Security

Non‑custodial, audited, and monitored.

Program Hardening

Memory & Accounts

Strict account metas, PDA derivations, and access control guard every IX.

Invariant Tests

Property tests for slippage, TTL, and atomicity across randomized inputs.

Supply Chain

Pin compiler/toolchain; reproducible builds for release artifacts.

Observability

  • Structured logs with trace ids for each intent → receipt.
  • Metrics: quote latency, hit‑rate, router success rate, CU/leg.
  • Alerts: TTL expiry spikes, maker outage, revert anomalies.

Incident Response

5 min
Page on critical alert
60 min
Mitigation in place
72 h
Public post‑mortem