Snapshot Freshness Alert

Snapshot status unavailable.

Operating System

Six platforms. One fiduciary standard.

Protocol Wealth isn't a single app — it's an integrated ecosystem of purpose-built systems, each handling a specific part of wealth management. Every platform is connected, every action is audited, and every AI tool operates within strict fiduciary boundaries.

Platform Architecture

Each platform owns a specific domain of responsibility. They share authentication, data contracts, and compliance rules — but each can operate, deploy, and scale independently.

Control Plane PW Portal

Advisor & Client Operating System

Central control plane for client management, portfolio oversight, compliance tracking, and workflow automation. Acts as the authentication authority across the ecosystem.

pwdashboard.com Go + React
Analytics PW Nexus

Research Engine & AI Infrastructure

243 analytical tools accessible via the Model Context Protocol (MCP). Powers regime classification, 8-check scoring, portfolio analysis, and research generation. Connects directly to Claude and other AI systems.

nexusmcp.site Python / FastAPI
Reporting PW Onchain

Cross-Chain Portfolio Reporting

Tracks client positions across 10+ blockchain networks. Generates comprehensive statements, reconciles balances, and provides real-time portfolio views with full audit trails.

onchainstatement.com Python / FastAPI
Execution PW Strategies

Policy-Bounded Strategy Execution

Autonomous vault runtime with strict policy guardrails. Executes rebalancing and yield strategies within pre-defined boundaries. Every action is signed, logged, and constrained by smart contract policies.

protocolwealthstrategies.com Go + Next.js
Research PW Insights

Public Research & Transparency

The site you're reading now. Publishes regime classifications, research reports, framework methodology, and vault architecture documentation. Everything we show clients, we show the public.

pwinsights.com Astro 5
Compliance PW Website

Compliance & Legal Disclosures

Public-facing regulatory layer. Houses all legal disclosures, privacy policies, terms of service, Form ADV filings, and client segment information.

protocolwealthllc.com Astro 5

How They Connect

The platforms form a directed graph with clear data ownership boundaries. No platform reaches into another's database — all communication happens through versioned APIs with authentication at every boundary.

Authentication

PW Portal is the central authority. It issues OAuth tokens that every other platform validates. A single login grants access across the ecosystem with role-appropriate permissions.

Analytics

PW Nexus provides scoring, regime classification, and research to every platform that needs it. Portal displays client scores. Insights publishes public research. Strategies uses regime signals for allocation.

Reporting

PW Onchain tracks what's on-chain. Portal pulls portfolio summaries for advisor dashboards. Statements flow from blockchain data through reconciliation to client-ready reports.

Execution

PW Strategies executes within policy boundaries set by Portal. Every action is signed, logged, and reported back. Agent configuration flows from advisor to vault — never the reverse.

AI Infrastructure

PW Nexus exposes over 243 analytical tools via the Model Context Protocol (MCP) — a standard that lets AI systems like Claude query structured data, run scoring models, and pull research within defined boundaries. This is how we make comprehensive analysis accessible.

243 Analytical Tools

Scoring, screening, regime detection, portfolio analysis, research generation, and market data — all accessible through a single protocol.

4 Access Tiers

Public tools for anyone. Advisor tools for authenticated professionals. Client-filtered tools with PII protection. Sensitive tools with strict access control.

8 Quality Checks

Every asset is scored across 8 measurable dimensions — cash generation, financial health, trend persistence, durability, regime alignment, cycle position, sector momentum, and disruption risk.

7 Regime Signals

Gold/equity ratio, real rates, dollar strength, volatility, credit spreads, bond markets, and energy prices. Together they classify the current market environment.

What "AI-native" actually means here

When we say AI-native, we mean the analytical infrastructure was designed from the start to be queried by AI systems. An advisor can ask Claude to "score NVDA and tell me if it fits the current regime" — and Claude calls the same tools that power our internal scoring. The AI doesn't make decisions. It runs computations, returns structured results, and the human advisor interprets and acts.

AI Governance Rules

AI is a tool, not a decision-maker. Every AI interaction in our ecosystem follows explicit rules that cannot be overridden by the AI system itself.

No autonomous investment decisions

AI tools assist with analysis and scoring. They never make investment decisions, execute trades, or generate personalized advice without human advisor review.

PII filtering on all AI outputs

Client data is anonymized before entering any AI system. Account numbers, SSNs, and personal details are stripped from all AI-accessible data paths.

Human approval gate on client content

Any AI-generated content that reaches a client must pass through a human review step. No AI output is delivered directly to clients without advisor sign-off.

No training on client data

All third-party AI platforms we use are configured for opt-out from model training. Client data does not train external AI systems.

Full audit trail

Every AI tool invocation is logged with user, action, timestamp, and IP. Advisory interactions are retained for 5 years per SEC Rule 204-2.

Tiered access control

AI tools are classified into 4 access tiers: Public, Advisor, Client-Filtered, and Sensitive. Each tier has strict data boundaries.

Security Architecture

Security isn't a feature — it's a constraint that shapes every design decision. Data is encrypted at every layer, access is authenticated at every boundary, and every write operation produces an immutable audit record.

Layer Standard Implementation
In Transit TLS 1.2+ mandatory All API endpoints HTTPS-only. No unencrypted data movement between any platform.
At Rest (Database) AES-256 Transparent encryption on all database storage. Client data is encrypted before it touches disk.
At Rest (Sensitive) AES-256-GCM Application-layer encryption for tokens, keys, and sensitive fragments beyond database-level protection.
At Rest (Documents) Server-Side Encryption All client documents stored with encryption and eDiscovery-ready archival.
Key Management Environment-only No secrets in code, ever. All keys stored in environment variables and rotated on schedule.
RBAC on Every Route

No public write endpoints. Every mutation requires authentication and role-based authorization. We maintain strict controls with no debug endpoints in production.

Immutable Audit Log

Every write operation — across every platform — records the user, action, IP address, and timestamp in an append-only audit log. These records are retained for 5 years minimum.

Vendor Security Requirements

All third-party vendors handling client data must meet SOC 2 or equivalent security standards. We verify this during onboarding and review annually.

Vault Guardrails

Protocol Wealth is non-custodial. We never hold client private keys. Wallet operations are facilitated through MPC (multi-party computation) infrastructure where PW alone cannot move assets. Beyond that, every vault has structural guardrails enforced at the smart contract level.

No unilateral withdrawal

PW cannot withdraw client assets alone. Vault architecture uses multi-signature requirements where PW does not achieve quorum.

Programmatic redemption rights

Clients retain withdrawal rights enforced by smart contract. ERC-7540 epoch settlement and Safe owner-only access are designed to allow clients to exit.

Cryptographic segregation

Each client's assets are provably separate via receipt tokens, vault shares, or individual Safe accounts. No commingling.

Policy-gated execution

Strategy agents can only execute pre-approved actions within pre-defined parameters. Zodiac Roles and IPOR Fuses enforce boundaries at the smart contract level.

Dry-run by default

The strategy execution runtime defaults to simulation mode. Live execution requires explicit activation with partner approval.

Kill rules and risk overrides

Automated risk gates can halt execution when market conditions breach defined thresholds. These operate independently of human intervention.

Human Oversight

Technology enables scale. Humans provide judgment. The system is designed so that no critical action — whether investment, compliance, or client communication — happens without human review.

Chief Compliance Officer

Oversees the compliance program, vendor assessment, AML administration, and all regulatory filings. Reviews every client-facing communication and marketing material.

Chief Investment Officer

Manages investment strategy, portfolio construction, and sub-advisor oversight. Every allocation decision is made under fiduciary duty with a signed Investment Policy Statement.

CISO / CTO

Owns information security, technology infrastructure, and platform architecture. Leads incident response, penetration testing, and security policy enforcement.

Monitoring Cadence

Frequency Activities
Continuous System health monitoring, security event logging, position tracking
Daily Access log review, position reconciliation, balance verification
Monthly Vulnerability scanning, access recertification, compliance spot checks
Quarterly Compliance testing, sub-advisor review, business continuity drills
Annually Penetration testing, full cybersecurity assessment, vendor risk review, policy audits

Regulatory Framework

Protocol Wealth LLC is an SEC-registered investment adviser (CRD #335298), organized as a Delaware LLC. We operate under a ~200-page compliance manual covering registration, fiduciary duty, custody, trading, marketing, privacy, cybersecurity, and anti-money laundering.

Fiduciary Standard

As a registered investment adviser, we are legally bound to act in our clients' best interests. This isn't a marketing claim — it's a regulatory obligation enforced by the SEC.

5-Year Record Retention

All client records, advisory communications, and financial documents are retained for a minimum of 5 years per SEC Rule 204-2. Tax records are retained for 7 years.

Privacy (Reg S-P)

Client nonpublic personal information is protected under federal privacy regulations. We disclose exactly what we collect, how we use it, and how long we keep it.

Code of Ethics

All personnel follow a code of ethics that includes personal trading pre-clearance, material non-public information policies, and DeFi conflict-of-interest rules.

KYC / AML

Know Your Customer and Anti-Money Laundering procedures include identity verification, enhanced due diligence for high-risk profiles, and ongoing transaction monitoring.

Breach Notification

In the event of a data breach, affected clients are notified within 30 days per Reg S-P requirements. Incident response procedures are tested quarterly.

What We're Building Toward

The operating system is functional today. Here's where it's heading — and what's already shipped.

Shipped

Canonical 8-Check Scoring

Single scoring path across all 243 tools. Every asset scored against the same 8 measurable checks with full source attribution.

Shipped

Live Regime Classification

7 market signals continuously monitored. Regime state published publicly with confidence scores, signal breakdown, and historical timeline.

Shipped

Cross-Chain Statement Platform

10+ blockchain networks tracked. Institutional-grade portfolio reporting with reconciliation, LP position decomposition, and audit trails.

Shipped

Regime Auto-Alerts

Automated drift detection, confidence erosion monitoring, and signal divergence alerts. The system notifies advisors when conditions change.

Building

Client Regime Dashboard

Bringing real-time regime classification directly into the client experience — same data the advisors see, presented for client understanding.

Building

Expanded Vault Paths

New vault architectures for different client profiles — from simple managed yield to fully automated, policy-gated separately managed accounts.

FAQ

Is Protocol Wealth a technology company or an advisory firm?

Both. We are an SEC-registered investment adviser that builds its own technology infrastructure. The technology serves the advisory mission — not the other way around. Every system exists to make fiduciary wealth management more systematic, transparent, and scalable.

Can AI make investment decisions in your system?

No. AI tools run computations, score assets, classify market regimes, and generate research drafts. A human advisor reviews every output before it becomes advice or triggers action. AI does not execute trades, approve allocations, or deliver personalized recommendations.

Does Protocol Wealth hold my crypto keys?

No. Protocol Wealth is non-custodial. All wallet operations use multi-party computation (MPC) infrastructure where PW alone cannot move assets. Clients retain beneficial ownership and withdrawal rights at all times.

Can I access the analytical tools directly?

Yes. PW Nexus exposes over 243 tools via the Model Context Protocol (MCP). Public-tier tools are accessible through Claude.ai and other MCP-compatible AI systems without authentication. Advisor-tier tools require credentials.

How is my data protected?

Data is encrypted in transit (TLS 1.2+) and at rest (AES-256). Sensitive fields get additional application-layer encryption (AES-256-GCM). All access is authenticated and role-gated. PII is filtered from AI tool responses. Advisory records are retained 5 years per SEC rules; non-advisory logs are purged after 90 days.

What happens if something goes wrong with a vault?

Multiple layers of protection: automated kill rules halt execution when risk thresholds are breached, multi-sig requirements prevent unilateral actions, policy constraints are enforced at the smart contract level, and the default execution mode is simulation (dry-run). Human advisors are alerted to any anomalous activity.

Is the source code public?

Not currently. However, we publish our framework methodology, regime classifications, and vault architecture publicly on this site. Smart contract policies are verifiable on-chain. We believe in transparency of process and outcomes, not just code.

See the operating system in action

Protocol Wealth applies this infrastructure as a fiduciary advisor. Schedule a consultation to discuss how systematic, technology-driven wealth management can work for you.

Protocol Wealth, LLC is an SEC-registered investment adviser (CRD #335298). Registration does not imply a particular level of skill or training. All investments involve risk, including the potential loss of principal. Digital assets are highly speculative and volatile. Past performance does not guarantee future results. Website content is general information and is not a personalized recommendation for any specific person. Advisory services are provided only under a signed advisory agreement. The Protocol Wealth Asset Framework (PWAF), built on the Entropic Macro Framework (EMF) methodology, including the 7-layer durability model, 8-check scoring system, and related analytical methodologies, are systematic frameworks built on established research — not predictive models and not investment advice. Framework scores, tiers, and classifications reflect historical and current quantitative metrics only; they do not constitute buy, sell, or hold recommendations for any specific security. Past performance is not indicative of future results.