Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.superform.xyz/llms.txt

Use this file to discover all available pages before exploring further.

The validator program is currently permissioned. Ready to join? Apply to become a validator.Before you start, confirm you have an onboarding contact at Superform and access to the validator artifacts you plan to run (published image or source repository), bootstrap peers, and the chain-specific contract addresses for your assigned deployment.
Ready to join? Apply to become a validator.

What this program is

The SuperVaults Validator Network is the oracle layer that keeps vault price-per-share (PPS) data fresh and tamper-resistant. Validators run an OCR2-based node that:
  • observes PPS on each configured chain
  • signs consensus reports with a dedicated onchain key
  • helps submit a single quorum-backed update onchain
  • earns validator rewards for reliable participation

Who should run a validator

This program is designed for operators who can run production infrastructure consistently, manage keys safely, and respond to incidents quickly. It is not a casual self-serve node today.

Before you touch a server

Have these inputs lined up first:
  • Program access — confirmation from Superform that your organization is approved to join
  • Runtime artifacts — access to the published container image or the source repository and templates
  • Infrastructure — a Linux or macOS host, PostgreSQL, stable outbound connectivity, and reliable RPC providers
  • Network metadata — bootstrap peers, the current config version, and the contract addresses Superform wants you to monitor
  • Operator contact path — a place to submit your public key bundle and coordinate registration
If any of those are missing, stop there. Most validator setup failures come from missing onboarding inputs, not from the software install itself.

Read this section in order

Quickstart

The shortest safe path from approval to a running node.

Node Setup

Canonical install and runtime guide for Docker or source deployments.

Configuration Reference

Config reference for config.toml, chains.yaml, and OCR2 timing presets.

Monitoring

Health endpoints, metrics, and alert rules for production operators.

Operations

Registration, upgrades, key rotation, monitoring checks, and troubleshooting.

Supporting context

How It Works

OCR2 rounds, quorum, failure modes, and validator config mechanics.

Economics

Rewards, staking, slashing, insurance, and rollout phases.

Operator model at a glance

TopicCurrent model
AccessPermissioned onboarding through Superform
Validator registrationSuperform submits setValidatorConfig()
Node reconfigurationAutomatic from ValidatorConfigSet events
Key custodyOperator-managed; onchain key should use KMS in production
Rewards and slashingPhase 2 design, not live in Phase 1

Safe order of operations

  1. Confirm access and receive the required network metadata.
  2. Stand up the node and validate local health.
  3. Export and submit your public key bundle.
  4. Wait for Superform to register your validator onchain.
  5. Verify your node loads the new config and starts participating.
  6. Put monitoring and incident response in place before treating the node as production.