Skip to main content

Default release-profile tiers

These are the default request-submission tiers when the operator is built without alpha1 tranche changes and without the no_rate_limit feature.
TierDDX balanceAverage limit per hourBurst
Tier 0< 1,0009001
Tier 1>= 1,0001,8005
Tier 2>= 1,000,000180,00050 cap
Tier selection is based on the operator’s current validation-view DDX balance for the authenticated trader, not a generic wallet-balance snapshot from another surface.

What this page can answer safely

QuestionPublic answer
what the default repo-backed REST write-path tiers arethis page answers that directly
how build flags such as alpha1 or no_rate_limit change the request paththis page answers that directly
what the current hosted public deployment is enforcing right nowthis page cannot guarantee that by itself; verify the target deployment and observed 429 behavior before hardcoding one live quota

Feature-gated variants

  • alpha1 keeps the same request-rate tiers, but changes collateral tranche limits.
  • no_rate_limit compiles out the tiered request guards and raises the supporting burst-cap constant from 50 to 100000.
  • Treat 429 behavior as deployment-conditional rather than as a permanently fixed public-law constant.

Burst behavior

TopicContract
Burst queueingThe inbound webserver and sequencer path can delay requests before outright rejection once the burst buffer fills
Explicit rejection429 RateLimit is the canonical request-level rejection when the trusted path enforces the limit
Deployment varianceA build with no_rate_limit changes both rejection posture and queue depth materially; do not assume public-host behavior matches every private operator deployment

Client behavior

  • Back off and retry on RateLimit responses.
  • Do not retry validation or safety failures unchanged.
  • Track request IDs, timestamps, and observed tier posture to correlate retry loops.
  • Treat prolonged response delay during bursts as rate-limit pressure even before a visible 429.
  • Keep the live-deployment question separate from the build-profile question. Public source constants are useful planning inputs, but they are not a substitute for current deployment verification.
Use Rate Limits and Access Tiers for the build-profile matrix and tranche context.

Adjacent routes

Last modified on April 13, 2026