Skip to content

Strategy

Latency-Positive ATF

A firewall that makes your bot faster, not slower. ATF is evolving from security middleware into shared execution intelligence that reduces effective trading latency.

“Doesn’t a firewall make my bot slower?”

That is the natural assumption. Every middleware layer adds processing time, and trading bots compete on execution speed. Any overhead feels like a cost.

The assumption holds if you measure only middleware overhead in isolation. But it breaks down when you measure total workflow latency - the time from intent formation to on-chain submission.

Not if the firewall becomes shared execution intelligence

A standalone bot must independently fetch account state, request DEX quotes, validate routes, simulate transactions, run its own safety checks, sign, and submit. Every bot does this work alone, even when multiple bots need the same data.

ATF serves multiple agents. It maintains shared on-chain state, caches recent quotes, batches overlapping account reads, parallelizes external calls, and pre-computes policy-relevant data. When ATF eliminates more redundant work than its enforcement overhead costs, the protected bot finishes faster.

The correct benchmark is effective time-to-execution versus a bot doing everything itself - not middleware overhead in isolation.

Understanding Latency Types

“Latency” in a trading bot workflow is not one number. It decomposes into distinct components, and ATF affects each differently:

ComponentWhat It Is
ATF decision timeTime for ATF to evaluate policy and return a decision
RPC latencyRound-trip to Solana nodes - shared by all bots
Quote latencyDEX quote fetch time - shared by all bots
End-to-end protectedTotal wall-clock time using ATF, including all of the above
Effective deltaProtected latency minus standalone bot baseline - the metric that matters

Execution Modes - Strict / Balanced / Turbo

ATF defines three execution modes that let operators choose their position on the safety–speed spectrum. All three modes satisfy the same zero-trust security invariants. The difference is how much pre-computed work is reused, not whether safety checks run.

ModeFreshnessDescription
StrictLive onlyAll reads are fresh. No caching. Maximum safety, highest latency.
Balanced≤ 2sDefault. Shared cache with conservative freshness. Fast-path for well-classified intents.
Turbo≤ 5sMaximum speed within safety bounds. Aggressive caching, broad fast-path, pre-authorized shells.

Freshness values are illustrative. These modes represent a directional design - not current production capabilities.

How Latency-Positive Enforcement Works

The flow below shows how shared intelligence reduces total workflow time:

Standalone Bot (no ATF)              Protected Bot (with ATF)
─────────────────────                ─────────────────────────
1. Fetch account state  ─── RPC     1. Submit intent to ATF
2. Fetch DEX quotes     ─── API         ↓
3. Validate route       ─── RPC     2. ATF serves from shared state
4. Simulate transaction ─── RPC        (cached accounts, quotes,
5. Run safety checks    ─── local      route validation, simulation)
6. Sign                 ─── local       ↓
7. Submit               ─── RPC     3. Policy evaluation (fast-path
                                       if intent is well-classified)
Each bot does all 7 steps               ↓
independently every time.           4. Permit issued
                                        ↓
                                    5. Bot signs + submits

                                    Shared state eliminates
                                    redundant RPC/API calls.

How We’ll Measure This

Latency-positive claims require rigorous measurement, not marketing assertions. ATF will instrument and report:

  • cache-hit p95 - fast-path decision latency
  • cache-miss p95 - worst-case decision latency
  • time-to-safe-decision - intent receipt to permit issuance
  • time-to-submission - intent receipt to transaction readiness
  • effective bot-latency delta - protected workflow minus standalone baseline

The standalone bot baseline is measured per-flow: the estimated time for an unprotected bot to independently complete the same work. All benchmark results will clearly distinguish measured data from illustrative estimates.

Why This Matters for Trading Bots and Agent Frameworks

Trading bots evaluate infrastructure by one question: does it make me better at my job? “Safer but slower” is a hard sell. “Safer and faster” changes the adoption calculus entirely.

  • For bot developers: ATF becomes infrastructure you route through for speed, not infrastructure you tolerate for compliance.
  • For agent frameworks: Enforcement stops being a bolt-on cost center and becomes a shared execution layer that improves framework-wide performance.
  • For operators: Configurable execution modes let you tune the safety–speed tradeoff per strategy, not per-org.

The long-term vision: ATF as universal capital enforcement for AI agents - deterministic, verifiable, and latency-positive.

Current State vs. Future Direction

This page describes a strategic direction, not shipped capabilities. Here is where things stand:

CapabilityStatus
Deterministic policy enforcementShipped
Verifiable execution receiptsShipped
Zero-trust agent modelShipped
Latency instrumentationIn progress
Shared cache / state layerPlanned
Execution modes (Strict / Balanced / Turbo)Planned
Fast-path intent classificationPlanned
Pre-authorized transaction shellsPlanned

Security guarantees are non-regressible. No latency optimization will weaken, bypass, or conditionally disable existing deterministic enforcement or verifiable receipts.

Learn More

This page is the developer-friendly explainer. For high-level public positioning, see the ATF spec - Latency-Positive Positioning.