Prevent hacks

before they happen

The Credible Layer is a network extension that enables apps to define security rules and prevents transactions from violating them.

Write, test, and link your first assertion.

Network level, rule-based security.

Every transaction is validated at the sequencer level, dropping any transaction that violates your security rules, before execution.

This deterministic approach means a quick, impassable system that has no false positives. No AI guesswork. Just binary enforcement that prevents hacks, using rules you define.

Easy to use.

Write security rules in Solidity that are faster and more expressive than in-contract require statements.

No new languages, no contract modifications, and no downtime during implementation.

Test and develop your assertions with our fork of Foundry to check when your assertion is triggered and invalidated.

Verifiable and transparent.

Users can verify exactly which assertions protect their favorite protocols, while developers can adopt battle-tested security rules from similar contracts.

Transparency creates a security network effect where each prevented hack strengthens the entire ecosystem.

First, define your rules

Select your use case.

Write and test your assertions.

Store to assertion DA.

Next, submit for network enforcement

Register assertions

Network runs your assertions...

...And drops each one that breaks your rules

Security that goes beyond heuristics

Predictive modelling
Security Model
Phylax:
Deterministic
Competitors:
Predictive
Transparency
Phylax:
Tablestakes blockchain transparency
Competitors:
Black box algorithms
Infrastructure
Phylax:
Integrated with the rollup
Competitors:
External services
Prevention vs. Detection
Phylax:
Prevents invalid transactions
Competitors:
Detects attacks as or after they occur
Implementation Complexity
Phylax:
Write assertions in Solidity
Competitors:
Many platforms; many languages
Trust Model
Phylax:
Same as the network
Competitors:
Centralized
Governance
Phylax:
Vote to push assertions live
Competitors:
Centralized third-party control
The Credible Layer
Deterministic
Tablestakes blockchain transparency
Integrated with the rollup
Prevents invalid transactions
Write assertions in Solidity
Same as the network
Vote to push assertions live
Incident Response & Anomaly Detection
Predictive
Black box algorithms
External services
Detects attacks as or after they occur
Many platforms; many languages
Centralized
Centralized third-party control

Explainers and Guides

Explainers and Guides

¹Phylax states that:


We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.


If this statement is removed from future versions of this document, it is likely that Phylax has been served with a government subpoena and is unable to communicate this fact.


This statement will be updated on the 1st of every month.


Last updated: July 3 2025