Security Considerations

The protocol implements several security measures to protect against common vulnerabilities.

Role Security

  • Hierarchical role system with fine-grained permissions

  • Proper role separation between admin, operator, and updater roles

  • Role renunciation to prevent privilege lockouts

Oracle Security

  • Price deviation limits to prevent flash crashes

  • Authorized updaters with dedicated role

  • Timestamp tracking to detect stale prices

First Deposit Protection

  • Virtual shares implementation to prevent inflation attacks

  • Fixed initial share rate for the first deposit

Withdrawal Risk Management

  • Queue-based withdrawals for illiquid assets

  • Hook system for enforcing withdrawal restrictions

  • Processing mechanisms for handling queued withdrawals

Two-Phase Deposit Security

  • Escrow to hold funds until approval

  • Expiration timestamps for deposits

  • Refund mechanism for rejected deposits

Hook Ordering

  • Priority-based ordering of hooks

  • Management functions to add, remove, and reorder hooks

  • Critical for controlling validation flow and security

Cloning Pattern Security

  • Proper initialization pattern for cloned implementations

  • Initialization protection to prevent re-initialization attacks

  • Validation of all clone parameters

Last updated