Prevent hacks

before they happen

The Credible Layer is a network extension that enables apps to define security rules and prevents transactions from violating them.

Write, test, and link your first assertion.

Network native, rule-based security.

Every transaction that violates your rules is removed by the network at the sequencer level. This deterministic approach means there are no false positives.

Easy to use.

Written in Solidity, with foundry-like syntax, assertions are just like an in-contract require statement, but faster and more expressive. With no contract modifications or downtime during implementation.

Verifiable and transparent.

All active assertions are public and verifiable. Users can inspect the exact rules protecting their funds, and developers can fork proven rule sets from similar protocols.

First, define your rules

Select your use case.

Write and test your assertions.

Store to assertion DA.

Next, submit for network enforcement

Register assertions

Network runs your assertions...

...And drops each one that breaks your rules

Security that goes beyond heuristics

Predictive modelling
Security Model
Phylax:
Deterministic
Competitors:
Predictive
Transparency
Phylax:
Tablestakes blockchain transparency
Competitors:
Black box algorithms
Infrastructure
Phylax:
Integrated with the rollup
Competitors:
External services
Prevention vs. Detection
Phylax:
Prevents invalid transactions
Competitors:
Detects attacks as or after they occur
Implementation Complexity
Phylax:
Write assertions in Solidity
Competitors:
Many platforms; many languages
Trust Model
Phylax:
Same as the network
Competitors:
Centralized
Governance
Phylax:
Vote to push assertions live
Competitors:
Centralized third-party control
The Credible Layer
Deterministic
Tablestakes blockchain transparency
Integrated with the rollup
Prevents invalid transactions
Write assertions in Solidity
Same as the network
Vote to push assertions live
Incident Response & Anomaly Detection
Predictive
Black box algorithms
External services
Detects attacks as or after they occur
Many platforms; many languages
Centralized
Centralized third-party control

Explainers and Guides

Explainers and Guides

¹Phylax states that:


We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.


If this statement is removed from future versions of this document, it is likely that Phylax has been served with a government subpoena and is unable to communicate this fact.


This statement will be updated on the 1st of every month.


Last updated: August 1 2025