Skip to main content

Security Architecture

Overview

Karpous employs a multi-layered security architecture designed to protect user assets at every level of the platform. Our security model is built on the principle of defense in depth, combining blockchain-level security with traditional infrastructure hardening.

Security Philosophy

"Funds should never sit in a smart contract when they can be secured in cold storage."

This core principle drives our entire security architecture. By minimizing on-chain fund exposure and maximizing cold storage usage, we eliminate entire categories of smart contract vulnerabilities.


Security Layers


Smart Contract Security

BoringVault Architecture

Our vault system is inspired by the BoringVault security model - an ultra-minimal design that prioritizes security through simplicity.

Key Design Principles

PrincipleImplementation
Zero Fund StorageVault acts as passthrough only - funds never rest in contract
Immediate ForwardingAll deposits instantly forwarded to cold storage
Immutable DestinationLedger address is immutable after deployment
Minimal Attack SurfaceFewer lines of code = fewer vulnerabilities

Hardware Wallet (Ledger) Integration

All user funds are secured in Ledger hardware wallets - the industry standard for cryptocurrency cold storage.

Security Guarantees

  • Physical Confirmation: Every outbound transaction requires physical button press
  • Offline Key Storage: Private keys never touch the internet
  • PIN Protection: Multiple layers of authentication
  • Recovery Seed: Backup capability with BIP-39 mnemonic

Multisig Governance

All administrative functions are controlled by Gnosis Safe multisig wallets.

Operation TypeSigners RequiredThreshold
Contract Deployment3 of 560%
Portal Authorization2 of 367%
Configuration Changes2 of 367%
Emergency Actions3 of 560%

Access Control System

We use OpenZeppelin's AccessControl for fine-grained permission management.


Infrastructure Security

Server Architecture

Security Layers

LayerTechnologyProtection
EdgeCloudflareDDoS mitigation, WAF, rate limiting
TransportTLS 1.3Encryption in transit
ApplicationJWT + MFAAuthentication, authorization
DataAES-256Encryption at rest
NetworkVPC + FirewallNetwork isolation

Operational Security

Multi-Approval Workflows

Time-Lock Mechanisms

OperationMaturity PeriodPurpose
Withdrawal1 minuteFlash attack prevention
Yield Claim1 hourHigher security for yields
Auto-Renewal24 hours graceUser opt-out window

Monitoring & Alerting

SystemMonitoringAlert Threshold
Smart ContractsEvent listenersAny unusual activity
API ServersHealth checksOver 5s response time
DatabaseQuery performanceOver 100ms queries
Wallet BalancesReal-timeUnder $10k buffer

Security Summary

What We Do

PracticeImplementation
Minimize on-chain exposureAll funds in cold storage
Immutable critical paramsLedger address cannot change
Multi-party approvalNo single point of failure
Time-locksPrevent flash attacks
Defense in depthMultiple security layers
Least privilegeMinimal permissions per role

What We Avoid

Anti-PatternReason
Upgradeable vaultReduces attack surface
Admin fund accessOnly users initiate withdrawals
Complex on-chain logicSimple = secure
Single signature opsAlways multi-party
On-chain secretsAll sensitive data off-chain

Security Contact

For security issues or vulnerability reports:

  • Security Email: [email protected]
  • Bug Bounty: [Coming Soon]
  • Response Time: 24 hours for initial acknowledgment