Core Modules
Vortum's architecture is built around modular components that handle specific responsibilities.
System Modes
The platform operates in different modes depending on operational status:
| Mode | Description |
|---|---|
| Normal | Full trading operations |
| Maintenance | System temporarily offline |
| Cancel Only | Users can only cancel orders |
| Post Only | Only maker (limit) orders accepted |
Account Management
Handles user accounts, profiles, and authentication.
Features:
- User registration with optional referral codes
- Profile customization (username, preferences)
- Subaccount support (up to 255 per user)
- Multi-principal linking (Internet Identity + wallet signatures)
- Address book for trusted withdrawal addresses
Wallet System
Manages multi-chain wallet operations including deposits, withdrawals, and balance tracking.
Key Features:
| Feature | Description |
|---|---|
| Chain Fusion | Bridgeless multi-chain deposits via ICP |
| HD Wallets | Unique deposit addresses per user |
| Threshold Cryptography | Distributed key management |
| Balance Tracking | Available vs locked funds |
Asset Registry
Manages supported assets and token metadata.
Supported Asset Types:
- Native blockchain assets (BTC, SOL, ICP)
- Wrapped assets (ckBTC, ckETH)
- ICRC-1/ICRC-2 tokens
- SPL tokens (Solana)
Trading Engine
High-performance order matching with sub-microsecond execution.
Order Flow:
Supported Features:
| Feature | Description |
|---|---|
| Market Orders | Immediate execution at best price |
| Limit Orders | Execute at specified price or better |
| Time-in-Force | GTC, GTD, IOC, FOK |
| Self-Trade Prevention | Prevent trading against yourself |
| Slippage Protection | Maximum price deviation tolerance |
Settlement & Audit
Complete audit trails for all balance changes:
| Category | Events |
|---|---|
| Transfers | Deposits, Withdrawals |
| Trading | Order fills, Cancellations |
| Fees | Maker fees, Taker fees |
Rate Limiting
Protection against abuse with tiered access:
| Tier | Rate Limit |
|---|---|
| Anonymous | 10 req/min |
| Registered | 100 req/min |
| Verified | 1000 req/min |
Two-Factor Authentication
Secure TOTP-based 2FA using a Merkle tree commitment scheme:
- Client generates TOTP secret locally
- Server stores only a Merkle root (never the secret)
- Verification via Merkle proofs
- Encrypted backup for recovery