This section documents the various use cases that can be implemented with the Credible Layer’s cheatcodes. Each mapping demonstrates how specific cheatcodes enable different types of on-chain assertions.
Each mapping includes example code with both the protocol contract being monitored and the corresponding assertion implementation. The examples demonstrate the technical approach for implementing different types of validations using the available cheatcodes.
The mappings are organized to help you understand what’s currently possible with the Credible Layer. For each use case, you’ll find implementation details, example code, and notes about any limitations or considerations.
We also document unsupported use cases to provide transparency about current system limitations and potential future capabilities.