Intent Creation
The agent declares what it wants to do (swap, lend, withdraw). This is a structured intent object, not a raw transaction.
A step-by-step breakdown of the execution lifecycle, policy engine internals, enforcement model, and threat mitigations that make ATF a deterministic trust boundary for autonomous agents.
Every agent transaction follows six deterministic steps from intent to verifiable receipt. No step can be skipped or reordered.
The agent declares what it wants to do (swap, lend, withdraw). This is a structured intent object, not a raw transaction.
The Policy Engine evaluates the intent against all active rules: allowlists, rate limits, spend caps, and time-of-day constraints.
If the policy evaluation passes, a scoped, TTL-bound permit is issued with a single-use nonce and minimum required capabilities.
The transaction is built within the boundaries of the permit. Parameters that violate permit constraints are rejected before signing.
Pre-flight simulation verifies slippage bounds, protocol allowlists, and output constraints. The transaction is fail-closed if any check fails.
A cryptographic receipt captures the policy evaluation, permit details, execution outcome, and settlement data for tamper-evident audit.
The policy engine is the first enforcement boundary. It evaluates every intent against a deterministic rule set with zero probabilistic logic.
Every policy rule produces the same output for the same input. No probabilistic logic, no model inference in the critical path.
Permits grant the minimum set of capabilities required for a single operation. Scope cannot be widened after issuance.
Every permit carries a time-to-live and a single-use nonce. Expired or replayed permits are rejected automatically.
Permits are scoped to a specific domain (TruCore ATF + environment). Cross-domain reuse is structurally invalid.
Nonce tracking combined with domain separation ensures no permit can be submitted more than once, across any context.
ATF enforces a strict security posture. Every default is deny. Every exception is explicit. Every override is impossible at the agent layer.
If a policy rule cannot be evaluated, or if any check is ambiguous, the transaction is blocked. Silence is a denial.
Only pre-approved program IDs, token mints, and protocol endpoints are reachable. Everything else is rejected by default.
Hard invariants (spend caps, TTLs, protocol allowlists) cannot be overridden. Soft guidance (warnings, telemetry) is informational only.
Agents cannot issue, extend, or modify their own permits. Approval authority is external to the agent runtime.
Each threat vector maps to a specific enforcement layer within the ATF pipeline.
| Threat | Mitigation Layer |
|---|---|
| Unbounded execution | Permit TTL + scoped capabilities |
| Slippage exploitation | Execution validator with hard slippage bounds |
| Protocol drift | Allowlist registry restricting reachable programs |
| Replay attack | Nonce + domain separation on every permit |
| Audit opacity | Tamper-evident cryptographic receipts |
For teams already building
Working with a limited cohort of early teams integrating ATF into production trading bots on Solana. This is not a waitlist - it is hands-on integration support.
Includes: