T3RRA
How It Works

From mandate to secondary trade, on one set of rails.

Every T3RRA issuance runs through the same seven-stage flow. At each stage, a specific protocol surface does the work — and leaves a verifiable trace.

The Flow

Seven stages. Four surfaces. One policy.

Mandate

Deal Desk
What happens

Asset owner engages T3RRA. Scope, jurisdictions, and target raise are fixed.

What the issuer sees

A signed mandate agreement and a named desk lead.

What the investor sees

Nothing yet — the deal isn't public.

Protocol Surfaces

Four surfaces do the work.

Each one is documented, versioned, and touchable.

L3RS-1 the asset standard.

Versioned token standard (v1.0.0 Profile F) with a total ComplianceModule. Rules are enforced by the token, not a wrapper around it.

Open the builder

PG[Σ] policy-gated signing.

Threshold signing scheme where the PolicyHash is bound into the Fiat–Shamir transcript. A transfer is valid only if the policy the signer committed to is the policy that gets enforced.

Run a transfer

Flow cross-chain routing.

Route admissibility predicate J ∧ T ∧ ID ∧ X plus a (5,9) bridge committee certificate. Replaces ad-hoc lock-and-mint with something capital markets can underwrite.

Route a trade

Agent Mesh six-class operational layer.

Six agent classes (Onboarding, Tokenization, Marketplace, Trade, Liquidity, Treasury/Compliance) proposing corporate actions inside the PG[Σ] envelope. Policy still decides.

Run a corporate action
Worked Example

A transfer, traced.

Here's one real operation: an investor sells a $2M position in a commercial real estate tranche to a buyer on a different chain. Seven steps, four surfaces, one policy.

  1. 1
    Buyer sends a transfer request.Flow

    Source chain: Ethereum. Destination: Polygon. Amount: 2,000,000 units.

  2. 2
    Flow evaluates J ∧ T ∧ ID ∧ X.Flow

    Jurisdiction (buyer and seller both in eligible jurisdictions), Time (outside the lockup window), Identity (both KYC-verified under the issuance's investor class), eXception (no sanctions hit, no issuer block). All four predicates return true.

  3. 3
    Flow constructs a route.Flow

    A single cross-chain leg with a (5,9) bridge committee certificate. The route certificate carries the PolicyHash.

  4. 4
    Destination chain re-runs the ComplianceModule.L3RS-1

    Same PolicyHash. Same answer. The rule travels with the asset.

  5. 5
    PG[Σ] co-signs.PG[Σ]

    The signing ceremony binds the PolicyHash into the Fiat–Shamir transcript. If a different policy had been substituted, the signature wouldn't verify.

  6. 6
    Settlement executes atomically.Flow + L3RS-1

    Seller's position is burned on Ethereum, buyer's position is minted on Polygon. The cap table updates on both chains in a single verifiable step.

  7. 7
    Agent Mesh records the event.Agent Mesh

    The Trade and Treasury/Compliance agents emit the reporting artifact — FATF Travel Rule fields are already present because they were enforced at step 2.

Illustrative — production behavior is governed by Cryptographic Spec v1.0 rev B §4 (PG[Σ]) and Flow v1.1 §3 (route admissibility).

Responsibilities

Who does what.

StageT3RRAIssuerInvestor
MandateStructures the engagementSigns mandate
StructuringRuns the deal deskProvides asset, signs docs
L3RS-1 configCompiles ComplianceModuleReviews & approves policy
IssuanceRuns the mint under PG[Σ]Authorizes issuanceSubscribes
Primary settlementVerifies eligibility, settlesWatches primary bookFunds, receives tokens
Secondary tradingOperates Flow & policy gatesObserves cap tableTrades across chains
ServicingRuns Agent Mesh under PG[Σ]Approves exceptionsReceives distributions
AI Architecture

Where the AI sits.

T3RRA runs a six-class Agent Mesh — Onboarding, Tokenization, Marketplace, Trade, Liquidity, and Treasury/Compliance. Inside each class, 14 named AI capabilities (documented in Flow §15) handle the operational work: drafting, reconciliation, reporting, anomaly detection, routing proposals.

Every agent sits inside the PG[Σ] envelope, not outside it. Agents propose. Policy disposes. A ComplianceModule refusal is a refusal — the mesh cannot route around it, and exceptions always surface a human in the loop. This is the opposite of "AI trading bots": the cryptography is the constraint, and the agents operate within it.

Agents propose. Policy disposes.

See it work, or put it to work.