How Credible Layer works
Proving Hacks and Vulnerabilities
White-hats can submit a Proof of Possibility or PoP, which effectively acts as a bounty system. They can also submit Proof of Realization or PoR, showing that the Assertion Enforcer didn’t do its job right.
Assertion Enforcers
Block builders validate transactions against these assertions, testing the resulting state against the assertion on what we call the PhEVM, an off-chain protocol.
Assertion Writing
Smart contracts define "hacks" in the form of EVM bytecode. These assertions are used to ensure the block builder never allows any state that is defined as a hack.
Architecture
dApps pay security fees, block builders ensure security. Each assertion is transparent, making the security measures publicly provable.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.