Protected by protocol design
- Non-custodial wallet control for all participant actions.
- Explicit on-chain state transitions for purchase, stake, and claim.
- Public protocol accounts for configuration, vault balances, and claim paths.
- Visible claim-readiness logic based on staked shares, funded assets, and period state.