Design Guidelines
spherex Protect was designed with strict guidelines to make sure it complies with highest standards of cyber securityand is capable of preventing the most sophisticated Web3 attacks. Following are the guidelines that inspired the building of spherex Protect:
Preemptive Security, 0day Resistant
Proactively and automatically block suspicious transactions BEFORE they're finalized, whether known or Zero-day vulnerabilities.
Continuity
spherex Protect only blocks suspicious transactions, while approving legitimate transactions and maintaining business continuity. The protected contracts remain up and running regardless of the attack, such that users never lose access to their funds or experience denial-of-service.
With spherex continuous solution, no need to use the controversial pause mechanism that severely harms the user trust and reputation.
Configurable Governance
spherex Protect complies with every governance structure set by the customer and can be decentralized or centralized per the customer's choice. DAOs / Security council / subcontractors / CISO / etc.
Verifiable Security
The on-chain code can be verified per request, such that every end-user or client-side application would be able to watch the code and verify that spherex Protect is installed and enabled.
Last updated