Insider series·2026-05-04·9 min read·← all posts

Killing BURST — when 7 production triggers told us no

BURST was supposed to detect informed selling on Binance Futures by reading the aggregate-trade tape. The theory was sound: insiders unload before public news, and that unloading shows up as a 3-second burst of aggressive sells. We built it, ran it live in paper mode for two weeks, got 7 triggers, and the data said something the theory didn't predict.

The thesis

When a fund or insider knows about pending bad news (delisting, exploit, regulatory action), they can't just dump $5M of a small-cap altcoin without moving the market. They have to chunk the unloading. The most common pattern: 200-800 aggressive market-sells over 3-10 seconds, dropping the price 3-5% before liquidity recovers.

If you can detect that pattern in real time, you have a 10-30 second window to short the perpetual before broader retail panic-selling drives the move further. The setup looked perfect on the four historical events we used as design references (TRU, FIO, two others).

The build

BURST was a WebSocket consumer subscribing to Binance's aggregate-trade stream on the top-100 USDT-margined perpetuals. It tracked a 3-second sliding window per symbol. Trigger conditions:

The thresholds were tuned on the four reference events. They fired exactly on the patterns we wanted. We deployed BURST in paper mode (no live trades, just logging triggers and forward-tracking outcomes) and waited.

The data

Over two weeks of live operation, BURST fired 7 times. Of those:

Realized hypothetical PnL on a $5K notional with our production rules (SL +2%, TP -10/-15/-20%, 4h hold): -12% net across the 7 trades. Not the win we expected.

The rigorous test

Seven events is too few to draw conclusions, especially when the pattern has theoretical backing. We built a synthetic 90-day backtest that reconstructed the BURST trigger logic on 1-minute kline data across the top-60 USDT perpetuals. The proxy: any 1m bar with ≥3.5% drop AND volume ≥5× the 24h average AND BTC stable in the same minute.

This simulation produced 256 candidate triggers over 90 days. With the production trade rules applied path-dependently (using actual 1m kline data for SL/TP timing), the result was unambiguous:

MetricResult
Trades256
Win rate18.0%
Average win+7.47%
Average loss−2.27%
Profit factor0.72
Hit SL219 / 256 (85%)

The strategy was structurally losing. Not "could be tuned better" — losing.

Why it didn't work

The post-mortem revealed two things:

1. The pattern recognition was correct, but most matches weren't the pattern we intended. A 3-second 3.5% drop with high volume happens for many reasons: liquidity holes, large stop runs, exchange-side rebalancing. Only a small fraction is informed unloading. The signature wasn't specific enough.

2. SL +2% was too tight for the volatility profile. Even when the unloading was real, the price often bounced 2-3% before continuing down. Our +2% SL caught the dead-cat bounce and stopped us out at the worst price. By the time the move resumed, we were sidelined.

What we tried before killing

Before pulling the plug, we ran filter-combination searches:

None recovered the strategy. Every variation we tested was negative-EV.

The decision

We killed BURST on May 3, 2026. Removed from production trading, removed from the website's algorithm list, removed from the paid Pro tier feature set. The module remains in the codebase for potential future use (specifically, in combination with on-chain whale-flow signals — a separate research thread).

Total cost of the BURST experiment: ~3 weeks of dev time, $0 in live trading losses (we were paper-only), and one valuable lesson about the difference between sound theoretical setups and production-grade edge.

The lesson we documented for ourselves

Pattern recognition without sufficient specificity recovers chance-level outcomes. Theoretical setups need empirical specificity gates — proof that the pattern, as defined, separates the intended event from noise. We didn't gate BURST tightly enough. The pattern matched too many non-events.

Why we publish this

Crypto trading has a transparency problem. Services trumpet their wins and bury their losses. We had a strategy that didn't work, we proved it didn't work, and we removed it. Our customers should know that. So should anyone evaluating our other strategies — they're built by people who actually kill what doesn't work, which is a small subset of the industry.