Page cover

Security Model

Core Security Features

  • Validator network ensures consensus verification.

  • Checkpoint proofs are recorded on-chain.

  • No custodial control of user funds.

  • Redundant verification layers for fault tolerance.

Audits All contracts undergo third-party audits before launch. Audit reports will be public to maintain transparency.

Best Practices

  • Verify contract addresses before transacting.

  • Avoid unofficial URLs or interfaces.

Last updated