Operating System
Six platforms. One fiduciary standard.
Protocol Wealth isn't a single app — it's an integrated ecosystem of purpose-built systems, each handling a specific part of wealth management. Every platform is connected, every action is audited, and every AI tool operates within strict fiduciary boundaries.
Platform Architecture
Each platform owns a specific domain of responsibility. They share authentication, data contracts, and compliance rules — but each can operate, deploy, and scale independently.
Advisor & Client Operating System
Central control plane for client management, portfolio oversight, compliance tracking, and workflow automation. Acts as the authentication authority across the ecosystem.
Research Engine & AI Infrastructure
243 analytical tools accessible via the Model Context Protocol (MCP). Powers regime classification, 8-check scoring, portfolio analysis, and research generation. Connects directly to Claude and other AI systems.
Cross-Chain Portfolio Reporting
Tracks client positions across 10+ blockchain networks. Generates comprehensive statements, reconciles balances, and provides real-time portfolio views with full audit trails.
Policy-Bounded Strategy Execution
Autonomous vault runtime with strict policy guardrails. Executes rebalancing and yield strategies within pre-defined boundaries. Every action is signed, logged, and constrained by smart contract policies.
Public Research & Transparency
The site you're reading now. Publishes regime classifications, research reports, framework methodology, and vault architecture documentation. Everything we show clients, we show the public.
Compliance & Legal Disclosures
Public-facing regulatory layer. Houses all legal disclosures, privacy policies, terms of service, Form ADV filings, and client segment information.
How They Connect
The platforms form a directed graph with clear data ownership boundaries. No platform reaches into another's database — all communication happens through versioned APIs with authentication at every boundary.
Authentication
PW Portal is the central authority. It issues OAuth tokens that every other platform validates. A single login grants access across the ecosystem with role-appropriate permissions.
Analytics
PW Nexus provides scoring, regime classification, and research to every platform that needs it. Portal displays client scores. Insights publishes public research. Strategies uses regime signals for allocation.
Reporting
PW Onchain tracks what's on-chain. Portal pulls portfolio summaries for advisor dashboards. Statements flow from blockchain data through reconciliation to client-ready reports.
Execution
PW Strategies executes within policy boundaries set by Portal. Every action is signed, logged, and reported back. Agent configuration flows from advisor to vault — never the reverse.
AI Infrastructure
PW Nexus exposes over 243 analytical tools via the Model Context Protocol (MCP) — a standard that lets AI systems like Claude query structured data, run scoring models, and pull research within defined boundaries. This is how we make comprehensive analysis accessible.
Scoring, screening, regime detection, portfolio analysis, research generation, and market data — all accessible through a single protocol.
Public tools for anyone. Advisor tools for authenticated professionals. Client-filtered tools with PII protection. Sensitive tools with strict access control.
Every asset is scored across 8 measurable dimensions — cash generation, financial health, trend persistence, durability, regime alignment, cycle position, sector momentum, and disruption risk.
Gold/equity ratio, real rates, dollar strength, volatility, credit spreads, bond markets, and energy prices. Together they classify the current market environment.
What "AI-native" actually means here
When we say AI-native, we mean the analytical infrastructure was designed from the start to be queried by AI systems. An advisor can ask Claude to "score NVDA and tell me if it fits the current regime" — and Claude calls the same tools that power our internal scoring. The AI doesn't make decisions. It runs computations, returns structured results, and the human advisor interprets and acts.
AI Governance Rules
AI is a tool, not a decision-maker. Every AI interaction in our ecosystem follows explicit rules that cannot be overridden by the AI system itself.
AI tools assist with analysis and scoring. They never make investment decisions, execute trades, or generate personalized advice without human advisor review.
Client data is anonymized before entering any AI system. Account numbers, SSNs, and personal details are stripped from all AI-accessible data paths.
Any AI-generated content that reaches a client must pass through a human review step. No AI output is delivered directly to clients without advisor sign-off.
All third-party AI platforms we use are configured for opt-out from model training. Client data does not train external AI systems.
Every AI tool invocation is logged with user, action, timestamp, and IP. Advisory interactions are retained for 5 years per SEC Rule 204-2.
AI tools are classified into 4 access tiers: Public, Advisor, Client-Filtered, and Sensitive. Each tier has strict data boundaries.
Security Architecture
Security isn't a feature — it's a constraint that shapes every design decision. Data is encrypted at every layer, access is authenticated at every boundary, and every write operation produces an immutable audit record.
| Layer | Standard | Implementation |
|---|---|---|
| In Transit | TLS 1.2+ mandatory | All API endpoints HTTPS-only. No unencrypted data movement between any platform. |
| At Rest (Database) | AES-256 | Transparent encryption on all database storage. Client data is encrypted before it touches disk. |
| At Rest (Sensitive) | AES-256-GCM | Application-layer encryption for tokens, keys, and sensitive fragments beyond database-level protection. |
| At Rest (Documents) | Server-Side Encryption | All client documents stored with encryption and eDiscovery-ready archival. |
| Key Management | Environment-only | No secrets in code, ever. All keys stored in environment variables and rotated on schedule. |
No public write endpoints. Every mutation requires authentication and role-based authorization. We maintain strict controls with no debug endpoints in production.
Every write operation — across every platform — records the user, action, IP address, and timestamp in an append-only audit log. These records are retained for 5 years minimum.
All third-party vendors handling client data must meet SOC 2 or equivalent security standards. We verify this during onboarding and review annually.
Vault Guardrails
Protocol Wealth is non-custodial. We never hold client private keys. Wallet operations are facilitated through MPC (multi-party computation) infrastructure where PW alone cannot move assets. Beyond that, every vault has structural guardrails enforced at the smart contract level.
PW cannot withdraw client assets alone. Vault architecture uses multi-signature requirements where PW does not achieve quorum.
Clients retain withdrawal rights enforced by smart contract. ERC-7540 epoch settlement and Safe owner-only access are designed to allow clients to exit.
Each client's assets are provably separate via receipt tokens, vault shares, or individual Safe accounts. No commingling.
Strategy agents can only execute pre-approved actions within pre-defined parameters. Zodiac Roles and IPOR Fuses enforce boundaries at the smart contract level.
The strategy execution runtime defaults to simulation mode. Live execution requires explicit activation with partner approval.
Automated risk gates can halt execution when market conditions breach defined thresholds. These operate independently of human intervention.
Human Oversight
Technology enables scale. Humans provide judgment. The system is designed so that no critical action — whether investment, compliance, or client communication — happens without human review.
Chief Compliance Officer
Oversees the compliance program, vendor assessment, AML administration, and all regulatory filings. Reviews every client-facing communication and marketing material.
Chief Investment Officer
Manages investment strategy, portfolio construction, and sub-advisor oversight. Every allocation decision is made under fiduciary duty with a signed Investment Policy Statement.
CISO / CTO
Owns information security, technology infrastructure, and platform architecture. Leads incident response, penetration testing, and security policy enforcement.
Monitoring Cadence
| Frequency | Activities |
|---|---|
| Continuous | System health monitoring, security event logging, position tracking |
| Daily | Access log review, position reconciliation, balance verification |
| Monthly | Vulnerability scanning, access recertification, compliance spot checks |
| Quarterly | Compliance testing, sub-advisor review, business continuity drills |
| Annually | Penetration testing, full cybersecurity assessment, vendor risk review, policy audits |
Regulatory Framework
Protocol Wealth LLC is an SEC-registered investment adviser (CRD #335298), organized as a Delaware LLC. We operate under a ~200-page compliance manual covering registration, fiduciary duty, custody, trading, marketing, privacy, cybersecurity, and anti-money laundering.
As a registered investment adviser, we are legally bound to act in our clients' best interests. This isn't a marketing claim — it's a regulatory obligation enforced by the SEC.
All client records, advisory communications, and financial documents are retained for a minimum of 5 years per SEC Rule 204-2. Tax records are retained for 7 years.
Client nonpublic personal information is protected under federal privacy regulations. We disclose exactly what we collect, how we use it, and how long we keep it.
All personnel follow a code of ethics that includes personal trading pre-clearance, material non-public information policies, and DeFi conflict-of-interest rules.
Know Your Customer and Anti-Money Laundering procedures include identity verification, enhanced due diligence for high-risk profiles, and ongoing transaction monitoring.
In the event of a data breach, affected clients are notified within 30 days per Reg S-P requirements. Incident response procedures are tested quarterly.
Review our public filings:
What We're Building Toward
The operating system is functional today. Here's where it's heading — and what's already shipped.
Canonical 8-Check Scoring
Single scoring path across all 243 tools. Every asset scored against the same 8 measurable checks with full source attribution.
Live Regime Classification
7 market signals continuously monitored. Regime state published publicly with confidence scores, signal breakdown, and historical timeline.
Cross-Chain Statement Platform
10+ blockchain networks tracked. Institutional-grade portfolio reporting with reconciliation, LP position decomposition, and audit trails.
Regime Auto-Alerts
Automated drift detection, confidence erosion monitoring, and signal divergence alerts. The system notifies advisors when conditions change.
Client Regime Dashboard
Bringing real-time regime classification directly into the client experience — same data the advisors see, presented for client understanding.
Expanded Vault Paths
New vault architectures for different client profiles — from simple managed yield to fully automated, policy-gated separately managed accounts.
FAQ
Is Protocol Wealth a technology company or an advisory firm?
Both. We are an SEC-registered investment adviser that builds its own technology infrastructure. The technology serves the advisory mission — not the other way around. Every system exists to make fiduciary wealth management more systematic, transparent, and scalable.
Can AI make investment decisions in your system?
No. AI tools run computations, score assets, classify market regimes, and generate research drafts. A human advisor reviews every output before it becomes advice or triggers action. AI does not execute trades, approve allocations, or deliver personalized recommendations.
Does Protocol Wealth hold my crypto keys?
No. Protocol Wealth is non-custodial. All wallet operations use multi-party computation (MPC) infrastructure where PW alone cannot move assets. Clients retain beneficial ownership and withdrawal rights at all times.
Can I access the analytical tools directly?
Yes. PW Nexus exposes over 243 tools via the Model Context Protocol (MCP). Public-tier tools are accessible through Claude.ai and other MCP-compatible AI systems without authentication. Advisor-tier tools require credentials.
How is my data protected?
Data is encrypted in transit (TLS 1.2+) and at rest (AES-256). Sensitive fields get additional application-layer encryption (AES-256-GCM). All access is authenticated and role-gated. PII is filtered from AI tool responses. Advisory records are retained 5 years per SEC rules; non-advisory logs are purged after 90 days.
What happens if something goes wrong with a vault?
Multiple layers of protection: automated kill rules halt execution when risk thresholds are breached, multi-sig requirements prevent unilateral actions, policy constraints are enforced at the smart contract level, and the default execution mode is simulation (dry-run). Human advisors are alerted to any anomalous activity.
Is the source code public?
Not currently. However, we publish our framework methodology, regime classifications, and vault architecture publicly on this site. Smart contract policies are verifiable on-chain. We believe in transparency of process and outcomes, not just code.
See the operating system in action
Protocol Wealth applies this infrastructure as a fiduciary advisor. Schedule a consultation to discuss how systematic, technology-driven wealth management can work for you.
Protocol Wealth, LLC is an SEC-registered investment adviser (CRD #335298). Registration does not imply a particular level of skill or training. All investments involve risk, including the potential loss of principal. Digital assets are highly speculative and volatile. Past performance does not guarantee future results. Website content is general information and is not a personalized recommendation for any specific person. Advisory services are provided only under a signed advisory agreement. The Protocol Wealth Asset Framework (PWAF), built on the Entropic Macro Framework (EMF) methodology, including the 7-layer durability model, 8-check scoring system, and related analytical methodologies, are systematic frameworks built on established research — not predictive models and not investment advice. Framework scores, tiers, and classifications reflect historical and current quantitative metrics only; they do not constitute buy, sell, or hold recommendations for any specific security. Past performance is not indicative of future results.