Claude-skill-registry-data mapping-invariants

Phylax Credible Layer assertions invariant mapping. Use when starting a protocol to map invariants before writing phylax/credible layer assertions or tests.

install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry-data
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry-data "$T" && mkdir -p ~/.claude/skills && cp -r "$T/data/mapping-invariants" ~/.claude/skills/majiayu000-claude-skill-registry-data-mapping-invariants && rm -rf "$T"
manifest: data/mapping-invariants/SKILL.md
source content

Mapping Invariants

Start here before designing or implementing assertions. This skill defines the invariant‑mapping workflow and hands off to the other skills.

Meta-Cognitive Protocol

Adopt the role of a Meta-Cognitive Reasoning Expert.

For every complex problem: 1.DECOMPOSE: Break into sub-problems 2.SOLVE: Address each with explicit confidence (0.0-1.0) 3.VERIFY: Check logic, facts, completeness, bias 4.SYNTHESIZE: Combine using weighted confidence 5.REFLECT: If confidence <0.8, identify weakness and retry For simple questions, skip to direct answer.

Always output: ∙Clear answer ∙Confidence level ∙Key caveats

When to Use

  • Starting a new protocol assertion effort.
  • You need a structured method to discover invariants.
  • You want the step‑by‑step path before
    designing-assertions
    and
    implementing-assertions
    .

When NOT to Use

  • You already have a vetted invariant list.
  • You only need implementation details. Use
    implementing-assertions
    .
  • You only need testing guidance. Use
    testing-assertions
    .

Quick Start

  1. Build the protocol map (assets, roles, entrypoints, state, routers).
  2. Enumerate invariants by category (access control, accounting, pricing, solvency, limits, modes).
  3. Rank invariants by impact and likelihood (losses, control‑plane, liveness).
  4. Identify exceptions and acceptable violations.
  5. Pick data sources (state, logs, call inputs, slots).
  6. Choose enforcement location (chokepoint vs per‑contract).
  7. Produce the invariant matrix and trigger map.
  8. Hand off to
    designing-assertions
    implementing-assertions
    testing-assertions
    .

Skill Map

  • designing-assertions
    : turn the invariant map into triggerable invariants and edge cases.
  • implementing-assertions
    : write Solidity assertions and cheatcode logic.
  • testing-assertions
    : build PCL/forge tests for assertions.
  • backtesting-assertions
    : replay mainnet txs to validate triggers.
  • pcl-assertion-workflow
    : set up PCL project, store/submit/deploy.
  • assertion-troubleshooting
    : diagnose non-triggering or failing assertions.

Workflow

  • Protocol map: read docs/specs/audits/tests; list contracts, assets, roles, and critical entrypoints.
  • Invariant inventory: express “states that must never occur” and rank by impact.
  • Spec classification: split global invariants vs action-specific postconditions (GPOST/HSPOST).
  • Exception audit: capture legitimate exceptions (bad debt, emergency modes, timelocks).
  • Observation plan: decide which values/events you will read to validate each invariant.
  • Trigger plan: select the narrowest trigger that guarantees coverage.
  • Coverage check: confirm each invariant is reachable from at least one trigger and entrypoint.
  • Feasibility check: internal calls are not traced; call inputs are ordered per selector; modified mapping keys must be derived from call inputs or logs; if an invariant depends on
    msg.data
    , plan to reconstruct it from selector + args because call inputs exclude the selector.

Heuristics

  • Start with loss‑bearing invariants: solvency, accounting integrity, and upgrade control.
  • Prefer cross‑function invariants over per‑function reverts already in code.
  • If you cannot observe an invariant reliably, rephrase it to observable signals.
  • For lending protocols, classify actions by health‑factor impact and list allowed transitions.
  • If an invariant depends on intermediate call frames, plan to use
    forkPreCall
    /
    forkPostCall
    from the start.

Deliverables

  • Invariant matrix (definition, source, exceptions, priority).
  • Trigger map (selector/slot/balance mapping).
  • Data source list (storage layout, logs, call inputs).
  • Test plan (positive/negative, fuzz, backtest candidates).

Rationalizations to Reject

  • “We can skip invariant mapping and write code directly.”
  • “We only need owner checks.” (Protocols usually fail on accounting and pricing.)
  • “One broad assertion is enough.” (Gas and coverage risks.)
  • “We’ll add exceptions later.” (Most false positives come from ignored exceptions.)

References