Security & Audits
Our Commitment to Security
The 3 Protocol is built on a foundation of security-first design and progressive decentralisation. We believe that the integrity of the code, the rigour of its verification, and the resilience of its governance are paramount to achieving a truly sovereign financial system. Our security approach is multi-layered, encompassing formal audits and a robust, time-locked governance model, with a clear path to future public scrutiny.
Audits & Formal Verification
The core protocol contracts undergo rigorous analysis by leading security firms in the blockchain industry. The audit reports for our live systems are published below.
Trust Security - Settlement Layer & Core PSUs (Completed)
Scope: The foundational smart contracts for the Settlement Layer (Stage 2), including the GUILD token, Settlement Pledge, and core mechanics.
Report: Audit report.
Status: Resolved. All findings have been addressed.
[To be announced] - Capital Formation Layer (Upcoming)
Scope: The sophisticated smart contracts for Stage 3, including the 3Bond system, Arbitrage Engines, and advanced revenue logic.
Status: Scheduled. The audit process for our latest codebase is imminent.
A Phased Approach to Open Source & Bug Bounties
Achieving robust security is a process. To ensure the highest level of integrity for our complex system, we are executing a phased strategy:
Current Phase: Rigorous Internal & Audited Development. The protocol's codebase is currently undergoing intensive development and professional audit cycles in a private repository. This controlled environment allows for rapid iteration and thorough vetting before public release.
Next Phase: Public Scrutiny. Upon the successful completion of our main audit rounds and the stabilisation of the core protocol suite, we will transition to a fully open-source model and launch a bug bounty program. This phased rollout ensures that the code presented for public scrutiny is mature and well-tested.
Governance as the Final Safeguard
Governance as the Final Safeguard Technical security is reinforced by our innovative social layer. The protocol's ultimate defensive capabilities are vested in its Legends; a limited cohort of deeply committed stakeholders.
The Legends' Role: Legends hold unique, time-delayed powers to pause governance processes in the event of an emergency or a detected threat, serving as a circuit breaker to protect the system.
A Commitment to Fairness: The requirements to become a Legend are steep and programmatically enforced, ensuring only those with profound, long-term alignment can assume this role. This includes the project founders; we do not currently hold Legend status and must meet the same public criteria as any community member.
Progressive Decentralisation: This security council model is a deliberate step in our journey. As the protocol matures and proves its resilience over time, these emergency powers will be progressively decentralised to the broader community, finalising the path to full autonomy.
Our Commitment to Future Transparency
We are committed to progressive decentralisation. The open-sourcing of the core protocol code and the establishment of a bug bounty program are defined milestones in our roadmap, ensuring we build a secure and resilient foundation for the long term.
Last updated