< back to home
security_policy.md
$ cat ./docs/security_policy.md

Security Policy

1. Infrastructure Security

  • Our staking infrastructure is hosted on secure, redundant servers with enterprise-grade security measures.
  • Regular security audits and penetration testing are conducted to identify and mitigate vulnerabilities.
  • Access to critical systems is restricted using multi-factor authentication (MFA) and role-based access controls (RBAC).

2. Smart Contract Security

  • We use audited smart contracts to ensure the integrity and safety of staking operations.
  • Regular contract reviews and updates are performed to address potential security risks.

3. Validator and Network Security

  • Our validators operate on high-performance, secured hardware with 24/7 uptime monitoring.
  • Network activity is continuously monitored to detect and prevent malicious activity.
  • Geographic redundancy across multiple data centers ensures high availability.

4. Incident Response and Risk Management

  • A dedicated security response team is available to respond to threats and security incidents.
  • Users will be notified promptly in the event of a security breach.
  • Comprehensive disaster recovery procedures are in place.

5. Compliance and Legal Considerations

  • We adhere to industry regulations and best practices for staking service providers.
  • Regular compliance reviews ensure alignment with evolving regulatory requirements.

6. Contact and Reporting

If you suspect a security issue or need to report a vulnerability, please contact our team at [email protected].