The Credible Layer

A network-extension that enables apps to define security rules and prevents hacks from violating them.

$16.3M
TVL deposited into protected contracts
No slowdowns
Assertions do not cause any delay to users

How leading protocols are securing capital

“I use Foundry and Solidity every day. If I don’t have to context switch, that’s much better. I am thinking about invariants as I create the test suite, so it’s easy to translate them to assertions.”
Thomas Smets
CEO, Arcadia Finance
"Current monitoring systems detect malicious patterns only after an action has been taken, and can only hope it's not an actual exploit but rather an action that could potentially lead to one. Catching a malicious transaction before it is mined would be the holy grail of monitoring."
Dariusz Glowinski
Head of Blockchain Engineering, Euler
“Lorem ipsum dolor sit amet consectetur adipiscing elit Ut et massa mi. Aliquam in hendrerit urna. Pellentesque sit amet sapien fringilla, mattis ligula consectetur, ultrices mauris. Maecenas vitae mattis tellus. Nullam quis imperdiet augue. Vestibulum auctor ornare leo, nonu. Curabitur pellentesque nibh nibh, at maximus ante.”
Lorem Ipsum
CTO of VTS Finance
“Lorem ipsum dolor sit amet consectetur adipiscing elit Ut et massa mi. Aliquam in hendrerit urna. Pellentesque sit amet sapien fringilla, mattis ligula consectetur, ultrices mauris. Maecenas vitae mattis tellus. Nullam quis imperdiet augue. Vestibulum auctor ornare leo, nonu. Curabitur pellentesque nibh nibh, at maximus ante.”
Lorem Ipsum
CEO of Linea
“Lorem ipsum dolor sit amet consectetur adipiscing elit Ut et massa mi. Aliquam in hendrerit urna. Pellentesque sit amet sapien fringilla, mattis ligula consectetur, ultrices mauris. Maecenas vitae mattis tellus. Nullam quis imperdiet augue. Vestibulum auctor ornare leo, nonu. Curabitur pellentesque nibh nibh, at maximus ante.”
Lorem Ipsum
CTO of VTS Finance
“Lorem ipsum dolor sit amet consectetur adipiscing elit Ut et massa mi. Aliquam in hendrerit urna. Pellentesque sit amet sapien fringilla, mattis ligula consectetur, ultrices mauris. Maecenas vitae mattis tellus. Nullam quis imperdiet augue. Vestibulum auctor ornare leo, nonu. Curabitur pellentesque nibh nibh, at maximus ante.”
Lorem Ipsum
CEO of Linea

Key benefits for networks

No Throughput Degradation

Assertions are executed in parallel during sequencing. We tested a 30 megagas/s and we ran 1 gigagas/s of assertions with no latency.

Sovereign Sequencing

The sequencer only removes transactions that the dApps signal should be removed, keeping the network neutral.

Attract Institutional Capital

Reduce the probability of a hack and provide easily auditable security rules, enabling more risk-averse institutions to LP and capture yield.

The days of opaque tools are over.

Enable builders on your chain to prevent hacks.

Questions frequently asked by other networks

Does the Credible Layer slow down the network?

No. We have performed worst-case stress tests, using the most inefficient operations available (hashing), to execute assertions worth 1bn gas per block without slowing down the block time. This is because the Credible Layer heavily parallelizes execution and can fully utilize CPU cores compared to standard serial execution of transactions.

Is this a form of censorship?

The Credible Layer simply lets dApps define assertions that can prevent certain states regardless of the contract code. These assertions should be thought of as an addition to the dApps’ core contracts. It would be censorship if a 3rd party (anyone other than the dApp) could write assertions for a dApp’s contracts. This is not how the Credible Layer works, and hence this is not censorship. Read more about this in "Can anyone write assertions for my contracts?" below.

Can anyone write assertions for a dApps contracts?

Anyone can write the assertions, but only the owner of the contract that the assertions protect can “activate” them. This way, we ensure that no malicious third party reduces functionality by writing assertions for your contract.

Does the Credible Layer introduce new trust assumptions or centralization points?

No. For single-sequencer L2s, users/dApps already trust the sequencer with transaction inclusion, because, in theory, a sequencer can censor transactions arbitrarily when it receives them at the RPC layer. The Credible Layer simply extends the sequencer’s validation logic with dApp-defined rules, expressed as Assertions (EVM bytecode).

Is the Credible Layer a SaaS protocol?

No. We are a permissionless protocol that enables hack definition and prevention. No APIs for dApps. No added points of failure. No additional trust assumptions.

You’re right on time, but not forever.

White House declares turnaround on crypto. America to become crypto capital of the world.

Genius Act becomes law and Clarity Acts moves forward in Congress

White House recommends circuit breakers and similar safeguards for smart contracts.

SEC’s Project Crypto clears the path for TradFi to jump into DeFi. Now, security is the only hurdle.

¹Phylax states that:


We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.


If this statement is removed from future versions of this document, it is likely that Phylax has been served with a government subpoena and is unable to communicate this fact.


This statement will be updated on the 1st of every month.


Last updated: September 1st 2025