Architecture
Modular Architecture for Secure Vault Operations
Vault Architecture
Nest vaults are built as a set of separate components to reduce risk and clearly divide responsibilities. Deposits, asset custody, accounting (NAV tracking), and operational management are handled by different contracts rather than being combined into a single system.
Assets deposited into a Nest vault are held in a dedicated Nest vault contract. This contract is responsible for holding assets and executing transactions, but it does not decide what actions should be taken.
Operational decisions are handled by a central Vault Manager, which acts as the control hub for the system. All vault operations—including deposits into external protocols, redemptions, bridging, or claims—are routed through the Vault Manager. Before executing any action, the manager verifies permissions and enforces safety rules such as approved vaults, supported assets, transaction limits, and daily volume caps.
When a deposit or other operation needs to interact with an external protocol, the system uses small adapter components called modules. Each module knows how to interact with a specific protocol and prepares the transaction required for that integration. This modular design allows new protocols to be added without changing the core management system.
The architecture also supports automated and multi-step workflows, enabling sequences such as claiming assets, bridging them to another chain, and depositing them into another strategy to be executed as a single coordinated operation. Scheduled operations allow recurring actions or delayed settlements to be handled automatically.
Finally, a cross-chain execution layer allows vault operations on other networks to be initiated from the same management system while maintaining the same security checks and policies.
By separating asset custody, accounting, and operational control, the Nest vault architecture reduces risk, simplifies upgrades, and allows vault strategies to safely interact with multiple financial protocols and chains.
Last updated