Architecture
Last updated
Last updated
Scoped permissions can be delegated to a human manager, who executes predefined actions on behalf of vault depositors using their own externally owned account (EOA). The manager never directly accesses funds and is limited to permitted operations enforced by the Zodiac Roles Modifier.
Scoped execution permissions can be delegated to automation scripts or AI agents. These can be deployed either as:
On-chain contracts, or
Off-chain scripts, including machine learning or AI models.
rethink.finance provides a secure execution environment with minimal trust assumptions—ensuring that scripts, whether on- or off-chain, can only perform actions explicitly authorized through the Zodiac Roles Modifier. This enables safe, autonomous strategy execution without compromising fund security.
Admin Contract settles the deposit and redemption requests upon updated NAV calculation, automates fee distribution, and optionally enables a whitelist.
Management Fee
Performance Fee
Deposit Fee
Redemption Fee
Fee recipient address can be defined for every fee type.
NAV Calculator Contract calculates the net asset value (NAV) of all types of underlying positions:
NAV Liquid Spot
NAV Illiquid
NAV DeFi Composable
It requires an approved NAV calculation method for each position.
Governance token
Voting delay
Voting period
Proposal threshold
Quorum (%)
Manager address
Target address
Associated permissions
Responsible for deploying all relevant smart contracts that together enable vaults (Admin Contract, NAV Calculator Contract, , , and ).
The (aka. Smart Account) is the most trusted custody standard in DeFi and secures all underlying positions of a vault. Execution of operations occurs via delegated permissions using Zodiac Roles Modifier. Ownership of the Safe is held by the vault's governance contract, and transactions may be executed directly through governance.
Using primitives for on-chain governance for a given vault. The following parameters are governed through governance tokens.
The enables to define roles with specific permissions and assign them to the Manager. These roles can independently interact with approved addresses, functions, and variables they've been given access to, bypassing default execution through governance.