Skip to content

Centurion Protocol Handbook

This handbook is operational and technical

This documentation is the protocol operations manual for Centurion Phase-1. It is not a marketing document.

What Centurion Is

Centurion Phase-1 is a validator custody and accounting system built around:

  • permissioned validator admission at deposit time
  • per-validator vault custody
  • risk observation and claim gating
  • reserve-backed smoothing and settlement logic
  • governed upgradeability through an onchain timelocked governor

The system is designed to preserve principal protection constraints while still allowing controlled upgrades when governance approves known-good implementations.

Purpose Of This Handbook

This handbook provides a single operational and engineering reference so teams do not need to carry the entire protocol mentally during:

  • launch
  • day-to-day operations
  • incident response
  • governance actions
  • audits and verification reviews

Intended Readers

  • owner and governance signers
  • protocol engineers
  • operations personnel
  • security reviewers and auditors
  • backend and oracle engineers
  • new technical employees

Protocol Mental Model

Centurion is easiest to reason about when treated as a chain of authority and state gates:

  1. CenturionUpgradeGovernor decides which implementations are currently approved.
  2. DepositContractCTN decides who may enter and whether custody/readiness constraints are satisfied.
  3. CenturionVaultFactory creates and registers validator-specific custody containers.
  4. CenturionWithdrawalVault holds validator-linked execution-layer funds and enforces controller-only actions.
  5. CenturionEconomicController classifies observations, receipts, deficits, reserve exposure, and settlement transitions.
  6. CenturionClaimGatekeeper decides claim mode, claim state, and claim-authorization limits.
  7. Backend and oracle systems provide finalized observations and receipt inputs that drive model state.
  8. Multisigs and governance signers control privileged paths that can alter live protocol behavior.

Main Layers

  • Governance and upgrade layer: CenturionUpgradeGovernor, transparent proxies, beacon, policy assertions.
  • Admission and custody layer: DepositContractCTN, CenturionVaultFactory, CenturionWithdrawalVault.
  • Economic and claim layer: CenturionEconomicController, CenturionClaimGatekeeper, accounting libraries.
  • Operational layer: offchain observers, receipt submission, multisig policy, incident response.

Read This Next