Join the community

Security so that crypto can win.

Credible Layer FAQ

What is the Credible Layer

The Credible Security layer enables dApps to embed and verifiably enforce their rules in the base layer, enabling the world to deploy capital confidently.

What is an Assertion?

An assertion in the Credible Layer is an off-chain computation that defines invalid blockchain states, such as changes to critical variables, market manipulation, or breaches of protocol-specific rules. Executed by Assertion Enforcers and cryptographically proven on-chain when violations occur, assertions ensure these states are proactively prevented.

Do I need to change my dApp's code to use the Credible Layer?

No, the Credible Layer is non-invasive. It works independently of your existing smart contracts by letting you define custom security assertions. These assertions block transactions, leading to invalid states without requiring code changes, redeployment, or downtime.

Does a network need to change its sequencer code to support the Credible Layer?

No, the Credible Layer is designed to preserve network sovereignty. It integrates seamlessly without requiring changes to the sequencer or base-layer code. Networks retain full control while gaining the benefits of a modular, non-invasive security protocol.

Doesn’t the optimistic design introduce additional trust assumptions?

The first version of the Credible Layer targets single sequencer L2s and rollups. Because users of these L2s already trust a single entity with the responsibility of running the sequencer, no additional trust assumptions are involved. Our optimistic design prioritizes security and latency, as we don't want to increase overall latency.

How is the Credible Layer different from existing hack prevention approaches?

The Credible Layer sets itself apart by operating at the base layer, enabling comprehensive security through assertions that define and prevent invalid states. It incentivizes both prevention and reporting of exploits, resists bypassing via private mempools, and avoids the false positives common in heuristic analysis—all without compromising legitimate transactions.

Can the Credible Layer protect against all types of attacks?

It is as powerful as you make it. The Credible Layer changes the paradigm from needing to find how a hack happens, to what a hack looks like for your protocol. As long as you accurately define what a hack looks like, the base layer will ensure that state never is finalized. This design reduces complexity and is inherently proactive.

Does the Credible Layer add latency to transactions?

No. By operating off-chain, the Credible Layer ensures sub-block latency. Assertions are executed without requiring consensus, allowing the system to match or exceed the speed of the base layer.

What networks can the Credible Layer support?

Initially targeting networks built on the OP Stack, the Credible Layer's architecture is modular and designed to be compatible with multiple networks, ensuring broad applicability across the blockchain ecosystem.

As a user how can I use the Credible Layer

End-users benefit from being able to prove their funds are safeguarded via ZK proof at all times.  The days of trusting a project's security partners blindly are over.

They can also contribute by validating assertions and reporting vulnerabilities.

I am a security researcher. How do I participate?

You can earn rewards by creating security assertions or submitting proofs of vulnerabilities. Join the Assertion Market, craft assertions, or submit Proofs of Possibility/Realization to help secure dApps and monetize your expertise – no intermediaries or KYC required.