"Phylax Credible Layer assertions backtesting. Runs assertion backtests against historical transactions. Use when validating phylax/credible layer assertions on real chain data or known exploits."
Backtesting Assertions
Use Credible Layer backtesting to replay historical transactions with assertions enabled.
Meta-Cognitive Protocol
Adopt the role of a Meta-Cognitive Reasoning Expert.
For every complex problem:
1.DECOMPOSE: Break into sub-problems
2.SOLVE: Address each with explicit confidence (0.0-1.0)
3.VERIFY: Check logic, facts, completeness, bias
4.SYNTHESIZE: Combine using weighted confidence
5.REFLECT: If confidence <0.8, identify weakness and retry
For simple questions, skip to direct answer.
Always output:
∙Clear answer
∙Confidence level
∙Key caveats
When to Use
- You want to validate assertions against real mainnet transactions.
- You are testing a known exploit block or incident transaction.
- You need to confirm triggers match real protocol entrypoints.
When NOT to Use
- You only need unit or fuzz tests. Use
testing-assertions. - You are designing invariants or triggers. Use
designing-assertions. - You only need Solidity implementation details. Use
implementing-assertions.
Quick Start
- Place backtest files in
assertions/test/backtest/(e.g.,VaultAssertion.backtest.t.sol). - Create a test that inherits
CredibleTestWithBacktesting. - Configure
BacktestingConfigwith target contract, block range, and assertion selector. - Call
executeBacktestand assert failures are zero. - Run with the backtest profile:
FOUNDRY_PROFILE=assertions-backtest pcl test(or use--ffiflag).
See pcl-assertion-workflow for the full profile configuration with ffi = true.
Workflow
- Pick a target contract (the assertion adopter address).
- Choose
endBlockandblockRange. - Verify RPC env vars; skip or fallback when missing.
- Prefer
useTraceFilter = trueto detect internal calls; fall back to block scanning if your RPC lackstrace_filter. - For large ranges, use a paid RPC to avoid rate limits;
useTraceFilterreduces calls. - Use
forkByTxHash = trueonly when debugging state-dependent failures. - Use
blockRange = 1for a specific known exploit tx. - If your invariant is keyed by
msg.data(timelocks), rebuild calldata from selector + args; call inputs exclude the selector. - Interpret results:
PASS,NEEDS_REVIEW(selector mismatch or replay failure),ASSERTION_FAIL(often false positives or gas),UNKNOWN_ERROR(RPC or unexpected). - If many
NEEDS_REVIEW, the selector/target does not match or you needforkByTxHash.
Rationalizations to Reject
- "We only need unit tests." Backtesting catches real-world call patterns.
- "Trace filter is optional." Without it you miss internal calls.
- "forkByTxHash everywhere." It is slow and RPC-heavy; use it for debugging only.
- "RPC isn't needed." Backtesting requires a working RPC and FFI.
References
You Might Also Like
Related Skills

fix
Use when you have lint errors, formatting issues, or before committing code to ensure it passes CI.
facebook
frontend-testing
Generate Vitest + React Testing Library tests for Dify frontend components, hooks, and utilities. Triggers on testing, spec files, coverage, Vitest, RTL, unit tests, integration tests, or write/review test requests.
langgenius
frontend-code-review
Trigger when the user requests a review of frontend files (e.g., `.tsx`, `.ts`, `.js`). Support both pending-change reviews and focused file reviews while applying the checklist rules.
langgenius
code-reviewer
Use this skill to review code. It supports both local changes (staged or working tree) and remote Pull Requests (by ID or URL). It focuses on correctness, maintainability, and adherence to project standards.
google-gemini
session-logs
Search and analyze your own session logs (older/parent conversations) using jq.
moltbot

