Institutional API Guide
BASIS DIGITAL INFRASTRUCTURE LTD Institutional API for arbitrage, staking, treasury movement, reporting, and custody workflow automation LEI: 254900IX2F2KCWNSSS64 Seychelles IBC reg 248559 Capitalization: $35M Pre-Series A raised Production API: https://api.basis.pro/v1/ Primary institutional contact: [email protected]
1. Overview
The BASIS Institutional API provides programmatic access to account state, asset balances, staking workflows, reward accrual, withdrawals, order routing, reporting, and configurable risk controls. It is designed for institutions that require deterministic integration patterns, high-throughput messaging, and auditable operational workflows.
This API is intended for:
Hedge funds
Trading desks
Custodians
Market-makers
Treasury teams operating managed digital asset balances
Key capabilities include:
Account and balance retrieval
Staking lifecycle management for BTC, ETH, SOL, and PAXG
Reward reporting and historical accrual access
Programmatic withdrawals to approved destinations
Order submission and status retrieval for execution workflows
Risk policy configuration through authenticated control endpoints
Webhooks for low-latency downstream automation
Immutable reporting and audit root retrieval
BHLE, the BASIS high-liquidity execution layer, is the infrastructure core behind the institutional stack. It delivers sub-50μs internal processing latency and sustains 100,000+ OPS for account events, risk checks, routing optimization, and ledger writes.
Supported staking booster tenors:
14D
+10%
30D
+20%
90D
+50%
180D
+100% (2x)
Asset support is limited to BTC, ETH, SOL, and PAXG. PAXG is live and active. USDT is internal accounting only and cannot be deposited or withdrawn.
2. API Availability and Authentication
2.1 Base URL
https://api.basis.pro/v1/
Production conventions:
Transport: HTTPS over TLS 1.3
Payload format:
application/jsonResponse timestamps: ISO 8601 UTC
Authentication timestamp header: Unix milliseconds UTC
Decimal amounts: serialized as strings to preserve precision
State-changing requests: should include
Idempotency-Key
2.2 Versioning policy
BASIS uses path-based major versioning.
Current major version:
v1Non-breaking additions, such as new response fields or new optional request fields, may be introduced within
v1Breaking changes are released under a new major path such as
v2Deprecated fields remain supported for a minimum of 90 days after formal notice
Institutional clients with dedicated environments receive change notices before breaking upgrades
Clients should ignore unknown response fields to remain forward compatible
2.3 Authentication Flow
Each request must be signed with HMAC-SHA256 and include the exact headers below:
X-BASIS-KEYX-BASIS-TIMESTAMPX-BASIS-SIGNATURE
Recommended additional headers:
Content-Type: application/jsonIdempotency-Key: <uuid>forPOSTandPUToperations
Authentication flow:
Provision an institutional API key with the required scopes.
Bind source IP addresses and enable mTLS if required by your onboarding profile.
Generate a Unix millisecond timestamp.
Create the request body exactly as transmitted.
Compute the SHA-256 hash of the raw body bytes. For empty bodies, hash the empty string.
Build the canonical string as:
timestamp + "\n" + method + "\n" + path_with_query + "\n" + body_sha256_hex
Sign the canonical string with HMAC-SHA256 using your API secret.
Send the lowercase hex digest in
X-BASIS-SIGNATURE.
Exact header example:
Validation rules on the server side:
Timestamp skew tolerance: ±30 seconds
Signature must match the raw request body and exact path with query string
API key must have the required scope
Source IP must match whitelist if enabled
mTLS certificate must be valid if enforced for the key
HMAC-SHA256 pseudocode:
2.4 Rate Limits
Rate limits apply per API key and are enforced over rolling one-second windows.
Default
100 rps
Reporting, treasury ops, standard automation
Premium
500 rps
Active routing, market-making, high-frequency reconciliation
Rate limit headers:
X-RateLimit-LimitX-RateLimit-RemainingX-RateLimit-Reset
When a client exceeds the limit, the API returns 429 Too Many Requests.
2.5 Security Features
BASIS supports institutional-grade controls at the transport, credential, and policy layers.
IP whitelisting: restrict access to approved source ranges
mTLS: optional or mandatory based on your integration profile
Role-scoped keys: issue least-privilege keys such as
balance:read,stake:write, orreports:readKey rotation: rotate credentials through
POST /auth/rotateIdempotency support: protects state-changing requests from replay on network retries
Immutable request tracing: all authenticated actions are mapped to request IDs and retained in the audit trail
Destination controls: withdrawals can be restricted to approved addresses only
3. Endpoint Reference
/account
GET
Return institution profile, account identifiers, enabled products, and custody policy summary
account:read
/balance
GET
Return available, locked, staked, and pending balances by asset
balance:read
/stake
POST
Create a staking instruction with optional booster tenor
stake:write
/unstake
POST
Request partial or full release from an active stake
stake:write
/rewards
GET
List accrued and settled rewards by asset and date range
rewards:read
/withdrawal
POST
Create a withdrawal request to an approved destination
withdrawal:write
/withdrawal/{id}
GET
Return withdrawal status, fee, approval state, and network transaction details
withdrawal:read
/orders
POST
Submit an execution instruction with routing optimization parameters
orders:write
/orders
GET
List or filter orders by asset, status, and time range
orders:read
/reports/statement
POST
Generate account statements in JSON, CSV, or FIXML
reports:read
/reports/audit-root
GET
Return Merkle root and timestamp evidence for a reporting interval
reports:read
/auth/rotate
POST
Rotate an API key and return successor key metadata
auth:admin
/risk/config
GET
Read active risk controls and thresholds
risk:read
/risk/config
PUT
Update BSCB, DMM, and position monitor thresholds
risk:write
/webhooks
POST
Register or update webhook destinations and event subscriptions
webhooks:write
/webhooks
GET
List active webhook endpoints and subscribed event types
webhooks:read
Common success envelope:
request_id
string
Server-generated trace identifier
server_time
string
ISO 8601 UTC timestamp
status
string
ok, accepted, or endpoint-specific success state
data
object
Endpoint payload
Common error envelope:
request_id
string
Trace identifier for support and audit
server_time
string
ISO 8601 UTC timestamp
status
string
error
error.code
string
Machine-readable error code
error.message
string
Human-readable summary
error.details
object
Optional field-level detail
Common HTTP statuses:
200
Request completed successfully
201
Resource created
202
Request accepted for asynchronous processing
400
Validation error
401
Authentication failed
403
Scope or policy denied
404
Resource not found
409
State conflict or idempotency collision
429
Rate limit exceeded
500
Internal service error
503
Temporary service degradation
4. Request and Response Examples
All numeric amounts are represented as strings. For GET endpoints, the request JSON below represents query parameters.
4.1 GET /balance
Request JSON:
Response JSON:
4.2 POST /stake
Example: staking BTC with a 90D booster
Request JSON:
Response JSON:
4.3 POST /unstake
Request JSON:
Response JSON:
4.4 GET /rewards
Request JSON:
Response JSON:
4.5 POST /withdrawal
Request JSON:
Response JSON:
5. Webhooks and Callbacks
BASIS webhooks provide low-latency event delivery to client systems for reconciliation, treasury movement, reward accounting, and downstream execution workflows.
Event payload shape:
Event types:
balance.update
Any confirmed balance state change
asset, available, locked, staked, pending_withdrawal
stake.settled
Stake instruction reaches settled state
stake_id, asset, amount, status, maturity_at
reward.accrued
Reward accrual is posted to the account ledger
asset, accrued, period_start, period_end
withdrawal
Withdrawal state changes through its lifecycle
withdrawal_id, asset, amount, status, tx_hash
Signature verification:
Each webhook includes
X-BASIS-WH-SIGCompute HMAC-SHA256 over the raw request body using the webhook secret configured at registration
Compare the resulting lowercase hex digest to
X-BASIS-WH-SIGusing a constant-time comparisonDeduplicate using
event_id
Verification pseudocode:
Delivery guarantees:
Delivery model: at-least-once
Acknowledgement rule: any
2xxresponse marks the event deliveredRetry strategy: exponential back-off on non-
2xxresponses or connection failureRetry window: up to 24 hours
Ordering: best effort per destination, not guaranteed across event types
Consumer requirement: webhook handlers should be idempotent
Webhook registration endpoint:
POST /webhooks
Registration payload fields:
url: your HTTPS endpointevents: array of event typessecret: shared signing secretactive: boolean flag
6. Execution Infrastructure
BHLE is the execution and settlement fabric that sits behind institutional API traffic. It is optimized for deterministic routing, pre-trade control enforcement, ledger consistency, and fast acknowledgement paths.
BHLE architecture overview:
Gateway layer for authenticated HTTP and FIX ingress
Deterministic pre-trade and pre-withdrawal policy checks
In-memory state engine for balances, locks, and exposure views
Routing optimization layer for order and conversion instructions
Append-only ledger writer for settlement state
Replicated audit stream for reporting and reconciliation
Sub-50μs internal processing latency
Sustained throughput above 100,000+ OPS
Co-location and institutional connectivity:
Dual-site co-location topology is available for approved institutional clients
Equinix cross-connect connectivity is supported for private low-latency access
FIX 4.4 sessions are available for clients that prefer standardized order flow and drop copy patterns
Site-level provisioning details are shared during onboarding
Connectivity modes:
Public Internet
HTTPS over TLS 1.3
2 ms to 30 ms path-dependent
Treasury operations, reporting, standard automation
Cross-connect
Private circuit via Equinix
250μs to 900μs typical
Active execution, low-latency reconciliation
FIX-over-TLS
FIX 4.4 over TLS
Acknowledgement under 1 ms p99
Trading desks, market-makers, drop copy
Latency figures represent BASIS edge behavior under normal operating conditions and exclude client-side network variance.
Atomic clock synchronization:
Gateway, engine, and ledger events are stamped against atomic-clock synchronized UTC sources
Timestamp ordering is preserved across API events, webhooks, reports, and FIX sessions
Time synchronization supports deterministic reconciliation and precise audit sequencing
7. Supported Assets
BTC
Yes
BTC
0.01000000
Bitcoin
ETH
Yes
ETH
0.25000000
Ethereum
SOL
Yes
SOL
5.00000000
Solana
PAXG
Yes
PAXG
0.10000000
Ethereum (ERC-20)
Notes:
Supported assets are limited to BTC, ETH, SOL, and PAXG only
PAXG is live and fully active for deposit, staking, rewards, and withdrawal
USDT is internal accounting only and cannot be deposited or withdrawn
8. Risk Controls
BASIS applies account-level and workflow-level risk controls before balance mutation, execution submission, or withdrawal release. Institutional clients can review and update control settings through /risk/config, subject to scope and approval policy.
Risk controls:
BSCB
Balance Sufficiency Circuit Breaker. Blocks stake, order, or withdrawal requests that would violate available balance or reserve thresholds
Enabled
DMM
Drawdown Mitigation Monitor. Throttles new risk when account-level drawdown thresholds are breached
Enabled
Position Monitor
Enforces concentration and exposure thresholds by asset, tenor, and workflow type
Enabled
GET /risk/config returns the active account policy.
PUT /risk/config updates policy thresholds, subject to risk:write scope and internal approval policy.
Example risk configuration payload:
Operational notes:
Risk policy changes are fully audited
Policy updates can be staged for activation at a future timestamp
Rejected requests return detailed policy failure reasons in
error.details
9. Reporting and Audit Trail
BASIS maintains a 7-year immutable operational and ledger log for institutional accounts. Every authenticated API action, balance mutation, stake lifecycle event, reward accrual, withdrawal event, and risk policy change is preserved for audit and reconciliation.
Reporting capabilities include:
Statement generation through
/reports/statementExport formats: JSON, CSV, FIXML
Interval-level audit anchoring through
/reports/audit-rootRFC 3161 TSA timestamps for report evidence
Merkle-root proofs for statement integrity verification
Typical reporting workflow:
Submit a statement generation request to
POST /reports/statementSpecify account, date range, and desired format
Retrieve the generated statement and associated integrity metadata
Verify the returned Merkle root against
/reports/audit-rootStore the accompanying RFC 3161 timestamp token for external audit evidence
Recommended statement fields:
Account identifier
Asset balances by day or interval
Stake opens and closes
Reward accrual and settlement
Withdrawal requests and completion state
Order submissions and acknowledgements
Risk policy changes
Request IDs and server timestamps
10. Service Level Agreement
API uptime
99.98%
Order acknowledgement
<1 ms p99
Webhook delivery
<500 ms
Withdrawal completion
<60 s
SLA notes:
Targets apply to normal operating conditions
Client-side network path variance is excluded
Planned maintenance windows are notified in advance
Policy-based holds, destination approval workflows, or external network congestion may affect individual settlement outcomes
11. Research References
Selected Base58 Labs research papers from 2026:
Base58 Labs, "Deterministic Routing Optimization Under Stochastic Latency", 2026
Base58 Labs, "Atomic Time Ordering for Digital Asset Audit Trails", 2026
Base58 Labs, "Adaptive Liquidity Recycling for Yield and Arbitrage Portfolios", 2026
Base58 Labs, "Secure Multi-Signature Orchestration for Institutional Settlement", 2026
Base58 Labs, "Low-Latency Risk Gating with Balance Sufficiency Circuit Breakers", 2026
12. Contact
NOC: +1-332-900-2274
Client assets are segregated at wallet, ledger, and reporting layers. Withdrawal release policies support approved destination lists, role-based authorization chains, and multi-sig custody controls. Hot wallet exposure is policy-limited, with excess balances swept to segregated cold custody. Audit evidence is available through immutable statements, Merkle-root verification, and RFC 3161 timestamp records.
Last updated