Phylax believes the most interesting problems to solve in crypto are its deepest problems. In order to truly create something better, we have to shake crypto out of its worst habits.
We are at war. We need tools that can actually protect capital and preserve dignity.
Question futility.
Question digital feudalism.
Question dogma.
The Credible Security layer enables dApps to embed and verifiably enforce their rules in the base layer, enabling the world to deploy capital confidently.
An assertion in the Credible Layer is an off-chain computation that defines invalid blockchain states, such as changes to critical variables, market manipulation, or breaches of protocol-specific rules. Executed by Assertion Enforcers and cryptographically proven on-chain when violations occur, assertions ensure these states are proactively prevented.
No, the Credible Layer is non-invasive. It works independently of your existing smart contracts by letting you define custom security assertions. These assertions block transactions, leading to invalid states without requiring code changes, redeployment, or downtime.
No, the Credible Layer is designed to preserve network sovereignty. It integrates seamlessly without requiring changes to the sequencer or base-layer code. Networks retain full control while gaining the benefits of a modular, non-invasive security protocol.
The first version of the Credible Layer targets single sequencer L2s and rollups. Because users of these L2s already trust a single entity with the responsibility of running the sequencer, no additional trust assumptions are involved. Our optimistic design prioritizes security and latency, as we don't want to increase overall latency.
The Credible Layer sets itself apart by operating at the base layer, enabling comprehensive security through assertions that define and prevent invalid states. It incentivizes both prevention and reporting of exploits, resists bypassing via private mempools, and avoids the false positives common in heuristic analysis—all without compromising legitimate transactions.
It is as powerful as you make it. The Credible Layer changes the paradigm from needing to find how a hack happens, to what a hack looks like for your protocol. As long as you accurately define what a hack looks like, the base layer will ensure that state never is finalized. This design reduces complexity and is inherently proactive.
No. By operating off-chain, the Credible Layer ensures sub-block latency. Assertions are executed without requiring consensus, allowing the system to match or exceed the speed of the base layer.
Initially targeting networks built on the OP Stack, the Credible Layer's architecture is modular and designed to be compatible with multiple networks, ensuring broad applicability across the blockchain ecosystem.
End-users benefit from being able to prove their funds are safeguarded via ZK proof at all times. The days of trusting a project's security partners blindly are over.
They can also contribute by validating assertions and reporting vulnerabilities.
You can earn rewards by creating security assertions or submitting proofs of vulnerabilities. Join the Assertion Market, craft assertions, or submit Proofs of Possibility/Realization to help secure dApps and monetize your expertise – no intermediaries or KYC required.