Institutional Readiness Dashboard
Stress-test every claim. Validate every artifact. Score every domain.
🚨 The Principle
If you want credibility at institutional level, you don't defend your system — you stress test it. This engine forces evidence-based validation across every claim OPTKAS makes. No assumptions. No hand-waving. Every claim gets a confidence rating backed by proof requirements.
Domain Confidence Scores
Infrastructure
XRPL
Stellar
Legal
Ops Control
Security
Sales Compliance
Confidence Rating System
Claim is independently verifiable with on-chain evidence, legal filings, or repository artifacts. Proof exists and has been inspected.
Claim is plausible and supporting evidence exists, but full independent verification requires additional documentation or third-party confirmation.
Claim cannot be independently verified with available evidence. May be overstated, ambiguous, or requires documentation not yet provided.
Claim has not yet been evaluated. Click into the domain to begin assessment.
Institutional Readiness Tiers
| Score | Grade | Meaning |
|---|---|---|
| 90–100 | INSTITUTIONAL GRADE | All claims verified. Ready for institutional due diligence. |
| 75–89 | AUDIT READY | Most claims verified. Minor gaps require documentation. |
| 60–74 | PROGRESSING | Significant verification in progress. Key gaps remain. |
| 40–59 | DEVELOPING | Multiple domains require evidence. Not investor-ready. |
| 0–39 | EARLY STAGE | Insufficient verification. Major documentation gaps. |
Credibility Risk Summary
Complete at least one domain assessment to generate the credibility risk summary.
⚙ Infrastructure Verification
28 engines • 9 accounts • 9 pools • 1,213+ tests • Cross-chain settlement
This domain validates the core technical infrastructure claims: automation engines, mainnet accounts, liquidity pools, testing coverage, and cross-chain architecture.
28 Production TypeScript Engines
🔎 Proof Required
- Repository: List all 28 engine files with line counts and module exports
- Tests: Show test coverage per engine (>80% expected)
- Runtime: Demonstrate each engine can instantiate and execute its primary function
- Logs: Show production execution logs for each engine within the last 30 days
✅ Verification Steps
- Inspect repository — count TypeScript files matching engine pattern
- Run test suite — verify >1,213 tests pass
- Check CI/CD — confirm engines build and deploy without errors
- Review dependency graph — verify engines are interconnected properly
⚠ Misconfiguration Risks
Engine count could include stubs, wrappers, or utility files that aren't true "production engines." Validate each engine has meaningful business logic, not just re-exports.
9 Live Mainnet Accounts (6 XRPL + 3 Stellar)
🔎 Proof Required
- On-chain: Provide all 9 account addresses (r... for XRPL, G... for Stellar)
- Verification: Query each account on public explorers (xrpscan.com, stellar.expert)
- Funding: Confirm minimum reserves are maintained (12+ XRP, 1+ XLM)
- Configuration: Verify flags, signers, and trustlines match documented purpose
✅ Verification Steps
- XRPL:
account_infofor each of 6 addresses — verify funded, flags correct - XRPL:
account_lines— verify trustlines to issuer for Treasury/Escrow/AMM/Trading - Stellar:
GET /accounts/{id}on Horizon — verify 3 accounts exist and are funded - Cross-reference: Verify each account has >0 transactions in last 90 days
9 Liquidity Pools (6 XRPL + 3 Stellar)
🔎 Proof Required
- XRPL:
amm_infofor each of 6 token/XRP pairs — verify pool exists and has liquidity - Stellar: Horizon
/liquidity_poolsquery for 3 OPTKAS-USD pools - Depth: Verify each pool has meaningful liquidity (>$1,000 equivalent)
- Activity: Confirm trading activity within last 30 days
Cross-Chain Atomic Settlement Engine
🔎 Proof Required
- Source code: SettlementEngine source with cross-chain coordination logic
- Tests: Integration tests showing success and failure (rollback) scenarios
- On-chain: Paired transactions — matching hashes on XRPL and Stellar
- Atomicity proof: Evidence of a failed cross-chain where both sides reverted
⚠ Misconfiguration Risks
True atomicity across independent chains requires hash-time-locked contracts or a trusted coordinator. Without native cross-chain atomicity, "atomic" may mean "coordinated with rollback" rather than cryptographically atomic. Clarify the mechanism.
SHA-256 Dual-Chain Proof Anchoring
🔎 Proof Required
- XRPL: Show transactions with memo fields containing SHA-256 hashes
- Stellar: Show matching hashes in manage_data key-value pairs
- Pairing: Cross-reference — same hash on both chains with matching timestamps
- Coverage: Define what "material action" includes and show all categories are covered
1,213+ Automated Tests
🔎 Proof Required
- Test runner output: Full test suite run showing exact count and pass/fail
- Coverage report: Line/branch/function coverage percentages
- CI history: Last 10 CI runs showing consistent test execution
- Quality: Review sample of 20+ tests for meaningful assertions (not trivial)
70+ Pre-Flight Transaction Checks
🔎 Proof Required
- Source code: Pre-flight check module with enumerated validations
- List: Complete list of all 70+ checks with descriptions
- Logs: Transaction logs showing pre-flight gate before submission
- Failure examples: Show a transaction blocked by a pre-flight check
10,000 Monte Carlo Risk Simulations
🔎 Proof Required
- Source code: RiskEngine Monte Carlo module with simulation logic
- Output: Sample simulation output showing distribution of outcomes
- Reproducibility: Run simulation with fixed seed — output must match expectations
- Integration: Show risk alerts triggered by simulation results
97.4% On-Chain Success Rate
🔎 Proof Required
- Transaction log: Full transaction history with success/failure counts
- Calculation: Show the denominator — how many total transactions attempted
- Retry logic: Source code showing retry mechanism and backoff strategy
- Failure analysis: Categorize the 2.6% failures — network, insufficient funds, etc.
⚠ Misconfiguration Risks
97.4% could be inflated if retried transactions count as single attempts. Clarify: is this first-attempt success rate or eventual success rate after retries?
⛓ XRPL Capabilities Verification
Trustlines • Freeze • Multisig • Escrow • AMM • DEX • NFT Attestations
Validates that the system correctly utilizes XRPL-native features at the protocol level. Each capability requires specific ledger queries for verification.
Trustline-Based Issuance
🔎 Proof Required
- Ledger query:
account_lineson Issuer — shows all outstanding obligations - Currency codes: Verify OPTKAS, SOVBND, IMPERIA, GEMVLT, TERRAVL, PETRO exist
- Holders:
account_lineson holder accounts confirms trustlines to Issuer
DefaultRipple Configuration
🔎 Proof Required
- Ledger query:
account_infoon Issuer — checklsfDefaultRippleflag (0x00800000) - Verification: Attempt a third-party trade — if DefaultRipple is off, trades between non-issuer accounts fail
⚠ Risk
If DefaultRipple is NOT enabled, token holders cannot trade with each other — only with the Issuer. This is a critical configuration that must be verified.
Individual Freeze & Global Freeze
🔎 Proof Required
- Account flags: Verify
lsfNoFreezeis NOT set (if set, freeze is permanently disabled) - Individual: Show a TrustSet transaction with freeze flag on a specific trustline
- Global: Verify ability to set
lsfGlobalFreezevia AccountSet - Source code: Freeze module with both individual and global freeze functions
Multi-Signature Configuration
🔎 Proof Required
- Ledger query:
account_info— check SignerEntries for signer list - Quorum weights: Verify signer weights and quorum match 2-of-3 configuration
- Signer keys: Confirm all 3 signers are distinct, controlled entities
- Transaction history: Show multisig transactions with 2+ signatures
Escrow Transactions
🔎 Proof Required
- Transaction types: Show EscrowCreate, EscrowFinish, EscrowCancel transactions
- Crypto-conditions: Verify condition/fulfillment pairs for conditional escrow
- Time-based: Show escrow with FinishAfter/CancelAfter parameters
- DvP flow: Demonstrate end-to-end Delivery-versus-Payment using escrow
XLS-30 AMM Pools
🔎 Proof Required
- Ledger query:
amm_infofor each token/XRP pair - Pool depth: Verify non-trivial balance in each pool
- LP tokens: Confirm LP token generation and AMM Provider holdings
- Trading activity: Show AMMDeposit, AMMWithdraw, and swap transactions
Native DEX Smart Routing
🔎 Proof Required
- Path finding:
path_findorripple_path_findshowing multi-hop routes - Auto-bridging: Show Payment with
Pathsfield using XRP as intermediary - AMM+DEX: Show a trade that splits between AMM pool and orderbook
XLS-20 NFT Attestations
🔎 Proof Required
- Ledger query:
account_nftson Attestation account — list all NFTs - Metadata: Verify NFT URI contains meaningful attestation data or hash
- Non-transferable: Check if
lsfBurnable/lsfTransferableflags match attestation purpose - Volume: Count total NFTs — should correlate with material actions performed
🌠 Stellar Capabilities Verification
AUTH_REQUIRED • AUTH_REVOCABLE • CLAWBACK • manage_data • Stellar AMM
Validates Stellar-specific regulated asset features, proof anchoring via manage_data, and AMM pool presence on the Stellar network.
AUTH_REQUIRED Flag
🔎 Proof Required
- Horizon query:
GET /accounts/{issuer}— checkflags.auth_required= true - Test: Attempt to send OPTKAS-USD to an unauthorized account — should fail
- Authorization: Show AllowTrust or SetTrustLineFlags operations in transaction history
AUTH_REVOCABLE Flag
🔎 Proof Required
- Horizon query:
GET /accounts/{issuer}— checkflags.auth_revocable= true - Operation: Show a SetTrustLineFlags operation revoking authorization
- Effect: Confirm holder can no longer transact after revocation
CLAWBACK Enabled
🔎 Proof Required
- Horizon query:
GET /accounts/{issuer}— checkflags.auth_clawback_enabled= true - Caution: Clawback must be set BEFORE any trustlines are created (Stellar rule)
- Operation: Show a Clawback operation in transaction history (or capability to execute)
⚠ Risk
If clawback was NOT enabled before first trustline creation, it CANNOT be enabled retroactively on Stellar. This is a critical one-time configuration.
Trustline Authorization Gating
🔎 Proof Required
- Holder accounts: Show trustlines with
authorizedflag set by Issuer - Process: Document the KYC → authorization workflow end-to-end
- Rejection: Show evidence of an authorization being denied or revoked
manage_data Proof Anchoring
🔎 Proof Required
- Horizon query:
GET /accounts/{issuer}— inspectdatafield for hash entries - Cross-reference: Match Stellar manage_data hashes to XRPL memo hashes
- Coverage: Verify hashes exist for all claimed material action categories
Stellar AMM Pool Presence
🔎 Proof Required
- Horizon query:
GET /liquidity_poolswith OPTKAS-USD asset filter - Pool details: Verify reserves, fee structure, and total shares for each pool
- Trading activity: Show trades or deposits within last 30 days
⚖ Legal Structure Verification
SPV • MTN Program • UCC-1 • Bond Indenture • Transfer Agent • Insurance
Legal claims require documentary proof — filing receipts, notarized documents, and public registry lookups. Many require securities counsel validation.
Wyoming SPV (OPTKAS1-MAIN LLC)
🔎 Proof Required
- Registry lookup: Wyoming Secretary of State — search for OPTKAS1-MAIN LLC
- Filing: Articles of Organization or Certificate of Formation
- Good standing: Current good standing certificate from Wyoming SOS
- Operating Agreement: LLC Operating Agreement (may be confidential but existence confirmable)
$500M Medium-Term Note Program
🔎 Proof Required
- Program document: MTN Program Agreement or Offering Memorandum
- Legal opinion: Opinion letter from securities counsel confirming program validity
- Regulatory filing: Any SEC/state filings (Reg D, Reg S, or applicable exemptions)
- Counsel review: This claim REQUIRES securities counsel validation
⚠ Risk
"$500M MTN Program" is a capacity claim, not a funded amount. Clarify: is this authorized capacity or deployed capital? Investors may misinterpret this as assets under management.
UCC-1 Lien Filed
🔎 Proof Required
- Public search: Wyoming SOS UCC search — locate filing by debtor name (OPTKAS1-MAIN LLC)
- Filing receipt: UCC-1 financing statement with filing number and date
- Collateral description: Verify collateral described matches platform assets
- Priority: Confirm no prior liens exist (first-priority claim)
- Continuation: Verify filing is current (UCC filings expire after 5 years without continuation)
Bond Indenture
🔎 Proof Required
- Document: Executed Bond Indenture with all parties' signatures
- Terms: Coupon rate, maturity, redemption, waterfall, default provisions
- Trustee: If applicable, identify the indenture trustee (if TIA applies)
- Counsel: Legal opinion confirming enforceability — REQUIRES securities counsel
Transfer Agent (Securities Transfer Corporation)
🔎 Proof Required
- Agreement: Transfer Agent Agreement between STC and OPTKAS1-MAIN LLC
- SEC registration: Verify STC is SEC-registered transfer agent (EDGAR lookup)
- Active service: Confirm STC is currently maintaining records (not just contracted)
- Records: Sample bondholder register entry (redacted for privacy)
$25.75M Insurance Coverage
🔎 Proof Required
- Policy: Insurance policy declarations page showing coverage amount and type
- Carrier: Identify the insurance carrier (must be A-rated or better)
- Coverage scope: Verify policy covers digital asset operations specifically
- Active status: Certificate of insurance showing current effective dates
- Exclusions: Review exclusions — many policies exclude crypto-specific risks
⚠ Risk
Insurance policies for digital assets are rare and expensive. Verify the policy specifically covers blockchain-based securities operations, not just general business liability. Many standard E&O policies exclude digital assets.
🔒 Operational Control Verification
Mint • Burn • Freeze • Revoke • Clawback • Kill Switch
Validates that the Issuer has exclusive, functional control over all claimed operational powers. Each requires transaction-level and source code inspection.
Mint Control Exclusivity
🔎 Proof Required
- XRPL native: This is inherent — only the Issuer's negative balance creates IOUs (protocol-level)
- Verification: Confirm no other accounts have been designated as issuers for the same currency codes
- Source code: Verify mint functions only use the Issuer account's credentials
Burn Mechanism
🔎 Proof Required
- XRPL native: This is inherent — IOUs sent to the Issuer reduce the Issuer's obligations
- Verification: Show before/after
account_lineson Issuer — obligations decrease after receiving tokens - Process: Document the burn workflow — who triggers it, under what conditions
Freeze Capability
🔎 Proof Required
- Account flags: Confirm
lsfNoFreezeis NOT set on Issuer account - Source code: Freeze functions with individual and global freeze logic
- SPOF risk: Is the freeze key held by a single person? Should require multisig
Stellar Revocation & Clawback
🔎 Proof Required
- Flags: Confirm
auth_revocableandauth_clawback_enabledon Stellar Issuer - Operations: SetTrustLineFlags (revoke) and Clawback operations in source code
- Test: Demonstrate revocation and clawback on testnet or show mainnet evidence
Global Trading Halt
🔎 Proof Required
- XRPL: Global freeze via AccountSet with
lsfGlobalFreezeflag - Stellar: Revoke all holders' authorization via SetTrustLineFlags batch
- Coordination: Source code showing combined cross-chain halt procedure
- SPOF: Can 1-of-3 signers trigger this? Verify emergency access controls
Circuit Breaker Logic
🔎 Proof Required
- Source code: TradingEngine with circuit breaker and kill switch thresholds
- Configuration: Verify thresholds are configurable and currently set to 5%/10%
- Trigger log: Show a circuit breaker trigger event (production or backtest)
- Recovery: Document the re-enable process after a circuit breaker triggers
🛡 Security & Risk Controls Verification
Multisig • Kill Switch • Circuit Breaker • Default Protocol • Monte Carlo
Security claims require cryptographic validation, simulation reproducibility, and monitoring log inspection. These are the hardest claims to verify — and the most important.
Multi-Sig Governance (2-of-3 / 3-of-3 / 1-of-3)
🔎 Proof Required
- Signer list:
account_infoshowing SignerEntries and quorum weights - Three tiers: Source code implementing separate quorum levels per action type
- Key separation: Confirm 3 signers are distinct individuals/entities (not shared keys)
- Emergency: Verify 1-of-3 can only trigger freeze (not move funds or change config)
⚠ Risk
XRPL natively supports only a single quorum threshold per account. Multiple tiers (2-of-3, 3-of-3, 1-of-3) may require application-layer enforcement, not protocol-level. Clarify which tier is protocol vs. application.
Kill Switch
🔎 Proof Required
- Source code: Kill switch implementation with 10% threshold
- Monitoring: Show real-time PNL tracking that feeds the kill switch
- Action: What exactly happens when triggered — halt engine, freeze accounts, both?
- Recovery: What's the re-enable process? Who approves it?
Automated Default Response Protocol
🔎 Proof Required
- Source code: Full default protocol implementation with sequential trigger logic
- Detection: What conditions trigger default detection? Specific thresholds?
- Liquidation: Who controls liquidation? Automated or manual? Under whose authority?
- Legal basis: Bond Indenture provisions authorizing the default process
- Logging: Every step must be logged and anchored on-chain for audit
Continuous Monte Carlo Stress Testing
🔎 Proof Required
- Reproducibility: Run simulation with seed=42 — output must be deterministic
- Distribution: Show the output probability distribution (histogram or percentile table)
- VaR output: Show Value at Risk at 95th and 99th confidence levels
- Schedule: How often does "continuously" mean? Every minute? Hour? Day?
- Alerting: Show an alert triggered by a Monte Carlo result exceeding threshold
Monitoring & Logging Infrastructure
🔎 Proof Required
- Logging: Show structured log output from multiple engines with timestamps
- Hash chain: Show SHA-256 hash of log entries anchored on-chain
- Dashboards: Screenshot or demo of real-time monitoring dashboards
- Alerting: Show alert configuration and at least one triggered alert
- Retention: What is the log retention policy? How long are logs kept?
Sales & Solicitation Compliance
7 claims · Validates that all sales processes, scripts, training, and compensation structures meet institutional standards.
Sales Scripts Versioned & Approved
🔎 Proof Required
- Version control: Show timestamped script versions in a repository or document management system
- Approval chain: Demonstrate compliance sign-off on each script version
- Distribution log: Show that solicitors received and acknowledged current versions
- Retirement: Confirm old versions are marked deprecated and inaccessible
Approved Claims Library Published
🔎 Proof Required
- Library existence: Show the published Claims Library with all approved statements
- Categorization: Confirm each claim is tagged to its bucket (Verified Fact, Operational Process, Forward-Looking)
- Accessibility: Demonstrate solicitors can access the library during client interactions
- Currency: Show last-reviewed date and update frequency for the library
Forbidden Phrases Documented
🔎 Proof Required
- Documentation: Show the complete forbidden phrases list with identifiers F-01 through F-12
- Training integration: Demonstrate the forbidden phrases are tested in the final certification exam
- Threshold enforcement: Confirm 90% pass threshold is enforced on the forbidden statements section
- Consequence documentation: Show that using a forbidden phrase triggers immediate disqualification
Sales Academy Completion Gating
🔎 Proof Required
- Curriculum: Show the 10-lesson curriculum with quiz requirements for each lesson
- Final exam structure: Demonstrate the 50-question exam with section scoring
- Gating enforcement: Show that certification is required before sales contact is permitted
- Expiration: Confirm 90-day certification expiry and recertification process
- Retake policy: Show 24-hour cooldown on exam retakes
Compensation Structure Documented
🔎 Proof Required
- Compensation schedule: Show the published compensation structure (onboarding fee share, platform service share)
- Prohibition clauses: Show written prohibition of volume bonuses and performance-tied compensation
- Solicitor Disclosure Form: Demonstrate the form disclosing compensation to prospects before agreement signing
- Audit trail: Show that compensation payments are logged and reconcilable
BD/Licensing Pathway Defined
🔎 Proof Required
- Pathway documentation: Show the BD registration/exemption strategy with timeline
- Current status: Clearly state current licensing status (e.g., solicitor exemption, pending registration)
- Legal opinion: Show legal counsel's opinion on current operating authority
- Disclosure to prospects: Demonstrate that licensing status is disclosed during onboarding
Risk Disclosures Attached to All Pitch Materials
🔎 Proof Required
- Risk categories: Show all 7 risk categories (Market, Liquidity, Regulatory, Technology, Counterparty, Operational, Total Loss)
- Attachment proof: Demonstrate risk disclosures are physically attached to all pitch decks and materials
- Walk-through log: Show records confirming risk disclosures were reviewed with each prospect
- Acknowledgment: Show signed acknowledgment from prospects that they received and understood risk disclosures
Marketing Materials Version-Controlled
🔎 Proof Required
- Version control system: Show the repository or document management system with version history
- Sign-off workflow: Demonstrate the compliance approval process before distribution
- Audit trail: Show log of who distributed which version to whom and when
- Recall procedure: Document the process for recalling outdated materials from circulation
Outbound Emails Use Approved Templates Only
🔎 Proof Required
- Template library: Show the approved email template repository with version dates
- Enforcement mechanism: Demonstrate technical controls preventing unapproved templates (e.g., CRM lockdown)
- Quarterly review log: Show records of template library reviews with dates and sign-offs
- Exception process: Document the approval workflow for any non-template communications
Compensation Structure Reviewed by Counsel
🔎 Proof Required
- Compensation plan: Show the current sales compensation structure document
- Counsel review letter: Provide legal counsel's written review and approval of the compensation plan
- Conflict analysis: Show documentation analyzing potential conflicts of interest in the incentive structure
- Annual re-review: Demonstrate that compensation structures are re-reviewed at least annually
User Registration + Encrypted Training Records Enabled
🔎 Proof Required
- Registration gate: Demonstrate that Sales Academy, Vault, and Templates pages block access until registration is complete
- Keypair generation: Show ECDSA P-256 keypair generation via WebCrypto API in
optkas-crypto.js - Encrypted storage: Confirm private key is encrypted with PBKDF2 (600k iterations) + AES-GCM-256 before IndexedDB storage
- Hash-chain audit: Verify audit chain integrity using
OPTKAS_AUDIT.verifyChain()— all event hashes must validate - Signed attestations: Show at least one quiz or exam attestation with valid ECDSA signature verification
- Document locker: Demonstrate role-based and jurisdiction-based document access filtering