🛡️Protocol Security Measures

Solidus Synth is built with security at its core, employing multiple layers of defense to guard against manipulation, exploits, and governance abuse. Our protocol architecture is engineered to ensure transparency, integrity, and resilience in all market conditions.

  • ✔ Time-Locked Transactions All critical protocol functions—including upgrades and treasury actions—are secured by mandatory time-locks for 24hrs or more. This delay mechanism provides the community with sufficient time to audit, review, and react before any sensitive operation is executed.

  • ✔ Audited Codebase & Bug Bounty Solidus Synth's smart contracts have undergone a rigorous third-party audit to ensure code integrity and minimize vulnerabilities before deployment. In addition to external reviews, an ongoing bug bounty program incentivizes white-hat developers to report any discovered flaws, reinforcing protocol resilience.

  • ✔ Inbuilt Flashloan Protection Flashloan attacks are prevented entirely due to a simple yet effective 2-step minting and redemption mechanism. When minting or redeeming synths users must first input the tokens to mint or redeem in one transactions and then collect the output in a separate transaction. Flashloans by design can only be performed in one transaction so this 2 step process makes any flashloan attack impossible.

  • ✔ Tamper-Resistant Oracles Solidus Synth integrates with secure, decentralized oracle networks such as Chainlink to fetch external price data for blue chip assets. These oracles are carefully selected to resist manipulation, ensuring accurate and trustworthy pricing for all synthetic assets. For protocol native tokens such as AVA we utilize battle tested TWAP oracles with multiple time period observations as well as min-max price deviation circuit breakers to ensure any price manipulation attack is not possible.

  • ✔ Governance Safeguards Governance is structured to be both flexible and secure. Community proposals are subject to quorum requirements and delay periods, minimizing the risk of rushed or malicious decisions. Emergency veto mechanisms and tiered permissions further enhance systemic protection.

Together, these mechanisms form a robust security framework that defends Solidus Synth from both technical and economic vulnerabilities, while empowering the community to participate responsibly in its evolution.

Last updated