Policies
Vaults
Asset Allowlists
Asset allowlists define which tokens a vault can interact with. These lists are configured per integration. Each DeFi protocol a vault connects to, such as Jupiter or Drift, requires its own asset allowlist. The full set of assets permitted in the vault is the combination of all integration-level allowlists.
For example:
- The Jupiter Swap Allowlist controls which tokens can be swapped into using Jupiter.
- The Drift Borrow Allowlist defines which tokens the vault can borrow on Drift.
By enforcing asset allowlists per integration, GLAM ensures vaults interact only with approved tokens, helping prevent exposure to risky or unauthorized assets.
Transfer Allowlist
By default, delegates can deploy vault capital into DeFi protocols and withdraw it back into the vault, but they cannot transfer assets to arbitrary addresses or personal wallets.
The Transfer Allowlist enables vault owners to define approved destinations for vault assets, such as other vaults under the same control. This adds flexibility for internal capital management while preventing unauthorized or unintended transfers.
Market Allowlists
Market allowlists define which specific markets a vault can access within each supported DeFi protocol. These lists are also configured per integration. The overall market access for a vault is the combination of all integration-specific market allowlists.
For example:
- On Drift, owners can allow only selected spot or perpetual markets.
- On Meteora DLMM, vaults can limit activity to approved liquidity pools.
Market allowlists help vault owners restrict delegate activity to well-defined venues. This reduces exposure to volatile or unsupported markets and gives owners tighter control over how capital is deployed.
Order Types
Vaults can define allowed order types, such as market or limit, for supported protocols like Drift. This ensures that delegate traders operate within acceptable boundaries and reduces the chance of reckless or overly aggressive execution strategies.
Restricting order types provides an additional layer of risk management aligned with the vault owner’s preferences.
Max Slippage Limits
Max slippage limits protect vaults from harmful execution conditions, whether due to delegate error or manipulation.
By capping the slippage a delegate can specify, vaults mitigate risks like sandwich attacks and prevent transactions with excessive price impact from being executed.
Tokenized Vaults
Maximum Capacity
Defines the maximum total value the vault can accept.
Minimum Subscription
Defines the minimum amount required for a subscription.
Minimum Redemption
Defines the minimum number of shares required for a redemption.
Permissioned Fulfillment
By default, only managers can fulfill subscription and redemption requests.
If permissionless fulfillment is enabled, anyone, including users and bots, can fulfill eligible requests once they become executable.
Mints
Permission Model
GLAM Mints use the Default Account State extension to set whether new token accounts start active or frozen. If active, anyone can hold or transfer the token, making it permissionless. If frozen, each user must be approved before participating, enabling KYC and access control. This defines whether the token is open to all or gated by default.
Investor Allowlists
GLAM Mints support allowlists to further restrict who can subscribe or redeem beyond the default account state. Only pre-approved wallet addresses can receive or interact with minted tokens. This enables jurisdictional compliance, institutional onboarding, and controlled distribution.
Investor Blocklists
Blocklists act as an additional enforcement layer by denying specific addresses the ability to receive, hold, or transfer mint tokens. Used to manage sanctions, compromised wallets, or internal policies, blocklisted actions are automatically rejected by the token program.
Lockup Periods
Lockup periods impose time-based restrictions on both redemptions and transfers of minted tokens. When enabled, every recipient is subject to a lockup window starting from the moment of mint or token receipt. During this period, transfers and burns (used for redemptions) are blocked at the protocol level. These constraints are enforced via Transfer Hook metadata and GLAM’s Policies program, offering strong, onchain guarantees against premature liquidity events. Lockups help align redemptions with fund terms, prevent early exits, and protect portfolio stability.