SettleMint
ArchitectureOverview

Quality attributes for regulated operations

Client-facing quality-attribute view of DALP architecture, covering security, reliability, operability, data consistency, performance constraints, and audit evidence without making SLA or legal claims.

DALP's quality model covers controlled execution, durable evidence, and clear operating state. This page maps DALP behaviour to the main quality questions for regulated operations.

The platform separates request control, durable execution, on-chain enforcement, and indexed visibility. The split shows where DALP accepts requests, submits transactions, enforces asset rules, and makes results visible. SLA terms, audit certifications, legal obligations, and privacy guarantees belong in the relevant contract and assurance material.

Quality map

Use this table as the first-pass review map. Each row names the quality attribute, the DALP mechanism behind it, and the client review question it supports.

AttributeDALP mechanismClient review question
SecurityAuthentication, role checks, wallet verification, custody integration, contract enforcementWhether access, signing, and asset-state controls are layered
ReliabilityDurable Execution Engine-backed durable workflows, transaction status tracking, retry and reconciliation pathsWhether long-running blockchain actions can be inspected and resumed
ConsistencyChain events indexed into PostgreSQL-backed read modelsWhere the platform reads from and how current state becomes visible
OperabilityHealth checks, observability hooks, failure-mode documentation, explicit component ownershipWhich teams need to monitor and recover each layer
PerformanceAPI/database reads separated from block-time-bound writesWhich operations are instant, which are chain-bound, and which are queued
EvidenceAPI records, workflow state, transaction hashes, contract events, indexed viewsWhich artifacts support operational review and audit preparation

Control layers

Rendering diagram...

Each layer has a different job. A request can be authenticated but still fail authorization. A workflow can be accepted but wait for custody approval. A transaction can be submitted but not yet indexed. A dashboard can show the last indexed state while the chain is still being processed.

For support and audit review, start with the layer that owns the question. Authentication and authorization questions belong at the request layer. Signing delays and transaction retries belong at the execution layer. Compliance rule outcomes belong at the asset-control layer. Visibility and reconciliation questions belong at the indexed-read layer.

Security qualities

ConcernDALP architecture responseClient responsibility
User accessAuthenticated console and API routes, session handling, API keys, and role-aware middlewareIdentity-provider policy, user lifecycle controls, administrator assignment
Transaction authorizationWallet verification and role checks before blockchain writesRole governance, segregation of duties, operating procedures
SigningSigner abstraction supports local development signing and external custody-provider pathsCustody-provider setup, approval policy, key ceremony, signer administration
On-chain complianceSMART Protocol contracts enforce configured identity and compliance rules before state changesSelecting, configuring, and reviewing the required compliance modules
Public-chain exposurePublic-chain privacy is treated as a separate architecture concern, not hidden behind application access permissionsDeciding what data belongs on-chain and which EVM network is appropriate

Reliability qualities

DALP treats blockchain writes as stateful workflows rather than single synchronous calls. The transaction-status path reads the platform transaction record and resolves receipts when available. When a completed transaction has a block number, the route checks whether the indexer has reached that block. Batch workflows can also expose the transaction hashes associated with the workflow state.

ScenarioArchitectural behavior
Multi-step asset creationRuns as a durable workflow so deployment, configuration, role grants, claims, minting, and unpause steps can be tracked
Signer or custody delayTransaction status remains visible while approval or signing is pending
RPC or broadcast failureThe transaction path can retry or surface a failed state depending on the failure type
Service restart during executionDurable workflow state is journaled outside the application process
Chain visibility lagOperator reads update after the indexer sees and processes chain events
Stuck or uncertain transaction statusReconciliation and status pages are used to distinguish pre-broadcast, broadcast, confirmation, and indexing states

Consistency model

Data viewSource of truthConsistency expectation
Token balance and asset stateEVM contract stateFinal after chain inclusion and confirmation policy
Operator dashboard stateIndexed chain events plus platform database recordsFollows indexer freshness and platform records
Transaction statusPlatform transaction records, durable workflow state, chain receipts, and indexed eventsMoves through accepted, signing, broadcast, confirming, indexed, failed, or canceled states
User and organization dataPostgreSQL application tablesDatabase-transaction consistency
Audit and action evidencePlatform records plus chain transaction and event evidenceSplit across off-chain records and on-chain artifacts

The important client decision is not whether every view is instantaneous. The review question is which source is authoritative for each decision. If a transaction is complete on-chain but absent from an operator view, treat the chain receipt and indexed read model as separate evidence surfaces until the indexer catches up.

Performance qualities

Operation typeUsual boundOperator implication
Console navigationAPI and database read performanceReads are designed for operator workflows and reporting, not direct chain scraping
API readsDatabase query shape and indexed data freshnessFast reads depend on maintained indexes and current indexed state
Blockchain writesWorkflow queueing, signer approval, gas, block time, confirmations, indexer catch-upOperators should expect visible progress states rather than a single synchronous response
Asset deploymentMultiple contract transactions and post-deployment configurationTreated as an operational workflow, not a one-click instant action
Large historical syncRPC limits, block-range partitioning, database write throughputOperational planning should include indexer catch-up time after backfills or network disruption

Evidence matrix

Evidence is distributed across off-chain platform records and on-chain artifacts. Use the matrix to decide which artifact answers each review question before exporting records or escalating a support case.

Review questionEvidence location
Who submitted the action?Authenticated API or console records, user/session metadata, audit records
Was the action accepted for execution?Transaction request and durable workflow records
Was custody approval required?Signer or custody-provider status plus DALP transaction status
Did the transaction reach the chain?Transaction hash and EVM receipt
Which contract rule applied?Contract call path, events, compliance module configuration, indexed state
What can an operator see now?Console/API read model after indexing

Limits

LimitWhy it matters
No SLA stated hereArchitecture patterns do not define contractual availability, support response, or recovery-time terms
No legal compliance guaranteeTechnical controls must be mapped to the client's legal and regulatory obligations
No hidden privacy layerOn-chain data visibility depends on the selected EVM network and the data written to contracts/events
No instant finality claimBlockchain writes remain subject to transaction inclusion, confirmation policy, and indexer freshness
No provider availability claimCustody, RPC, object storage, secrets, and observability providers remain part of the full operating model

Where to go next

On this page