Prevent hacks
before they happen
The Credible Layer is a network extension that enables apps to define security rules and prevents transactions from violating them.

Network native, rule-based security.
Every transaction that violates your rules is removed by the network at the sequencer level. This deterministic approach means there are no false positives.

Easy to use.
Written in Solidity, with foundry-like syntax, assertions are just like an in-contract require statement, but faster and more expressive. With no contract modifications or downtime during implementation.

Verifiable and transparent.
All active assertions are public and verifiable. Users can inspect the exact rules protecting their funds, and developers can fork proven rule sets from similar protocols.
First, define your rules

Select your use case.
.gif)
Write and test your assertions.

Store to assertion DA.
Next, submit for network enforcement

Register assertions

Network runs your assertions...
.gif)
...And drops each one that breaks your rules


Security that goes beyond heuristics
Product updates
¹Phylax states that:
We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.
If this statement is removed from future versions of this document, it is likely that Phylax has been served with a government subpoena and is unable to communicate this fact.
This statement will be updated on the 1st of every month.
Last updated: August 1 2025