Skip to main content

Python SDK for the Invarians Oracle — cross-layer blockchain infrastructure attestations

Project description

invarians-py

Invarians makes invisible blockchain infrastructure failures observable — before they show up in gas fees.

L2 activity no longer shows up in L1 gas fees. Sequencer failures and bridge delays leave no economic trace. Fee monitors stay silent. Invarians detects them.

from invarians import InvariansClient

client = InvariansClient(api_key="inv_your_key_here")
ctx = client.get_execution_context(l1="ethereum", l2="arbitrum")

l2 = ctx.proof.l2_regime or ""
if ctx.proof.l1_regime.startswith("S2") or l2.startswith("S2"):
    # Structural stress detected — L1, L2, or both
    # Invisible to fee monitors
    pause_agent_execution()

print(ctx.proof.pattern_key)   # "S1D1×S1D2×BS1"
print(ctx.is_actionable())     # True

Install

pip install invarians[requests]  # default
pip install invarians[httpx]     # async-friendly

Requires Python 3.9+. Get an API key at invarians.com.


What you can do with it

1. Pause execution when infrastructure degrades

ctx = client.get_execution_context(l1="ethereum", l2="arbitrum")

if ctx.proof.l1_regime.startswith("S2"):
    # Structural stress detected — hold until nominal
    return {"action": "hold", "reason": ctx.proof.l1_regime}

2. Detect silent failures (S2D1)

S2D1 is the critical regime: structural stress with no demand signature. A fee monitor reports normal while Invarians detects degradation.

att = client.get_l1("ethereum")

if att.regime == "S2D1":
    # Chain slowing — no gas spike, no price move
    # Nothing shows on any fee monitor
    alert_ops("S2D1 detected on Ethereum")

3. Certify execution conditions (PoEC)

Attach a signed attestation to every agent action for audit or dispute resolution.

ctx = client.get_execution_context(l1="ethereum", l2="arbitrum")

if ctx.is_actionable():
    result = execute_trade(...)
    audit_log.append({
        "tx": result.hash,
        "execution_context": ctx.proof.pattern_key,   # "S1D1×S1D1×BS1"
        "attestation": ctx.signature,
        "issued_at": ctx.l1.issued_at,
    })

4. Adjust routing on bridge stress

ctx = client.get_execution_context(l1="ethereum", l2="arbitrum")

if ctx.proof.bridge_state == "BS2":
    # Bridge degraded — route via alternative path
    use_fallback_bridge()
elif ctx.proof.l2_regime == "S1D2":
    # L2 demand elevated — expect higher fees
    adjust_slippage_tolerance(factor=1.3)

5. Handle stale data gracefully

att = client.get_l1("ethereum")

match att.stale_action:
    case "ok":
        proceed()
    case "caution":
        proceed_with_reduced_size()
    case "wait":
        hold()   # Data > 2h old — do not act

Regimes

Code Structure Demand What it means
S1D1 nominal nominal Infrastructure within calibrated norms
S1D2 nominal elevated Structurally sound, demand above baseline
S2D1 stress nominal The only regime where the chain degrades silently — no gas spike, no price signal. Invisible to gas monitors.
S2D2 stress elevated Structural stress and elevated demand simultaneously

Signal quality

Every response carries explicit calibration metadata. The SDK never hides uncertainty.

att = client.get_l1("solana")

print(att.meta.m1_validated)            # False — backtest not yet validated
print(att.meta.calibration_confidence)  # "LOW"
print(att.meta.notes)                   # "π not calibrated. τ only."
print(att.is_actionable())              # False

Chain coverage

Chain Layer Confidence Ready
ethereum L1 MEDIUM
polygon L1 MEDIUM
arbitrum L2 MEDIUM
base L2 MEDIUM
optimism L2 MEDIUM
solana L1 LOW ⏳ July 2026
avalanche L1 NONE ⏳ July 2026

Error handling

from invarians.exceptions import AuthError, RateLimitError, ServerError

try:
    att = client.get_l1("ethereum")
except AuthError:
    print("Invalid API key")
except RateLimitError:
    print("Quota exceeded — free tier: 20 req/day")
except ServerError as e:
    print(f"Oracle unavailable: {e}")

Verify an attestation

ctx = client.get_execution_context(l1="ethereum", l2="arbitrum")
valid = client.verify({"attestation": ctx.l1.__dict__, "signature": ctx.signature})
print(valid)  # True

Documentation

API reference: invarians.com/developers.html


License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

invarians-0.1.1.tar.gz (9.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

invarians-0.1.1-py3-none-any.whl (10.0 kB view details)

Uploaded Python 3

File details

Details for the file invarians-0.1.1.tar.gz.

File metadata

  • Download URL: invarians-0.1.1.tar.gz
  • Upload date:
  • Size: 9.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for invarians-0.1.1.tar.gz
Algorithm Hash digest
SHA256 6ccb97218383d1f495363a9373886c0d2c14a4e790e1564947790280275485fd
MD5 b671b595402df1ea0e769fa9eab04e65
BLAKE2b-256 a2cb006cc7685d3b411fd89b1740faca8de184b6fc9bc91ddc250be77326d169

See more details on using hashes here.

File details

Details for the file invarians-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: invarians-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 10.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for invarians-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 420ef7648adc5c3dcfa71cd78e4c331864e33d08cbaba1356aa0ea941ce9e8cb
MD5 865899ade4780400d2054c7b72de2d20
BLAKE2b-256 d605bc8baa45b250e5a5a98989010d44b8b400883df03da8949a1c05b770f6fe

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page