Assumptions & Adversaries
Network Assumptions
Core Infrastructure Assumptions:
- Network liveness on Base (Solana planned): Assumes Base L2 remains operational with reasonable finality times
- Oracle availability: Pricing oracles remain accessible with acceptable latency
- Honest-majority not required for fiat rails: Protocol security doesn’t depend on honest majority assumptions for off-chain payment rails
Adversary Types
The protocol anticipates and mitigates various adversarial actors:Chargeback Fraudsters
Users who make legitimate-appearing payments via reversible rails, then initiate chargebacks after receiving crypto.Mitigation: Rail risk classification, extended dispute windows, higher bonds for risky rails
Proof Forgers
Attackers attempting to forge ZK-KYC proofs or fabricate payment evidence.Mitigation: Cryptographic verification, multiple verifier types, on-chain attestation validation
Oracle Manipulators
Adversaries seeking to manipulate price feeds for profitable trades.Mitigation: Multi-source aggregation, median calculation, deviation guards, circuit breakers
Griefers
Malicious actors filing false disputes or disrupting protocol operations.Mitigation: Dispute bonds, reputation penalties, escalating sanctions, eventual bans
Sybil Attackers
Adversaries creating multiple identities to game reputation or exploit limits.Mitigation: ZK-KYC uniqueness checks, diminishing returns, pattern detection, device fingerprinting
Merchant Collusion
Groups of merchants coordinating to manipulate markets or extract rents.Mitigation: Protocol-level pricing, transparent matching, merchant concentration limits
Mitigations
On-Chain Security Measures
Bonds & Slashing
Bonds & Slashing
Mechanism:
- Users and merchants post bonds before trades
- Bonds locked during order lifecycle
- Slashed for fraudulent behavior or failures
- Returned on successful completion
- Bond amounts scale with order size and reputation
- Multi-tier slashing based on violation severity
- Automated slashing via smart contract logic
- Appeal mechanism for disputed slashing
- Economic disincentive for fraud
- Compensation pool for victims
- Skin-in-the-game alignment
Rail-Class Windows
Rail-Class Windows
Mechanism:
- Different payment rails assigned risk classes
- Time windows adjusted based on risk
- Higher-risk rails require longer settlement and dispute periods
- UPI (low-risk): 1-hour dispute window
- SEPA (medium-risk): 6-hour dispute window
- Credit card (high-risk): 48-hour dispute window
- Time for chargeback detection
- Appropriate risk-adjusted protection
- Flexible response to rail characteristics
Proof Verification Requirements
Proof Verification Requirements
Mechanism:
- All ZK proofs verified on-chain or by trusted verifiers
- Multiple verification methods required for higher limits
- Proof freshness requirements prevent replay
- Verifier diversity prevents single-point compromise
- On-chain verifier registry
- Proof expiry timestamps
- Nonce-based replay protection
- Verifier rotation and sunsetting
- Cryptographic identity assurance
- Resistance to forgery
- Defense in depth through multiple verifiers
Oracle Deviation Guards
Oracle Deviation Guards
Mechanism:
- Continuous monitoring of price source deviations
- Automatic rejection of outlier sources
- Circuit breakers trigger on excessive deviation
- TWAP smoothing prevents flash manipulation
- Normal operation: ±2% deviation allowed
- Warning level: 3.5% deviation
- Circuit breaker: 5% deviation
- Recovery requires governance approval
- Protection against price manipulation
- Graceful degradation under attack
- User protection during market anomalies
Rate/Limit Throttles
Rate/Limit Throttles
Mechanism:
- Per-user transaction limits based on reputation
- Velocity limits prevent rapid fund movement
- Cooldown periods between large transactions
- Suspicious pattern detection triggers reviews
- Smart contract enforcement
- Real-time monitoring
- Automatic temporary restrictions
- Manual review for pattern violations
- AML compliance through design
- Fraud limitation
- Sybil resistance
- Time for anomaly detection
Audits & Bounty
Audit Strategy
Pre-Launch Audits:- Multiple independent audit firms
- Smart contract security specialists
- Cryptographic circuit review
- Economic mechanism analysis
- Base L2 contracts (order lifecycle, matching, settlement)
- Reputation registry and scoring logic
- Oracle adapters and price aggregation
- ZK-KYC verifier integrations
- Governance and upgrade mechanisms
- Re-audit after major upgrades
- Periodic security reviews
- Incident response retainer with audit firms
Bug Bounty Program
Bounty Structure:Critical (Protocol-Breaking):
- Fund theft or loss
- Oracle manipulation enabling profit
- Reputation system bypass
- Reward: 500,000
- Fraud mechanism not caught by safeguards
- Privacy leak of PII
- Dispute resolution bypass
- Reward: 100,000
- Gas optimization exploits
- Front-running vulnerabilities
- Denial of service vectors
- Reward: 25,000
- UI/UX exploits
- Information disclosure (non-PII)
- Edge case handling issues
- Reward: 5,000
Responsible Disclosure
Process:- Report via secure channel ([email protected])
- Acknowledgment within 24 hours
- Initial assessment within 72 hours
- Fix development and deployment
- Public disclosure (coordinated timing)
- Bounty payment
- No legal action against good-faith researchers
- Prompt response and resolution
- Public credit (unless anonymity requested)
- Fair bounty assessment by independent panel
Attack Scenarios & Responses
Scenario 1: Oracle Manipulation
Attack Vector
Attack Vector
Attacker’s Goal: Manipulate price feeds to execute trades at unfavorable rates.Method:
- Compromise or manipulate a subset of oracle sources
- Create artificial price spike or crash
- Execute large orders at manipulated price
- Profit from price difference
Defense Layers
Defense Layers
- Multi-source aggregation: Requires compromising majority of sources
- Median calculation: Resistant to outlier manipulation
- Deviation monitoring: Triggers circuit breaker at 5% deviation
- TWAP smoothing: Prevents flash manipulation
- Quote expiry: Limits exposure window to 60 seconds
- Post-trade monitoring: Suspicious trades reviewed
Response
Response
- Automatic circuit breaker halts trading
- Compromised sources identified and removed
- Affected trades reviewed for reversal
- Oracle provider notified and replaced if necessary
- Post-mortem published and safeguards updated
Scenario 2: Reputation Farming
Attack Vector
Attack Vector
Attacker’s Goal: Artificially inflate reputation to access higher limits, then commit fraud.Method:
- Create multiple accounts or use legitimate account
- Execute many small legitimate trades
- Build reputation over time
- Once limits are high, commit large-scale fraud
- Disappear with funds
Defense Layers
Defense Layers
- Reputation decay: Requires continuous activity
- Diminishing returns: Later trades earn less reputation
- Rail diversity requirement: Can’t farm single method
- Bond scaling: Higher limits require more capital at risk
- Pattern detection: Wash trading and artificial activity flagged
- Sybil resistance: ZK-KYC uniqueness prevents multiple accounts
Response
Response
- Suspicious accounts flagged for enhanced monitoring
- Large withdrawals from newly-high-reputation accounts delayed
- Fraud detected and prevented before completion
- Bonds slashed and reputation destroyed
- Pattern analysis updated to catch similar attempts
Scenario 3: Smart Contract Exploit
Attack Vector
Attack Vector
Attacker’s Goal: Exploit contract vulnerability to steal funds or disrupt operations.Method:
- Discover vulnerability in smart contract logic
- Craft exploit transaction
- Execute to steal funds or break protocol state
Defense Layers
Defense Layers
- Pre-deployment audits: Professional security review
- Formal verification: Mathematical proof of key properties
- Bug bounty: Incentivize discovery before exploitation
- Upgrade controls: Timelocked upgrades with review period
- Emergency pause: Admin can pause contracts if exploit detected
- Limited scope: Modular design limits blast radius
Response
Response
- Emergency pause activated immediately
- Vulnerability analyzed and patch developed
- Audit firm engaged for emergency review
- Fix deployed through expedited governance
- Affected users compensated from insurance pool
- Public post-mortem and prevention measures
Security Roadmap
Near-Term (0-6 months)
- Complete comprehensive smart contract audit
- Launch public bug bounty program
- Implement automated monitoring and alerting
- Deploy circuit breaker testing regime
- Establish incident response procedures
Medium-Term (6-12 months)
- Formal verification of critical contract components
- Decentralized oracle infrastructure
- Insurance pool for user protection
- Advanced fraud detection ML models
- Security operations center (SOC) establishment
Long-Term (12+ months)
- Fully decentralized security governance
- Autonomous threat response systems
- Zero-knowledge proof of solvency
- Quantum-resistant cryptography migration plan
- Cross-chain security coordination
Security is an ongoing process, not a destination. The protocol commits to continuous improvement, transparent communication about risks, and rapid response to emerging threats.