mapping-invariants

mapping-invariants

Phylax Credible Layer assertions invariant mapping. Use when starting a protocol to map invariants before writing phylax/credible layer assertions or tests.

0スター
0フォーク
更新日 1/21/2026
SKILL.md
readonlyread-only
name
mapping-invariants
description

"Phylax Credible Layer assertions invariant mapping. Use when starting a protocol to map invariants before writing phylax/credible layer assertions or tests."

Mapping Invariants

Start here before designing or implementing assertions. This skill defines the invariant‑mapping workflow and hands off to the other skills.

Meta-Cognitive Protocol

Adopt the role of a Meta-Cognitive Reasoning Expert.

For every complex problem:
1.DECOMPOSE: Break into sub-problems
2.SOLVE: Address each with explicit confidence (0.0-1.0)
3.VERIFY: Check logic, facts, completeness, bias
4.SYNTHESIZE: Combine using weighted confidence
5.REFLECT: If confidence <0.8, identify weakness and retry
For simple questions, skip to direct answer.

Always output:
∙Clear answer
∙Confidence level
∙Key caveats

When to Use

  • Starting a new protocol assertion effort.
  • You need a structured method to discover invariants.
  • You want the step‑by‑step path before designing-assertions and implementing-assertions.

When NOT to Use

  • You already have a vetted invariant list.
  • You only need implementation details. Use implementing-assertions.
  • You only need testing guidance. Use testing-assertions.

Quick Start

  1. Build the protocol map (assets, roles, entrypoints, state, routers).
  2. Enumerate invariants by category (access control, accounting, pricing, solvency, limits, modes).
  3. Rank invariants by impact and likelihood (losses, control‑plane, liveness).
  4. Identify exceptions and acceptable violations.
  5. Pick data sources (state, logs, call inputs, slots).
  6. Choose enforcement location (chokepoint vs per‑contract).
  7. Produce the invariant matrix and trigger map.
  8. Hand off to designing-assertionsimplementing-assertionstesting-assertions.

Skill Map

  • designing-assertions: turn the invariant map into triggerable invariants and edge cases.
  • implementing-assertions: write Solidity assertions and cheatcode logic.
  • testing-assertions: build PCL/forge tests for assertions.
  • backtesting-assertions: replay mainnet txs to validate triggers.
  • pcl-assertion-workflow: set up PCL project, store/submit/deploy.
  • assertion-troubleshooting: diagnose non-triggering or failing assertions.

Workflow

  • Protocol map: read docs/specs/audits/tests; list contracts, assets, roles, and critical entrypoints.
  • Invariant inventory: express “states that must never occur” and rank by impact.
  • Spec classification: split global invariants vs action-specific postconditions (GPOST/HSPOST).
  • Exception audit: capture legitimate exceptions (bad debt, emergency modes, timelocks).
  • Observation plan: decide which values/events you will read to validate each invariant.
  • Trigger plan: select the narrowest trigger that guarantees coverage.
  • Coverage check: confirm each invariant is reachable from at least one trigger and entrypoint.
  • Feasibility check: internal calls are not traced; call inputs are ordered per selector; modified mapping keys must be derived from call inputs or logs; if an invariant depends on msg.data, plan to reconstruct it from selector + args because call inputs exclude the selector.

Heuristics

  • Start with loss‑bearing invariants: solvency, accounting integrity, and upgrade control.
  • Prefer cross‑function invariants over per‑function reverts already in code.
  • If you cannot observe an invariant reliably, rephrase it to observable signals.
  • For lending protocols, classify actions by health‑factor impact and list allowed transitions.
  • If an invariant depends on intermediate call frames, plan to use forkPreCall/forkPostCall from the start.

Deliverables

  • Invariant matrix (definition, source, exceptions, priority).
  • Trigger map (selector/slot/balance mapping).
  • Data source list (storage layout, logs, call inputs).
  • Test plan (positive/negative, fuzz, backtest candidates).

Rationalizations to Reject

  • “We can skip invariant mapping and write code directly.”
  • “We only need owner checks.” (Protocols usually fail on accounting and pricing.)
  • “One broad assertion is enough.” (Gas and coverage risks.)
  • “We’ll add exceptions later.” (Most false positives come from ignored exceptions.)

References

You Might Also Like

Related Skills

summarize

summarize

179Kresearch

Summarize or extract text/transcripts from URLs, podcasts, and local files (great fallback for “transcribe this YouTube/video”).

openclaw avataropenclaw
入手
prompt-lookup

prompt-lookup

143Kresearch

Activates when the user asks about AI prompts, needs prompt templates, wants to search for prompts, or mentions prompts.chat. Use for discovering, retrieving, and improving prompts.

skill-lookup

skill-lookup

143Kresearch

Activates when the user asks about Agent Skills, wants to find reusable AI capabilities, needs to install skills, or mentions skills for Claude. Use for discovering, retrieving, and installing skills.

sherpa-onnx-tts

sherpa-onnx-tts

88Kresearch

Local text-to-speech via sherpa-onnx (offline, no cloud)

moltbot avatarmoltbot
入手
openai-whisper

openai-whisper

87Kresearch

Local speech-to-text with the Whisper CLI (no API key).

moltbot avatarmoltbot
入手
seo-review

seo-review

66Kresearch

Perform a focused SEO audit on JavaScript concept pages to maximize search visibility, featured snippet optimization, and ranking potential

leonardomso avatarleonardomso
入手