Building the Credible Layer

Phylax enables crypto apps to define and embed verifiable rules into the base layer, ensuring safety for everyone to deploy capital with confidence.

The Credible Layer

Hack prevention at the builder level

Benefit from highly customized, active defense by embedding assertions into the base layer.

Protocol security made verifiable

Proof-of-possibility allows teams to prove the existence of an exploit and act quickly.

About the team

We are a team with one goal: to help crypto win. We are convinced that security needs to improve for general adoption to be viable, that’s why we build the products we do. We believe in credible security over trusted security.

Vision

Explore the Phylax thesis

Introducing the Credible Security Layer

The Credible Layer leverages smart contracts and advanced monitoring mechanisms, we provide a robust framework for dApp developers to define and enforce critical assertions about their protocol's state and behavior via the base layer.

How it Works

Assertions are embedded in the base layer and are impossible to bypass.

Trusted vs Credible

Trusted

Application Level + Observable

Credible

Embedded + Verifiable

How Credible Layer works

Proving Hacks and Vulnerabilities

White-hats can submit a Proof of Possibility or PoP, which effectively acts as a bounty system. They can also submit Proof of Realization or PoR, showing that the Assertion Enforcer didn’t do its job right.

Assertion Enforcers

Block builders validate transactions against these assertions, testing the resulting state against the assertion on what we call the PhEVM, an off-chain protocol.

Assertion Writing

Smart contracts define "hacks" in the form of EVM bytecode. These assertions are used to ensure the block builder never allows any state that is defined as a hack.

Architecture

dApps pay security fees, block builders ensure security. Each assertion is transparent, making the security measures publicly provable.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Syn: Blockchain data closest to your codebase

It empowers developers, DevOps engineers, and protocol engineers to gain deep insights into their applications' performance, security, and behavior across multiple networks in real time. By using Solidity or our no-code environment, anyone can make use of Syn.

Phylax Syn is an advanced, customizable monitoring solution designed specifically for decentralized applications (DApps) and blockchain protocols.

Start Monitoring

Start Monitoring

¹Phylax states that:


We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.


If this statement is removed from future versions of this document, it is likely that Phylax has been served with a secret government subpoena and is unable to communicate this fact.


This statement will be updated on the 1st of every month.


Last updated: October 12 2024