7. Security Model

  • Zero-Knowledge Proofs: Every swap is verifiably correct.

  • PoH Ordering: Prevents front-running & MEV.

  • BFT Validators: Ensure global state sync.

  • Decentralized Oracles: Guarantee accurate pricing.

  • Regular Audits: Continuous code and consensus-level reviews: multi-layered protection against manipulation or exploits.

Last updated