π User Flow
User Flow
This section describes how a user interacts with MALGIST from first access to ongoing portfolio monitoring.
1. Connect Wallet
Users start by connecting a supported wallet to MALGIST.
No account creation
No custody of user funds
Wallet remains fully controlled by the user
All actions require explicit on-chain confirmation.
2. Browse Strategies
After connecting, users can browse available strategies.
Each strategy displays:
Description of the strategy logic
Supported protocols
Risk level classification
Historical or simulated performance (if available)
Strategies are transparent and inspectable before execution.
3. Choose Risk Profile
Users select a strategy based on their preferred risk level.
Risk levels are defined using:
Protocol exposure
Strategy complexity
Capital allocation behavior
This helps users make informed decisions without deep protocol knowledge.
4. Deposit Once
Users deposit funds into a Universal Vault.
Key characteristics:
Single deposit point
No need to manage multiple protocol interactions
Funds are routed according to the selected strategy
The vault executes strategy logic exactly as defined.
5. Strategy Execution
Once deposited:
The vault reads the selected strategy
Capital is split according to strategy rules
Adapters execute interactions with external protocols
State is updated on-chain
Execution is deterministic and transparent.
6. Monitor Performance
Users can monitor their positions through the interface.
This includes:
Current allocation
Strategy status
Performance metrics
Transaction history
Users may exit or switch strategies according to available rules.
Summary
From the userβs perspective, MALGIST offers:
One wallet connection
One deposit
One unified interface
While abstracting the complexity of multi-protocol DeFi execution.
π Next: Strategy Lifecycle β how strategies are created, reviewed, and updated.
Last updated

