Skip to main content
CONFIDENTIAL & PROPRIETARY © 2025 Inkwell Finance, Inc. All Rights Reserved. This document is for informational purposes only and does not constitute legal, tax, or investment advice, nor an offer to sell or a solicitation to buy any security or other financial instrument. Any examples, structures, or flows described here are design intent only and may change.

What Is Leviathan Prime Brokerage?

Leviathan Prime Brokerage gives sophisticated users — professional traders, crypto-native hedge funds, proprietary trading desks, and DAOs — policy-gated margin accounts powered by Ika dWallets. Users deploy leveraged capital across multiple whitelisted protocols simultaneously, managed through a unified portfolio view with real-time risk monitoring. This is the direct-access channel: users come to Leviathan directly, rather than through a partner protocol’s UI. They get a multi-chain smart wallet with cross-protocol execution, automated strategy support via session keys, and portfolio-level health management — all enforced non-custodially through on-chain policy.
Current StatusPrime Brokerage is in active development. The core infrastructure — dWallets, policy gates, session keys, keepers, credit scoring, and transaction verification — is built and shared with the Credit Line and Embedded Lending products. Prime Brokerage extends this foundation with multi-protocol scope and unified portfolio risk management.

How It Differs from Other Leviathan Products

Prime BrokerageCredit LineEmbedded Lending
ScopeMulti-protocol margin accountMulti-protocol, borrower-directedSingle protocol
DistributionDirect — users come to LeviathanDirect — users come to LeviathanVia partner protocol’s UI
Capital deploymentAcross many whitelisted protocolsWithin borrower’s approved policyCaged to one integrating protocol
Target userPro traders, funds, prop desksProtocols seeking credit facilitiesProtocol end-users
Risk managementPortfolio-level, cross-protocolPer-loan health trackingPer-loan within protocol sandbox
User experienceLeviathan portfolio dashboardLeviathan appNative to host protocol
Prime Brokerage vs. Credit Line: Both are direct-access products where users interact with Leviathan directly. The difference is the user profile and management model. Credit Line serves protocols and businesses borrowing against revenue. Prime Brokerage serves active traders and funds who need cross-protocol margin with portfolio-level risk management. Prime Brokerage vs. Embedded: Embedded cages capital to a single integrating protocol. Prime Brokerage allows deployment across many protocols simultaneously, with unified health monitoring across the entire portfolio.

Target Users

Professional Traders

Active traders who deploy capital across multiple DEXs, perpetual exchanges, and yield protocols. Need margin, fast execution, and automated strategies.

Crypto-Native Hedge Funds

Funds running systematic or discretionary strategies across DeFi. Need institutional-grade risk controls, portfolio monitoring, and non-custodial architecture.

Proprietary Trading Desks

Prop desks deploying firm capital across on-chain venues. Need policy enforcement that ensures capital stays within approved strategies and risk limits.

DAO Treasury Management

DAOs actively managing treasury capital across yield sources and trading strategies. Need transparent, auditable execution with on-chain policy governance.

Core Capabilities

Cross-Protocol Margin

Deploy borrowed capital across multiple whitelisted protocols from a single margin account. Trade on one DEX, provide liquidity on another, and deploy to yield vaults on a third — all from the same dWallet, under unified risk management.

Unified Risk Management

Portfolio-level health monitoring across all deployed positions. Rather than tracking risk per-loan or per-protocol, Prime Brokerage evaluates the aggregate health of the entire portfolio — accounting for cross-protocol correlations, concentration risk, and combined exposure.

Policy-Gated Execution

Every action passes through the same policy enforcement stack used across all Leviathan products:
  • Destination whitelists — only approved protocols and contracts
  • Function-level controls — approved entry points on each contract
  • Daily limits — caps on transaction volume
  • Transaction verification — every action validated by leviathan-verifier before co-signing

Session Keys for Automated Strategies

Session keys enable automated trading bots and strategy execution within policy bounds:
  • Scoped to specific operations (e.g., trade on approved DEXs, rebalance across yield vaults)
  • Time-bounded with automatic expiration
  • Nonce-tracked for replay protection
  • Revocable if policy violations are detected
Automated strategies run without requiring manual wallet signing for every transaction, while maintaining the security guarantees that the policy sandbox provides.

Portfolio-Level Health Monitoring

Keepers continuously monitor the aggregate health of Prime Brokerage accounts:
  • Real-time position tracking across all deployed protocols
  • Portfolio-level health factor computation
  • Automated warnings when health deteriorates
  • Enforcement actions if health breaches configured thresholds

Shared Infrastructure

Prime Brokerage is not a separate system — it builds on the same core infrastructure documented across the Leviathan product suite:
ComponentShared WithRole in Prime Brokerage
dWalletsCredit Line, EmbeddedMulti-chain smart wallet for capital deployment
Policy gatesCredit Line, EmbeddedDestination and function-level enforcement
Session keysCredit Line, EmbeddedAutomated strategy execution
KeepersCredit Line, EmbeddedPosition monitoring and health checks
Credit scoringCredit Line, EmbeddedEligibility and terms determination
Transaction verifierCredit Line, EmbeddedCross-chain action validation
Revenue oraclesCredit Line, EmbeddedRepayment tracking from EVM chains
The innovation in Prime Brokerage is multi-protocol scope with unified risk management — extending the single-protocol policy sandbox into a cross-protocol portfolio with aggregate health tracking.

Next Steps

How It Works

Detailed walkthrough of account setup, capital deployment, and risk management