Documentation
Welcome to the Threeium technical documentation. This guide covers everything you need to understand, integrate, and build with Threeium—a Solana-native infrastructure system that unifies execution routing and liquidity management.
What is Threeium?
Threeium is a Solana-native infrastructure system that unifies execution routing and liquidity management to generate sustainable, real yield. Unlike traditional approaches that treat execution and liquidity as separate concerns, Threeium recognizes that they are fundamentally interconnected—optimal execution requires dynamic liquidity, and effective liquidity provisioning depends on execution patterns.
The system is designed for protocols, DAOs, and institutional participants who need sophisticated execution capabilities combined with intelligent liquidity management, all while maintaining full transparency and non-custodial security.
Why Threeium?
Real Yield
Generate verifiable returns through execution efficiency, liquidity fees, and protocol incentives—no speculation.
Fully Transparent
Every transaction, fee, and yield source is recorded on-chain with complete audit trails.
Non-Custodial
You maintain full control of your assets through smart contracts. No centralized custody.
Solana-Native
Built specifically for Solana's parallel execution and low-latency architecture.
Design Goals
Threeium was designed with specific principles to ensure reliability, transparency, and sustainability:
- Sustainable Yield: Generate real returns through execution efficiency and liquidity optimization, not speculation or unsustainable incentives.
- Composability: Integrate seamlessly with existing Solana protocols, DEXs, and infrastructure without requiring custom modifications.
- Transparency: All logic, parameters, and yield sources are verifiable on-chain. No black boxes or opaque processes.
- Solana-Native: Built specifically for Solana's unique capabilities and performance characteristics, not a port from EVM.
- Risk Management: Built-in guardrails and circuit breakers to protect against market anomalies and edge cases.
Core Concepts
Execution vs Liquidity vs Yield
Execution refers to how orders are routed, split, and filled across different venues and strategies. Liquidity is the capital positioned to facilitate trades and capture fees. Yield is the return generated from both execution efficiency (better prices, lower slippage) and liquidity provisioning (fees, rewards).
Threeium's insight is that these three components form a feedback loop: better execution requires responsive liquidity, effective liquidity needs to understand execution patterns, and both contribute to sustainable yield generation.
The Interconnection
Living Liquidity
Traditional liquidity provisioning is static—positions are set and only adjusted manually. "Living Liquidity" refers to Threeium's approach where liquidity positions adapt automatically based on:
- Market conditions (volatility, volume, spreads)
- Execution demand patterns from integrated protocols
- Opportunity identification (fee capture, arbitrage)
- Risk constraints and parameter boundaries
// Liquidity adapts to market conditions
interface LiquidityPosition {
asset: string;
rangeWidth: number; // Adjusts based on volatility
concentration: number; // Focuses capital where needed
rebalanceFrequency: number; // Increases during active markets
}
// Example: High volatility → wider ranges, lower concentration
// Low volatility → tighter ranges, higher concentrationYield Integrity
Yield integrity means every basis point of return can be traced to its source and verified on-chain. The Yield Engine maintains a complete audit trail of:
- Trading fees earned from liquidity provision
- Execution efficiency gains (price improvement vs benchmark)
- Arbitrage and MEV capture where applicable
- Protocol incentives and rewards
- All costs (transaction fees, impermanent loss, gas)
Architecture Overview
Threeium consists of four primary modules that work together to provide execution, liquidity, and yield optimization:
Execution Engine
Smart order routing across venues with real-time optimization
Liquidity Engine
Dynamic liquidity positioning that adapts to market conditions
Yield Engine
Transparent yield tracking and attribution from all sources
Telemetry & Observability
On-chain metrics, monitoring, and performance analytics
Execution Engine
The Execution Engine is responsible for intelligent order routing and execution. It analyzes market conditions, liquidity availability, and execution constraints to determine optimal routing strategies.
Key Features
- Smart Order Routing: Split orders across multiple venues for best execution
- Real-Time Adaptation: Adjust routing mid-execution based on fill rates
- Slippage Protection: Enforce maximum slippage bounds with automatic rejection
- TWAP/VWAP: Time or volume-weighted execution strategies for large orders
Execution Flow Example
// Submit an execution request
const executionRequest = {
asset: 'SOL/USDC',
side: 'buy',
amount: 10000, // $10k worth
constraints: {
maxSlippage: 0.005, // 0.5% max slippage
minFillRate: 0.95, // At least 95% filled
timeLimit: 60, // Complete within 60s
strategy: 'adaptive' // Let system optimize
}
};
// Engine plans the execution
const plan = await executionEngine.planExecution(executionRequest);
// Example plan output:
// {
// routes: [
// { venue: 'Jupiter', percentage: 60, expectedSlippage: 0.002 },
// { venue: 'Orca', percentage: 30, expectedSlippage: 0.003 },
// { venue: 'Internal Liquidity', percentage: 10, expectedSlippage: 0 }
// ],
// estimatedExecutionTime: 8,
// estimatedCost: 0.25 // SOL
// }
// Execute the plan
const result = await executionEngine.execute(plan);
// Result includes:
// - Actual fill price vs expected
// - Total slippage incurred
// - Execution time
// - Transaction signatures for verificationLiquidity Engine
The Liquidity Engine manages dynamic liquidity positioning across venues. It monitors market conditions, execution patterns, and opportunity signals to continuously adjust liquidity positions for optimal capital efficiency and fee capture.
Liquidity Strategies
Adaptive Bands
Liquidity range width adjusts based on volatility. Tight ranges in calm markets, wider ranges in volatile conditions.
Execution-Aware Positioning
Proactively position liquidity where execution demand is expected based on historical patterns and incoming orders.
Fee Optimization
Concentrate capital in high-fee opportunities while maintaining minimum coverage across the curve.
Configuration Example
// Configure liquidity management
await liquidityEngine.configure({
asset: 'SOL/USDC',
strategy: 'adaptive-bands',
capital: 100000, // $100k allocated
parameters: {
baseWidth: 0.02, // 2% base range width
volatilityMultiplier: 1.5, // Expand range 1.5x during volatility
rebalanceThreshold: 0.01, // Rebalance when price moves 1%
minLiquidity: 0.2, // Keep 20% minimum in range
feeTarget: 0.0005 // Target 5bps per trade
},
riskLimits: {
maxImpermanentLoss: 0.05, // Max 5% IL before adjustment
maxDrawdown: 0.1 // Max 10% drawdown trigger pause
}
});
// The engine handles:
// - Initial position creation
// - Continuous monitoring and rebalancing
// - Fee collection and reinvestment
// - Risk limit enforcementYield Engine
The Yield Engine tracks all sources of returns, calculates net yields after costs, and provides transparent accounting. Every basis point of yield can be traced to its on-chain source.
Yield Sources
Liquidity Fees
Trading fees earned from LP positions
Execution Savings
Price improvement vs market benchmarks
Protocol Rewards
Incentives from integrated protocols
MEV Capture
Arbitrage and value extraction opportunities
Yield Calculation
// Yield is calculated continuously
interface YieldBreakdown {
liquidityFees: number; // Fees from LP positions
executionSavings: number; // Price improvement
protocolRewards: number; // External incentives
mevCapture: number; // Arbitrage profits
totalRevenue: number;
// Costs deducted
transactionCosts: number; // Gas fees
impermanentLoss: number; // IL from LP positions
slippage: number; // Execution slippage
totalCosts: number;
netYield: number; // Revenue - Costs
apy: number; // Annualized percentage yield
}
// Query yield for a position
const yield = await yieldEngine.getYieldBreakdown({
position: 'SOL-USDC-LP-001',
timeframe: '30d'
});
// Everything is verifiable on-chain
console.log(`Net Yield: ${yield.netYield} USDC`);
console.log(`APY: ${yield.apy.toFixed(2)}%`);
console.log(`Sources: ${JSON.stringify(yield, null, 2)}`);Telemetry & Observability
The Telemetry module records comprehensive metrics and events on-chain, providing full visibility into system operations and performance:
Metrics Tracked
- Execution metrics: fill rates, slippage, timing, routing decisions
- Liquidity performance: fees earned, impermanent loss, position health
- Yield attribution: source breakdown, cost analysis, net returns
- System health: latency, error rates, capacity utilization
// Query telemetry data
const metrics = await telemetry.query({
startTime: Date.now() - 86400000, // Last 24h
endTime: Date.now(),
metrics: [
'execution.fill_rate',
'execution.avg_slippage',
'liquidity.fees_earned',
'yield.net_apy'
]
});
// All data is timestamped and on-chain
metrics.forEach(metric => {
console.log(`${metric.name}: ${metric.value} at ${metric.timestamp}`);
});Risk Controls & Guardrails
Built-in risk management ensures safe operation under all market conditions:
Exposure Limits
Maximum position sizes per asset and venue to prevent concentration risk
maxPositionSize: {
perAsset: 1000000, // $1M per asset
perVenue: 500000, // $500k per venue
total: 5000000 // $5M total exposure
}Slippage Bounds
Automatic rejection of executions that exceed slippage tolerance
slippageProtection: {
maxSlippage: 0.005, // 0.5% hard limit
warningThreshold: 0.003, // Alert at 0.3%
autoReject: true // Reject if exceeded
}Circuit Breakers
Pause mechanisms triggered by anomalies or unexpected behavior
circuitBreakers: {
priceDeviation: 0.1, // Pause if 10% price swing
volumeAnomaly: 5.0, // Pause if 5x normal volume
errorRate: 0.05, // Pause if 5% error rate
manualOverride: true // Allow manual pause
}Oracle Dependencies
Reliable price feeds with staleness checks and multiple source validation
oracleConfig: {
sources: ['Pyth', 'Switchboard', 'Chainlink'],
minSources: 2, // Require 2+ agreeing sources
maxStaleness: 30, // 30s max stale data
deviationThreshold: 0.02 // 2% max deviation between sources
}End-to-End Flow
Here's how a typical interaction flows through the Threeium system, from initial signal to final yield accounting:
Signal Submission
A protocol or user submits an execution intent with parameters: asset pair, size, direction (buy/sell), and constraints like maximum slippage, time limits, and minimum fill rates.
const signal = await threeium.submitSignal({
asset: 'SOL/USDC',
side: 'buy',
amount: 50000,
maxSlippage: 0.005,
timeLimit: 120
});Route Planning
The Execution Engine analyzes current market state, available liquidity across all integrated venues, and creates an optimal execution plan. This may involve splitting the order across multiple DEXs.
// Engine creates execution plan
plan: {
routes: [
{ venue: 'Jupiter', amount: 30000 },
{ venue: 'Orca', amount: 15000 },
{ venue: 'Internal', amount: 5000 }
],
expectedSlippage: 0.003,
estimatedTime: 45
}Liquidity Adjustment
If needed, the Liquidity Engine proactively adjusts positions to support the upcoming execution or capture related opportunities. This happens in parallel with route planning for minimal latency.
Execution
Orders are routed and filled across venues. The system monitors fill rates in real-time and adjusts routing if needed. Circuit breakers and risk limits are enforced throughout.
Yield Accounting
All activity is recorded: execution costs/savings, fees earned from liquidity positions, protocol rewards, and net yields. Telemetry data is written on-chain for complete transparency.
Continuous Learning
The system learns from execution patterns to improve future routing and liquidity decisions. Performance metrics are used to refine strategies and adapt to changing market conditions.
Integration Guide
Threeium is designed to integrate seamlessly with existing Solana protocols, vaults, and applications. Here's how different types of projects can leverage the system:
For Protocols & DAOs
Protocols can integrate Threeium for treasury management, protocol-owned liquidity (POL) optimization, or as execution infrastructure for their users.
Treasury Management
Use Threeium to optimize treasury operations: better execution prices, yield generation on idle assets, and transparent reporting for governance.
// Treasury integration
const treasury = await threeium.initializeTreasury({
authority: dao.governanceProgram,
assets: ['SOL', 'USDC', 'BONK'],
strategy: 'conservative',
yieldTarget: 0.05 // 5% APY target
});Protocol-Owned Liquidity
Deploy POL through Threeium for dynamic liquidity management that earns yield while supporting your protocol's markets.
// POL deployment
const pol = await threeium.deployLiquidity({
protocol: 'MyProtocol',
asset: 'PROTOCOL/USDC',
amount: 500000,
strategy: 'execution-aware', // Adapt to user demand
feeEarnings: 'compound' // Reinvest fees
});For Vault Managers
Vault strategies can leverage Threeium's execution and liquidity engines to improve performance. The system can act as a sub-strategy or handle the entire vault operation.
Vault Integration Example
// Integrate Threeium into your vault
import { ThreeiumVaultStrategy } from '@threeium/sdk';
const strategy = new ThreeiumVaultStrategy({
vault: vaultPubkey,
allocation: 0.3, // 30% of vault TVL
assets: ['SOL-USDC', 'SOL-USDT'],
riskProfile: 'moderate',
rebalanceFrequency: '24h'
});
await strategy.initialize();
// Strategy handles:
// - Optimal execution for rebalancing
// - Dynamic liquidity positioning
// - Yield optimization
// - Risk management
// Query performance
const performance = await strategy.getPerformance();
console.log(`Net APY: ${performance.apy}%`);
console.log(`Sharpe Ratio: ${performance.sharpe}`);For Applications
Applications can use Threeium as execution infrastructure to provide users with better prices and lower slippage.
Swap Interface Integration
// Use Threeium for swap execution
import { ThreeiumSwap } from '@threeium/sdk';
const swap = await ThreeiumSwap.execute({
userWallet: wallet.publicKey,
inputToken: 'SOL',
outputToken: 'USDC',
amount: 10, // 10 SOL
slippageTolerance: 0.005
});
// Threeium routes across venues for best execution
console.log(`Filled at: ${swap.executionPrice}`);
console.log(`Slippage: ${swap.actualSlippage}%`);
console.log(`Saved vs Jupiter: ${swap.savingsVsBenchmark} USDC`);Parameters & Configuration
Threeium exposes several configurable parameters to customize behavior for your use case. All parameters have sensible defaults but can be adjusted within safe bounds.
Execution Parameters
| Parameter | Description | Default | Range |
|---|---|---|---|
| maxSlippage | Maximum acceptable slippage | 0.5% | 0.1% - 2% |
| minFillRate | Minimum percentage filled | 95% | 80% - 100% |
| timeLimit | Maximum execution time (seconds) | 60s | 10s - 300s |
| splitThreshold | Order size to trigger splitting | $10k | $1k - $100k |
Liquidity Parameters
| Parameter | Description | Default | Range |
|---|---|---|---|
| bandWidth | Width of liquidity concentration | 2% | 0.5% - 10% |
| rebalanceThreshold | Price move triggering rebalance | 1% | 0.1% - 5% |
| maxIL | Max impermanent loss tolerance | 5% | 2% - 15% |
| compoundFees | Auto-compound earned fees | true | true / false |
Risk Parameters
| Parameter | Description | Default | Range |
|---|---|---|---|
| maxPosition | Max position per asset (USD) | Custom | $10k - $10M |
| maxDrawdown | Max drawdown before pause | 10% | 5% - 25% |
| oracleStaleness | Max oracle data age (seconds) | 30s | 10s - 120s |
Security Model
Threeium is designed with security as a foundational principle. This section outlines the threat model, assumptions, and security measures implemented throughout the system.
Threat Model
Threeium considers and mitigates the following threat vectors:
- Smart contract vulnerabilities: Reentrancy, integer overflow, logic errors, and access control issues
- Oracle manipulation: Price feed attacks, staleness exploits, and source compromise
- MEV and front-running: Transaction ordering manipulation and sandwich attacks
- Governance attacks: Admin key compromise, parameter manipulation, and upgrade exploits
- Integration risks: Malicious or compromised external protocols and venues
Security Measures
Professional Audits
All smart contracts will be audited by reputable security firms before mainnet launch. Audit reports will be publicly available.
Multi-Sig Governance
Critical operations require multi-signature approval with time-locks for parameter changes.
Circuit Breakers
Automatic pause mechanisms trigger on anomalies, protecting user funds during unexpected events.
Redundant Oracles
Multiple independent price feeds with deviation checks prevent single oracle manipulation.
Gradual Rollout
Launch begins with caps on TVL and position sizes, gradually increasing as confidence grows.
Bug Bounty
Ongoing bug bounty program incentivizes security researchers to find and report vulnerabilities.
Security Assumptions
The system operates under these security assumptions:
- Solana network operates correctly and maintains liveness with reasonable finality guarantees
- Price oracles (Pyth, Switchboard, Chainlink) provide accurate data within acceptable staleness bounds
- Integrated DEXs and protocols function as documented without malicious behavior
- Users and integrators configure appropriate risk parameters for their use cases
- Governance participants act in good faith and follow established procedures
Frequently Asked Questions
Is Threeium audited?
Professional security audits are planned prior to mainnet deployment. Multiple reputable security firms will review the codebase, and all audit reports will be published publicly when available.
What does "Solana-native" mean?
Threeium is built specifically for Solana's architecture, leveraging its parallel execution model, low latency, and unique DeFi ecosystem. It's not a port from EVM or another chain—every component is designed for Solana from the ground up.
Is it non-custodial?
Yes. Users and protocols maintain control of their assets through smart contracts. No central party or team member has custody of funds. All operations are governed by transparent on-chain logic.
How is yield generated?
Yield comes from four primary sources: (1) trading fees earned from liquidity provision, (2) execution efficiency savings from better routing, (3) protocol incentives from integrated platforms, and (4) arbitrage opportunities identified by the system. All sources are tracked on-chain and fully verifiable.
What are the risks?
Like all DeFi protocols, Threeium involves several risk categories:
- • Smart contract risk (bugs, exploits)
- • Market risk (volatility, liquidity crunches)
- • Impermanent loss for liquidity providers
- • Integration risk (dependencies on external protocols)
- • Oracle risk (price feed accuracy and availability)
The system implements extensive risk management, but no approach eliminates risk entirely.
When is the launch?
Threeium is currently in development. Public testnet is planned for Q2 2026, with mainnet launch following successful testing and audits. Join our community to stay updated on progress and timelines.
Can I integrate Threeium into my protocol?
Yes! Threeium is designed for composability. Protocols, vaults, and applications can integrate Threeium for execution, liquidity management, or yield generation. Contact the team to discuss integration requirements and technical support.
Is there a token?
Token plans will be announced closer to mainnet launch. Any official token information will be published through official channels only. Beware of scams and unofficial tokens.
How can I contribute or provide feedback?
Join the community on X (@ThreeiumLabs) and Discord. The team is always interested in feedback, use case discussions, and potential partnerships. For technical inquiries, reach out via the contact page.
Changelog
Track updates, improvements, and milestones in the Threeium project:
Documentation v1.0 Released
Initial documentation release covering core concepts, architecture, integration patterns, and security model. Includes comprehensive API examples and configuration guides.
Development Devnet Launch
Internal development devnet for testing core functionality, integration with Solana DEXs, and performance benchmarking. Not publicly accessible.
Public Testnet
Public testnet launch for community testing, bug hunting, and integration trials. Bug bounty program begins. Partner protocols start testnet integrations.
Security Audits
Comprehensive security audits by multiple firms. Audit reports will be published publicly. Critical findings will be addressed before mainnet launch.
Mainnet Launch
Phased mainnet launch with initial caps on TVL and position sizes. Gradual parameter relaxation as confidence grows. Initial integrations with select partner protocols go live.
Questions or feedback? Contact us or reach out on X
Last updated: January 2026 • Version 1.0