Operational Model: Venues, Fragmentation, Controls

circle-info

Operator and jurisdiction: BASIS is operated by BASIS DIGITAL INFRASTRUCTURE LTD, a Seychelles IBC (LEI: 254900IX2F2KCWNSSS64arrow-up-right).

BASIS interacts with third-party venues, including centralized exchanges and on-chain protocols, to execute structural alpha capture strategies. This introduces operational complexity, settlement dependencies, and counterparty risk.

This page explains how BASIS manages:

  • venue selection and whitelisting

  • risk scoring and blacklisting

  • liquidity fragmentation

  • deterministic execution controls

  • incident response and public disclosure

1) Venue registry and whitelisting

BASIS maintains a continuously updated venue registry. Only venues that satisfy minimum technical, operational, and risk thresholds are eligible for automated routing. These controls operate within an institutional-grade operating model supported by active ISO/IEC 27001:2022 and ISO/IEC 20000-1:2018 management systems.

Registry field
Description

Connectivity status

Endpoint health, latency, timeout rate, failover readiness

Market coverage

Supported spot and derivatives markets

Withdrawal status

Enabled, delayed, limited, or halted

Settlement paths

On-chain and exchange transfer routes available to BASIS

Reliability metrics

Historical uptime, rejection rate, cancellation behavior

Risk score

Composite score derived from operational and market conditions

Capacity limits

Internal exposure caps, venue-specific throughput, and balance thresholds

Whitelisting is not static. A venue may be active for one market and blocked for another if local conditions differ.

circle-exclamation

2) Institutional-grade filtering

For each candidate trade, BASIS evaluates whether the opportunity is executable under live constraints. This evaluation is performed through defined control layers that align with BASIS operational discipline and its certified information security and service management processes.

  • Order book depth and replenishment quality

  • Spread stability over short intervals

  • Realized slippage expectation

  • Fee impact after routing

  • Cross-venue price consistency

This filtering is what separates theoretical spread from executable structural alpha capture.

3) Blacklisting and dynamic exclusion

A venue can be dynamically excluded when one or more of the following conditions appear:

  • withdrawals are delayed, limited, or halted

  • abnormal pricing or persistent dislocation is detected

  • API instability or sequencing errors appear

  • order acknowledgements become unreliable

  • counterparty risk score deteriorates beyond threshold

  • settlement paths become congested or unavailable

Exclusion can occur automatically through system rules or manually through operator intervention. Re-entry requires fresh validation, not simple timeout expiry.

4) Liquidity fragmentation policy

Because counterparty risk is real, BASIS follows a liquidity fragmentation policy. Capital is intentionally distributed across multiple venues and settlement paths rather than concentrated in a single location.

Policy rule
Objective

Multi-venue distribution

Reduce single-point counterparty exposure

Concentration caps

Prevent excessive dependence on one venue

Pre-positioned balances

Reduce transfer delay during active execution windows

Transfer-path diversity

Preserve optionality if a route degrades

Protocol exposure limits

Bound smart contract and bridge-related risk

Where feasible, BASIS distributes capital across multiple venues and routes. This increases operational complexity, but materially improves survivability during venue-specific incidents.

5) Execution infrastructure and control framework

BASIS uses BHLE, a proprietary routing and execution infrastructure designed for deterministic behavior under fragmented market conditions.

Capability
Standard

Decision latency

Sub-50μs

Throughput

100K+ OPS

Routing model

Proprietary multi-venue routing infrastructure

Control model

Deterministic execution, math constraints, state machine risk controls

Execution flow is constrained by explicit system gates:

Key properties of the control framework:

  • deterministic order handling under predefined constraints

  • bounded exposure transitions through state-machine logic

  • hard rejection of routes that violate capital or reliability thresholds

  • continuous reconciliation between venue balances, internal ledgers, and strategy state

These controls are designed to prioritize execution precision and capital preservation over nominal opportunity count.

6) Incident response and user communication 🔒

When a venue or protocol incident occurs, BASIS applies a formal response process. This process is supported by an operating framework aligned with the company’s active ISO/IEC 27001:2022 and ISO/IEC 20000-1:2018 certifications.

  1. Detect and classify the event Identify whether the issue is related to market quality, API behavior, withdrawals, settlement, or counterparty risk.

  2. Isolate affected routes Disable impacted venues, markets, or transfer paths.

  3. Trigger protective state transitions Apply the appropriate system mode, including BSCB → DMM where required by internal risk logic.

  4. Communicate externally Publish a timestamped notice describing scope, user impact, and current system status.

  5. Resume only after verification Restart routing only after stability checks, reconciliation, and root-cause review are complete.

circle-info

Public documentation, dashboards, and status notices must match actual system behavior. Consistency between disclosed state and live state is a core trust requirement. BASIS treats this as part of an institutional-grade control environment with internationally verifiable management systems.

7) Practical implication for users

Venue fragmentation and dynamic exclusion may reduce short-term opportunity count, but they improve execution reliability and loss containment under stress. This is consistent with the BASIS operating model:

  • deterministic execution instead of discretionary intervention

  • constrained state transitions instead of ad hoc overrides

  • survivability first, then optimization

In practice, this means BASIS is designed to operate as an institutional-grade, internationally certified, and trustworthy platform where execution discipline, operational resilience, and externally verifiable control standards matter as much as raw opportunity capture.


Next: read Metrics & Reporting to understand how BASIS defines yield, APY, and performance figures.

Last updated