Audits
Last updated
Last updated
Zeebu's security measures go beyond surface-level precautions. The protocol has undergone rigorous audits by six industry-leading firms: . Each brings unique expertise to scrutinize different aspects of Zeebu's architecture.
These audits dissect smart contracts, examine tokenomics, and stress-test network resilience. They uncover potential vulnerabilities before malicious actors can exploit them. While no system is invulnerable, Zeebu's multi-layered approach to security audits demonstrates a commitment to safeguarding user assets and maintaining the integrity of its decentralized ecosystem.
Code Review and Auditing:
Regularly Smart-Contract Audits and Pentest with thorough code reviews, security audits, Grey-box testing along with Application code, and deployer daemon.
Authentication and Authorization:
Strong authentication and authorization mechanisms with ECC to ensure that only authorized deployers can initiate deployments. Multi-factor authentication (MFA) for additional layer of security
Encryption and Secure Communication Channels:
SHA-256 Encryption is used to protect data in transit and ensure that all communication between deployers and the blockchain network is conducted over secure channels.
Regular Updates and Patch Management:
All software components of the Platform, Application & deployer daemon are updated with the latest security patches and updates recommended by Community and active hackathon participations
Intrusion Detection and Prevention Systems:
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are deployed to monitor network traffic for suspicious activities and block potential threats.
Access Control and Least Privilege:
Principle of least privilege and Whitelisted IPs are implemented to all system components, ensuring that each part of the system has only the access necessary to perform its function.
Rate Limiting and Throttling:
Rate limiting and throttling is implemented to prevent abuse of the deployment system, using denial-of-service protection and secure network
Logging and Monitoring:
Comprehensive logs of all activities are updated and regularly monitored for signs of unauthorized access or unusual behavior.
KYT Screening
All incoming and outgoing transactions intracting within the pools are screened using chainalysis for proper compliance and AML screening.