How Execution Flows
This page explains the end-to-end user flow with current route semantics and flow-specific verification behavior.
The Problem This Solves
Users and integrators need one coherent mental model that connects UI actions, backend orchestration, wallet signing, and post-execution verification artifacts.
Why This Matters
When this flow is ambiguous, teams misclassify failures, users retry incorrectly, and audits become slower because artifacts are disconnected from user intent.
High-Level Flow
flowchart LR A[Connect wallet] --> B[Set constraints and context] B --> C[Choose execution path] C --> D[Build action payload] D --> E[Wallet signature and submission] E --> F[Chain confirmation] F --> G[Receipts and profile state updates]
Stage 1: Connect And Establish Context
Problem it solves
Execution without context leads to mismatched assumptions about policy, available balance, and trust posture.
Why it matters
The app uses this initial state to decide which controls are available and which paths should be advisory versus hard-gated.
Stage 2: Select A Surface And Action
Canonical routes:
/agent?v=vaultfor capital, execution, yield, and lending/agent?v=oraclefor market intelligence (signals,radar,genome)/agent?v=brainfor automation and pipeline controls/agent?v=vault&sub=tradefor execution-specific workflows- legacy
/agent?v=traderemaps tov=oracle
Problem it solves
Separates execution intent by operating mode while preserving one workspace.
Why it matters
Users can reason about “what am I doing now” and integrators can deep-link to a deterministic context.
Stage 3: Flow-Specific Verification Behavior
flowchart TB
I[Action Intent] --> T{Flow type}
T -->|Gate-critical| G[Strict policy/proof checks]
T -->|Advisory| A[Signal + recommendation]
T -->|Wallet-first| W[Signed execution then reconcile]
G --> R[Receipts and status]
A --> R
W --> RProblem it solves
Avoids pretending every action uses identical verification semantics.
Why it matters
It aligns docs with production reality and prevents overpromising “always hard-gated” behavior where the implementation is intentionally advisory.
Stage 4: Wallet Submission
User signs transaction(s) and submits to chain. This is the hard ownership checkpoint where custody remains user-controlled.
Problem it solves
Ensures users maintain cryptographic authority over action execution.
Why it matters
Even when orchestration is backend-assisted, the final execution decision remains with the wallet signer.
Stage 5: Receipts, Timeline, And Profile Impact
After submission and confirmation, backend and UI reconcile state:
- receipt and status updates
- profile/reputation/passport context refresh
- execution timeline visibility
Problem it solves
Turns one-off transaction events into traceable operational history.
Why it matters
Users and integrators can validate what happened, when, and under which policy context.
Next: Agent workspace | Risk Passport | API overview
Key Fixtures (Verified 2026-03-05)
/agent?v=vault/agent?v=vault&sub=trade/agent?v=oracle/agent?v=brain&sub=pipeline/profile?tab=trust