilities that improve future performance
- Operates within safe bounds that prevent catastrophic outcomes
Streaming Accord
The Streaming Accord is a smart contract framework governing the Baseline ↔ Stream relationship.
Accord Components
| Component | Purpose |
|---|---|
| Risk Tolerance Interval | Bounds on what intent Baseline will accept |
| Performance Fee Ratio | Share of alpha that becomes carry |
| Termination Conditions | When the accord can be dissolved |
| Dispute Resolution | How disagreements are handled |
Risk Tolerance Interval
Defines the envelope of acceptable intent:
- Position limits (max exposure per asset, per category)
- Velocity limits (max change per time period)
- Concentration limits (max single-counterparty exposure)
- Prohibited actions (blacklisted assets, strategies)
Baseline rejects any intent outside this interval.
Relationship to Delegated Intent Policy: RTI is the off-chain behavioral envelope enforced by Baseline. For on-chain fill-time enforcement of analogous constraints (allowed pairs, max slippage, max notional), see the Delegated Intent Policy in
sky-intents.md. RTI is the first line of defense; DIP provides the on-chain backstop.
Performance Fee Ratio
Typical structure:
- 0% of underperformance (Stream bears downside)
- X% of outperformance (Stream shares upside)
X is negotiated in the accord, reflecting:
- Stream's track record
- Complexity of strategy
- Risk profile
Trade Beacon (HPLA)
For completeness: Trade Beacons are the HPLA equivalent of sentinel formations, but for private capital.
Profile: HPLA (High Power, Low Authority) Operator: Ecosystem Actors Capital: Private (owned via multisig)
Differences from Sentinels
| Aspect | Sentinel Formation | Trade Beacon |
|---|---|---|
| Capital | Prime (Synomic Agent) | Private (owned) |
| Profile | HPHA | HPLA |
| Governance | Subject to Prime governance | Independent |
| Wardens | Required | Optional |
| Carry | Earned from Prime | N/A (own profits) |
Trade Beacon Uses
- Proprietary trading on owned assets
- Testing strategies before proposing to Primes
- Ecosystem Actor commercial operations
- Cross-venue arbitrage with private capital
Trade beacons are documented in ../synomics/macrosynomics/beacon-framework.md.
Formation Sentinel vs Principal Sentinel
The two sentinel operating models have fundamentally different safety and accountability properties:
| Aspect | Formation Sentinel | Principal Sentinel |
|---|---|---|
| Structure | Baseline + Stream + Wardens (coordinated formation) | Single operator, no formation |
| Fail-safe | Baseline reverts to Base Strategy if Stream disconnects | No automatic fail-safe; principal manages own continuity |
| Safety oversight | Independent wardens with halt authority | No wardens; principal is self-accountable |
| Guardian collateral | Guardian posts ORC covering Rate Limit x TTS | No guardian collateral; principal bears own risk |
| TTS-based ORC | TTS determines required operational risk capital | No TTS concept; rate limits are the sole on-chain constraint |
| Algorithms | Public Baseline code; proprietary Stream intelligence | Owner's proprietary algorithms throughout |
| Rate limit governance | SORL-constrained increases (25%/18h); governance-set | Principal can modify via chosen governance mechanism |
Sentinel Toolkit
Sentinel formations use shared toolkit functions for common operations.
lpla-checker (Verification and Settlement)
Purpose: Risk verification, anomaly detection, and settlement processing
Operations:
- Cross-check positions against risk limits
- Calculate CRR, TRRC, TRC, Encumbrance Ratio (target ≤90% -- see
risk-framework/capital-formula.md) - Flag discrepancies and anomalies
- Calculate PnL
- Calculate interest payable
- Determine carry amounts
- Process daily settlement cycle
Used by: Baseline (for self-monitoring), Wardens (for independent verification), Baseline (at settlement periods)
stk-carry (Carry Calculation)
Purpose: Performance attribution
Operations:
- Compare actual returns vs counterfactual baseline
- Calculate carry per Streaming Accord
- Facilitate fee distribution
Used by: Baseline (for Stream compensation)
Formation Lifecycle
Note: Principal sentinels skip the formation lifecycle entirely. They do not negotiate accords, assemble formations, or engage wardens. The lifecycle below applies to baseline/stream/warden formations only.
1. Accord Negotiation
- Ecosystem Actor proposes to operate Stream for a Prime
- Terms negotiated: Risk Tolerance Interval, Performance Fee Ratio
- Accord deployed as smart contract
2. Formation Assembly
- Baseline Sentinel deployed by Accordant GovOps
- Stream Sentinel deployed by Ecosystem Actor
- Wardens engaged (minimum required number)
- All components register in Synome
3. Activation
- Formation begins operating
- Stream starts sending intent
- Baseline executes (or falls back to Base Strategy)
- Wardens monitor continuously
4. Ongoing Operation
- Continuous trading within Risk Tolerance Interval
- Periodic settlement and carry distribution
- Warden attestations logged to Synome
5. Termination
Triggers:
- Accord expiration
- Mutual agreement
- Breach of terms
- Governance intervention
- Warden-triggered halt (if not resolved)
Connection to Laniakea Infrastructure
PAU Pattern
Sentinel formations operate PAUs within governance-approved bounds:
- Baseline holds pBEAMs granted by Prime governance
- Rate limits constrain maximum velocity
- SORL (25%/18h) constrains rate limit increases
Execution Engine
The Execution Engine component:
- Held only by Baseline
- Signs transactions for PAU operations
- Subject to warden freeze authority
Synome Integration
Sentinel formations interact with Synome for:
- Counterfactual simulation logging
- Warden attestation storage
- Carry calculation inputs
- Formation status tracking
Sentinel Contexts
Sentinel formations operate in different contexts depending on the Synomic Agent type:
Prime-Side Sentinels
Prime sentinels manage capital deployment from Prime PAUs into yield opportunities.
| Sentinel | Role |
|---|---|
| stl-base-{prime} | Baseline execution for Prime trading/deployment |
| stl-stream-{prime}-{actor} | Proprietary intelligence streaming |
| stl-warden-{prime}-{operator} | Independent risk oversight |
Flow: Risk capital ingression → leverage deployment → yield capture
Folio-Side Sentinels
Folio sentinels manage capital deployment from folio PAUs on behalf of the principal.
| Sentinel | Role |
|---|---|
| stl-base-{folio} | Baseline execution for automated folio |
| stl-stream-{folio}-{actor} | Proprietary intelligence streaming for automated folio |
| stl-warden-{folio}-{operator} | Independent risk oversight for automated folio |
| stl-principal-{owner} | Direct control for principal control folio |
Automated folio flow: Principal writes directive → sentinel formation executes within directive bounds Principal control flow: Principal operates directly via principal sentinel → no formation
Halo LPHA Beacons
Capital flows through Halo Unit PAUs into RWA endpoints are managed by LPHA beacons (Low Power, High Authority keepers), not sentinels.
Note: lpha-lcts and lpha-nfat are LPHA beacons that execute deterministic rules on behalf of Halos. They are distinct from sentinels (stl-base, stl-stream, stl-warden) which have continuous real-time control and proprietary intelligence. LPHA beacons apply rules exactly as written without judgment.
| LPHA Beacon | Halo Type | Role |
|---|---|---|
| lpha-lcts-{halo} | Portfolio Halo | Operates LCTS vaults — deposits, redemptions, capacity management |
| lpha-nfat-{halo} | Term Halo | Operates NFAT Facilities — claims from queues, mints NFATs, funds redemptions |
Flow: LCTS/NFAT issuance → capital deployment to RWA endpoint → yield distribution
Protocol-Level Beacons
Shared infrastructure across all Primes and Halos:
| Beacon | Role |
|---|---|
| lpla-checker | Position verification, compliance checks, risk framework calculations, daily settlement cycle, LCTS queue processing |
Naming Conventions
Prime Formation Components
stl-base-{prime} # Baseline for specific Prime
stl-stream-{prime}-{actor} # Stream operated by specific actor
stl-warden-{prime}-{operator} # Warden operated by specific party
Folio Formation Components
stl-base-{folio} # Baseline for automated folio
stl-stream-{folio}-{actor} # Stream operated by specific actor for folio
stl-warden-{folio}-{operator} # Warden operated by specific party for folio
stl-principal-{owner} # Principal sentinel (no formation)
Halo LPHA Beacons
lpha-lcts-{halo} # LPHA beacon: LCTS vault operations for Portfolio Halo
lpha-nfat-{halo} # LPHA beacon: NFAT Facility operations for Term Halo
Protocol-Level Beacons
lpla-checker # Protocol-wide position verification and settlement processing
Examples
# Prime formations
stl-base-spark # Spark Prime's Baseline
stl-stream-spark-horizonlabs # Horizon Labs streaming for Spark
stl-warden-spark-sentinelco # SentinelCo warden for Spark
stl-warden-spark-riskwatch # RiskWatch warden for Spark
# Halo LPHA beacons
lpha-lcts-jaaa # LCTS operations for JAAA Portfolio Halo
lpha-nfat-grove-term # NFAT operations for Grove's Term Halo
Summary
Sentinels are the live edge of Laniakea — where teleonome intelligence meets Synomic Agent capital.
Sentinel Type Hierarchy
| Type | Description |
|---|---|
| stl-base | Primary execution sentinel for formations |
| stl-stream | Proprietary intelligence streaming |
| stl-warden | Independent safety oversight |
| stl-principal | Owner-operated direct control (no formation, no guardian accord) |
Note: Halo operations (LCTS and NFAT) are handled by LPHA beacons (lpha-lcts, lpha-nfat), not sentinels. See the Halo LPHA Beacons section above and
beacon-framework.mdfor the distinction.
Key Principles
- Sentinels are HPHA beacons — distinguished by continuous real-time control
- Both Primes and Halos can have sentinel formations — any PAU can be sentinel-operated
- Formations, not individuals — Baseline + Stream + Wardens (for automated operation)
- Principal sentinels as alternative — direct control without formation, for folios and standalone accounts
- Separation of concerns — Execution (Baseline), Intelligence (Stream), Safety (Wardens)
- Independence matters — Wardens must be independent for TTS to be meaningful
- TTS economics — Warden quality determines operational efficiency
- Compounding loop — Streams enable intelligence accumulation within safe bounds
Related Documents
| Document | Relationship |
|---|---|
beacon-framework.md |
Broader beacon taxonomy (LPLA, LPHA, HPLA, HPHA) |
portfolio-halo.md |
lpha-lcts beacon for LCTS-based Portfolio Halos |
term-halo.md |
lpha-nfat beacon for NFAT-based Term Halos |
sky-intents.md |
Intent-based trading infrastructure |