Security Principles

  • Secrets are never passed in raw form

  • All inputs to public functions are hashes of secrets and salts

  • On-chain inputs are public but uninformative without secrets

  • Salts are created from email + password, and they evolve with each action to protect prior data

  • Salts cannot be reused, and their seeds (such as email + password) are never disclosed

  • To safeguard against front-runners that monitor mempool for proofs, we use the Commit-Reveal scheme for all proof-validations

    • During the Commit, send the commits contains mapping from the next commitment to hash(proof + salt + globalSalt)

    • Only after the commit is verified off-chain, then Reveal — the protected business function submits the proof, salt and commitment. After successful verification, the business function proceeds, and the commit is removed at the end

    • By the time the proof is revealed, the commit is already on-chain, front-runners cannot front-run both transactions at the same time

  • 2FA security and non-repudiation

  • N of M password recovery

  • Non-reentrant where applicable, safeguarding against race conditions

  • Proofs submitted during claims and withdrawals are not visible on the blockchain until the transaction is concluded. This precludes the possibility of front-running

  • Furthermore, sanity checks are available, especially before a proof is submitted, to guarantee successful completion of business functions. This will further guarantee prevention of accidental leakage of proofs

  • Administrative pause() and unpause() for emergency halting as a backstop. notPaused modifier for all state-changing functions

Last updated