Skip to main content

Threat Model

This page summarizes the main risks Senticore designs around. It is a product-level view for investors, integrators, and security reviewers.

Primary assets

AssetWhy it matters
User collateralHeld by vault contracts and must remain withdrawable
Account stateDrives balances, positions, and withdrawals
Sequencer logsNeeded for replay, audit, and recovery
Publisher keysAuthorize state commitments
Admin keysControl operational surfaces and emergency actions

Threats and mitigations

ThreatMitigation
Invalid withdrawal rootPublisher quorum, checkpoint validation, Merkle proofs
Sequencer crashDurable logs, replay support, and recovery procedures
Read-model driftSeparation between canonical state and read projections
Admin-key misuseRole separation, operational controls, audit logs
Publisher key compromiseQuorum threshold and emergency governance procedures
API abuseRate limits, authentication, idempotency, replay protection
User signing mistakesWallet prompts, typed messages, explicit error states

Non-goals for v1

  • Fully decentralized sequencing.
  • Permissionless force-inclusion for every order path.
  • Governance UI for all protocol decisions.
  • A mobile-native application.

Incident expectations

Operators should be able to:

  1. Detect drift, checkpoint lag, and abnormal balances.
  2. Halt affected markets or operational planes.
  3. Preserve logs and replay material.
  4. Restore service from verified state.
  5. Publish a user-facing incident report.

See Status for public readiness signals and the planned operational status-page rollout.