Evidence Pack
Technical diligence package for institutional review. Claims register, trust assumptions, benchmark methodology, security architecture, bridge security model, and risk disclosures. Artifacts are classified by evidence maturity level.
Artifact classification
Every artifact declares its maturity level. Reviewers can assess reliability at a glance.
Five core diligence questions
Trust Assumptions & Thresholds
Institutional reviewers start here. All cryptographic thresholds, minimum honest node assumptions, key rotation authorities, emergency controls, and halt conditions - documented in one place.
Formal register of material claims. Each claim maps to a specific artifact, identifies the responsible owner, and declares whether independent verification exists. Claims without evidence are flagged.
| Claim | Evidence Artifact | Owner | Maturity | Independent |
|---|---|---|---|---|
| Sub-second settlement finality | Performance benchmark report, Rust ledger tests | Engineering | L2 | Pending |
| Non-custodial wallet (user holds keys) | MPC 2-of-3 architecture specification | Security | L1 | Pending |
| 10,000+ TPS throughput | Deterministic benchmark harness | Performance | L2 | Pending |
| $250K protection coverage | Policy configuration, protection tier documentation | Product | L1 | Pending |
| Post-quantum cryptography | Dilithium/Kyber integration, ZK circuit specifications | Cryptography | L1 | Pending |
| 14-of-20 validator consensus | Fleet registry, validator geography documentation | Infrastructure | L4 | On-chain verifiable |
| 48 patent claims filed | Provisional patent application | Legal | L1 | USPTO filing |
| 7 mainnet smart contracts | Etherscan verified contract addresses | Engineering | L4 | Sourcify verified |
| SOC 2 Type II compliance | - | Operations | Pending | Pending |
Executive Documentation
| Document | Maturity | Classification | Link |
|---|---|---|---|
| VC Pitch Deck (17 slides) | L1 | Public | View |
| Business Plan | L1 | Public | View |
| Whitepaper - Protection & Custody | L1 | Public | View |
| Whitepaper - Settlement Infrastructure | L1 | Public | View |
| Whitepaper - Validator Network | L1 | Public | View |
| Whitepaper - Tokenomics & Governance | L1 | Public | View |
| FAQ | L1 | Public | View |
Multiple cryptographic thresholds operate across the system. This section defines each threshold, minimum honest node assumptions, key rotation authorities, and emergency controls.
| Threshold | Configuration | Scope | Authority |
|---|---|---|---|
| L1 Validator Consensus | 14-of-20 (70% BFT) | Settlement finality, block production | Protocol - no single entity override |
| Bridge Validator Threshold | 14-of-20 (70% BFT) | Cross-chain mint/burn authorization | Bridge validator set |
| Wallet MPC Signing | 2-of-3 | Transaction authorization | User + platform + recovery shard |
| Emergency Chain Halt | 14-of-20 validators | Network pause | Validator quorum only |
| Bridge Pause | 1-of-1 deployer OR 14-of-20 validators | Bridge contract pause | Deployer (during bootstrap), then validator quorum |
| Key Rotation | Per-validator | Validator signing keys | Individual validator operator |
Minimum Honest Node Assumptions
- L1 consensus requires at least 14 of 20 honest validators (tolerates up to 6 Byzantine)
- Bridge requires at least 14 of 20 honest bridge validators (tolerates up to 6 Byzantine)
- Wallet MPC requires at least 2 of 3 shards (user always holds 1 shard)
- Chain halts automatically if fewer than 10 validators are healthy
- Adaptive quorum targets 70%, minimum 7 validators for any consensus action
- No single entity controls enough validator keys to reach any threshold unilaterally
Reference Documentation
| Document | Maturity | Link |
|---|---|---|
| Validator Network Whitepaper | L1 | View |
| Canonical Parameters | L1 | View |
| Bridge Architecture | L1 | View |
| MPC Architecture Specification | L1 | View |
System architecture covering 190+ microservices, protocol parameters, service topology, and inter-service communication. Port mappings, canonical parameters, and settlement flow documentation.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| System Architecture Overview | L1 | Public | View |
| Port Mappings (153 services) | L1 | Partner | View |
| Canonical Parameters | L1 | Partner | View |
| Settlement Lifecycle Flow | L1 | Public | View |
| Settlement Process Flow | L1 | Public | View |
| Platform Infrastructure Proof | L1 | Public | View |
Threat model, key management, authorization design, fleet monitoring, and incident response architecture. Covers insider threats, validator compromise, supply chain attacks, bridge exploits, wallet compromise, and API abuse vectors.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| SentinelAI Fleet Inspector | L4 | Public | View |
| MPC Architecture Specification | L1 | Public | View |
| Security Controls Proof | L1 | Public | View |
| Threat Model Documentation | L1 | Public | View |
| Post-Quantum Cryptography Specification | L1 | Public | View |
| Third-Party Protocol Security Audit | Pending | - | - |
| Third-Party Penetration Test | Pending | - | - |
| SOC 2 Type II Report | Pending | - | - |
Threat Model Coverage
- Insider threats (operator compromise, key theft)
- Validator compromise (Byzantine behavior, collusion)
- Supply chain attacks (dependency injection, image tampering)
- Bridge exploits (replay, double-spend, reserve drain)
- Wallet compromise (shard theft, session hijack)
- API abuse (rate limiting, authentication bypass)
Throughput and latency claims are backed by deterministic benchmarks with fully disclosed methodology. Test parameters, hardware profiles, network topology, and measurement methodology are published for reproducibility.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| Performance Proof Page | L2 | Public | View |
| Benchmark Methodology | L2 | Public | View |
| Test Harness (7 scenarios) | L2 | Partner | View |
| Rust L1 Benchmarks | L2 | Partner | View |
TPS Benchmark Methodology
- Hardware: Hetzner CPX52/62 (16 vCPU, 32 GB RAM, NVMe SSD)
- Validator count: 20 nodes (10 active + 10 sentry) across 13 jurisdictions
- Network topology: full mesh P2P, Hetzner private network (Nuremberg primary)
- Transaction type: standard settlement intent (structured JSON, ~512 bytes)
- Workload generation: deterministic test harness, 7 pluggable scenarios
- Measurement tool: wall-clock timer, intent submission to finality receipt
- Peak observed: 9,500 TPS per node; ~200K aggregate projected across 20 nodes
- Limitations: single-region latency profile; cross-region adds ~50-150ms RTT
- Failure mode: benchmark aborts on consensus timeout or validator failure
- Block size: 10 MB maximum; block time: 1.5 seconds (frozen parameter)
Finality Benchmark Methodology
- Definition: time from intent submission to cryptographically signed finality receipt
- Consensus model: CometBFT (Tendermint), instant finality after block commit
- Measured latency: sub-second under normal load (1.5s block time)
- Receipt contents: policy hash, beneficiary binding, quorum attestation, timestamps
- Verification: receipts independently verifiable via Ed25519 signature check
- Degraded mode: finality delayed proportional to validator response time
Validator Topology
- 20 validators: 10 active (consensus participants) + 10 sentry (hot standbys)
- Geographic distribution: 13 jurisdictions (US, DE, EU, SG, CH, JP, GB, AE, BR, plus 4 sentry zones)
- Server specs: Hetzner CCX33/CPX52 (8-16 vCPU, 16-32 GB RAM, NVMe)
- Consensus port: 26656 (P2P), 26657 (RPC), 9090 (metrics)
- Quorum: 70% adaptive, minimum 7 validators for any consensus action
- Halt threshold: fewer than 10 healthy validators triggers automatic halt
- Network: full mesh topology (every validator peers with every other)
- No single jurisdiction controls enough keys to reach any threshold unilaterally
Autonomous fleet management via SentinelAI. Health scoring, automated recovery, golden snapshot backups, anti-loop protection, and fleet-wide cycling across 10 mainnet validators.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| SentinelAI Fleet Inspector | L4 | Public | View |
| Fleet Management API | L4 | Public | View |
| AATM Operational Specification | L1 | Public | View |
| Monitoring Stack (Prometheus / Grafana) | L4 | Confidential | - |
Operational Runbooks
- Validator failure: auto-detection via heartbeat, fleet-cycle recovery
- Key rotation: per-validator, no downtime, HMAC-authenticated
- Disaster recovery: golden snapshot restore from Hetzner S3
- Security incident: SentinelAI auto-isolation, manual escalation path
- Fleet health below 30%: auto-triggers fleet-wide cycle (max 3 per 2h)
- Image deployment: DevNet build, digest verify, staged rollout
Non-custodial architecture. MPC 2-of-3 threshold signing, Passkey/WebAuthn device authentication, guardian recovery, and hardware key support. User always holds one shard.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| MPC Architecture Specification | L1 | Public | View |
| Protection & Custody Whitepaper | L1 | Public | View |
| Wallet API Specification | L1 | Public | View |
| Web Wallet (deployed) | L4 | Public | View |
| Third-Party Wallet Security Audit | Pending | - | - |
Key Management Details
- MPC key generation: distributed, no single party sees full key
- Shard distribution: user device, platform HSM, recovery guardian
- Device authentication: WebAuthn/FIDO2 passkeys
- Recovery: guardian-assisted shard reconstruction
- Key storage: AES-256-GCM encrypted at rest
- Signing protocol: threshold ECDSA (2-of-3 required)
Settlement produces a cryptographically signed finality receipt containing policy hash, beneficiary binding, quorum attestation, and timing metadata. DvP workflows and receipt verification tooling.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| Settlement API Specification | L1 | Public | View |
| Finality Receipt Example | L2 | Public | View |
| Settlement Proof Page | L1 | Public | View |
| Receipt Verification Tool | L4 | Public | View |
| Policy Enforcement Proof | L1 | Public | View |
| Settlement Lifecycle Flow | L1 | Public | View |
Cross-chain bridge deployed on Ethereum mainnet with 14-of-20 validator threshold (70% BFT). Custody assumptions, mint/burn logic, replay protection, reserve accounting, and emergency pause triggers.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| JILBridge.sol (Ethereum Mainnet) | L4 | Public | Etherscan |
| Bridge API Specification | L1 | Public | View |
| Bridge Architecture | L1 | Public | View |
| Wrapper Token Specification (7 tokens) | L1 | Public | View |
| Third-Party Bridge Security Audit | Pending | - | - |
| Formal Verification Report | Pending | - | - |
Reserve Invariants
minted_assets <= locked_assetsat all times- Withdrawal requires verified burn transaction
- Deposit requires finalized on-chain event (21 confirmations)
- Replay protection: nonce-based, per-chain transaction ID
- Emergency pause: deployer (bootstrap) or 14-of-20 validator quorum
- Anomaly detection: rate limiting on mint volume, alert thresholds
- 5 registered tokens: ETH (native), USDC, USDT, WBTC, DAI
- Monitoring: on-chain reserve vs. minted supply reconciliation
Bridge Reserve Model
- Custody: assets locked in JILBridge.sol on Ethereum mainnet (verifiable on-chain)
- Mint authority: bridge_authority key executes only after 14-of-20 validator attestation
- Deposit flow: lock on source chain, validator attestation, mint on JIL L1
- Withdrawal flow: burn on JIL L1, validator signature collection, release on destination chain
- Deposit idempotency: unique on (source_chain, tx_hash, log_index) prevents double-mint
- Daily outflow caps: configurable per-asset limits, auto-pause on breach
- Reserve check:
total_minted <= total_deposited - total_withdrawnenforced before every mint AND withdrawal - Auto-pause triggers: reserves mismatch or daily outflow cap breach
Zone-based compliance enforcement, ZK proof circuits, BEC fraud detection, BID identity verification, sanctions screening, transaction monitoring, and jurisdiction-aware policy corridors.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| Compliance Architecture Specification | L1 | Public | View |
| Compliance API Specification | L1 | Public | View |
| BID API Specification | L1 | Public | View |
| ZK Compliance Operational Specification | L1 | Public | View |
| BEC Schema Examples | L2 | Public | View |
| Identity Verification Proof | L1 | Public | View |
JIL ERC-20 (10B supply), multi-vault treasury (5 vaults, 7.5B funded), legacy migration swap contracts, and cliff-vesting sale contracts. All contracts deployed on Ethereum mainnet and verified on Sourcify.
| Contract | Maturity | Verification | Link |
|---|---|---|---|
| JIL ERC-20 Token (10B supply) | L4 | Sourcify verified | Etherscan |
| JILTreasury (5 vaults, 7.5B) | L4 | Sourcify verified | Etherscan |
| Token Sale - Main (800M) | L4 | Sourcify verified | Etherscan |
| Token Sale - Legacy (200M) | L4 | Sourcify verified | Etherscan |
| Token Swap v1 to v3 (100M) | L4 | Sourcify verified | View |
| Token Swap v2 to v3 (100M) | L4 | Sourcify verified | View |
Economic Documentation
| Document | Maturity | Link |
|---|---|---|
| Tokenomics & Governance Whitepaper | L1 | View |
| Supply Thesis | L1 | View |
| Independent Tokenomics Review | Pending | - |
| Game Theory / Attack Vector Analysis | Pending | - |
18 published API specifications, enterprise API gateway, ISO 20022 message support, webhook infrastructure, and sandbox access for evaluation.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| Settlement API Specification | L1 | Public | View |
| Enterprise API Specification | L1 | Public | View |
| ISO 20022 Gateway Specification | L1 | Public | View |
| Webhook API Specification | L1 | Public | View |
| Analytics & Integrations API | L1 | Public | View |
| API Index (all 18 specifications) | L1 | Public | View |
| Sandbox Environment (TestNet) | L4 | Partner | Access |
Entity structure, 48 provisional patent claims across 10 independent inventions, validator governance model, upgrade governance, and emergency controls.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| Provisional Patent Application (48 claims) | L1 | Public | View |
| Patent Claim Index (36 detail pages) | L1 | Public | View |
| Validator Governance Model | L1 | Public | View |
| Terms of Service | L1 | Public | View |
| Privacy Policy | L1 | Public | View |
Governance Coverage
- Ownership structure: JIL Sovereign Technologies, Inc.
- Validator governance: admission, removal, slashing conditions
- Upgrade governance: staged rollout, validator opt-in
- Emergency controls: chain halt (14-of-20), bridge pause (deployer or quorum)
Structured POC framework, sandbox evaluation environment, documented reference use cases, and case study scenarios across institutional settlement operations.
| Document | Maturity | Classification | Link |
|---|---|---|---|
| POC Request Framework | L1 | Public | View |
| Case Studies (12 scenarios) | L1 | Public | View |
| Use Cases (4 verticals) | L1 | Public | View |
| Sandbox Access (TestNet) | L4 | Partner | Access |
| Institutional Readiness Assessment | L1 | Public | View |
| Institutional Pilot Deployment | Pending | - | - |
Independent validation is required to move artifacts from L1/L2 to L3 maturity. This section tracks the external audit and verification roadmap. Completing any single item materially increases institutional trust.
| Validation Item | Category | Status | Expected Providers |
|---|---|---|---|
| Protocol security audit | Security | Pending | Trail of Bits, NCC Group, Halborn |
| Smart contract audit (ERC-20, Treasury, Sale, Bridge) | Security | Pending | OpenZeppelin, Halborn, Kudelski |
| Wallet security audit (MPC architecture) | Security | Pending | NCC Group, Trail of Bits |
| Bridge formal verification | Security | Pending | Certora, Runtime Verification |
| Penetration testing (infrastructure) | Infrastructure | Pending | NCC Group, Bishop Fox |
| SOC 2 Type I readiness assessment | Operations | Pending | Deloitte, Ernst & Young, Coalfire |
| Independent tokenomics review | Economics | Pending | Gauntlet, Delphi Digital |
| Institutional pilot deployment | Customer | Pending | Qualified institutional counterparty |
Audit Deliverables (per engagement)
- Final audit report (public or partner-restricted)
- Findings classification (critical, high, medium, low, informational)
- Remediation plan with timelines
- Remediation verification (re-test after fixes)
Transparent disclosure of evidence gaps, known risks, and items that have not been independently verified. This section exists because institutional counterparties require honest assessment, not selective presentation.
| Gap / Risk | Impact | Current Mitigation | Resolution Path |
|---|---|---|---|
| No third-party security audit | High | Internal threat model, SentinelAI monitoring | Audit engagement Q2 2026 |
| No SOC 2 certification | High | Internal operational controls documented | Readiness assessment initiated |
| Bridge not formally verified | High | 14-of-20 threshold (70% BFT), internal test coverage, emergency pause | Formal verification engagement planned |
| No independent tokenomics review | Medium | All contracts Sourcify verified, code available for review | Independent review engagement planned |
| Protection not underwritten by third party | Medium | Self-funded protection pool | Insurance broker engagement in progress |
| Limited production settlement volume | Medium | Sandbox and testnet available for evaluation | Institutional pilot deployment planned |
| Multi-jurisdiction regulatory uncertainty | Medium | Zone-based compliance architecture, per-jurisdiction policy | Ongoing regulatory monitoring |
| Deployer retains bridge pause authority | Low | Bootstrap period only, planned transition to validator quorum | Governance upgrade to remove deployer authority |
Supporting reference material. Port mappings, canonical parameters, validator geography, operational specifications, and protocol glossary.
| Document | Maturity | Link |
|---|---|---|
| Port Mappings (153 services) | L1 | View |
| Canonical Parameters | L1 | View |
| Validator Geography (10 zones) | L4 | View |
| Glossary | L1 | View |
| BPoH Operational Specification | L1 | View |
| SHSC Operational Specification | L1 | View |
| SDV Operational Specification | L1 | View |
| LaunchPad & Token Factory | L1 | View |
| Video Library (11 explainers) | L1 | View |
Evaluate the infrastructure
2 to 4 week POC engagements with sandbox environment, API documentation, and compliance review packet.