Security
Security-first protocol design with non-custodial architecture, transparent on-chain execution, and comprehensive audit coverage. Your capital security is our highest priority.
Non-Custodial Architecture
All user assets remain under user control at all times. Protocol smart contracts execute strategies without custodial access to funds. Private keys never leave user devices.
On-Chain Transparency
Complete transparency of vault accounting, strategy execution, and risk controls verifiable on Solana blockchain. All operations are publicly auditable.
Multi-Signature Governance
Critical protocol operations require multi-signature approval from distributed key holders with time-locked execution.
Security Audits
Comprehensive security audits by multiple leading blockchain security firms with public report publication.
Bug Bounty Program
Active bug bounty program incentivizing responsible disclosure of vulnerabilities with rewards up to $500K.
Risk Controls
Automated on-chain risk enforcement prevents excessive exposure and protects capital in all market conditions.
Security Audit Status
SEQUELIZE is undergoing comprehensive security audits with multiple leading blockchain security firms. All audit reports will be published publicly upon completion.
Trail of Bits
ScheduledCore vault contracts and risk modules
OpenZeppelin
ScheduledStrategy contracts and oracle integration
Certik
ScheduledFull protocol review and formal verification
Threat Model & Mitigations
Comprehensive analysis of potential threats and implemented mitigation strategies to protect protocol and user assets.
Smart Contract Vulnerabilities
Critical SeverityMitigation: Multiple security audits, formal verification, comprehensive test coverage (>95%), and ongoing security reviews
Oracle Manipulation
High SeverityMitigation: Multi-source price feeds (Pyth, Switchboard, Chainlink), TWAP implementation, deviation checks, and circuit breakers
Protocol Integration Risk
High SeverityMitigation: Continuous monitoring of integrated protocols, risk scoring system, automated strategy adjustment, and exposure limits
Economic Attacks
Medium SeverityMitigation: Drawdown thresholds, flash loan protection, time-weighted operations, and concentration limits
Governance Attacks
Medium SeverityMitigation: Multi-sig controls, time-locked execution, quorum requirements, and emergency pause mechanism
Front-Running
Low SeverityMitigation: Batched execution, slippage protection, MEV-aware transaction ordering, and commit-reveal schemes
Bug Bounty Program
We maintain an active bug bounty program to incentivize responsible disclosure of security vulnerabilities. Rewards are determined by severity and impact according to industry-standard CVSS scoring.
Response Time: Within 24 hours for critical issues
Disclosure: Coordinated disclosure with 90-day window
User Security Best Practices
Risk Disclosure
DeFi protocols carry inherent risks including smart contract vulnerabilities, market volatility, oracle failures, and protocol integration risks. Despite comprehensive security measures, no system can guarantee absolute security. Users should only deposit capital they can afford to lose and conduct independent research before participating. Past security audits do not guarantee future safety.