Skip to main content

Threat Model

CRYMBO's security architecture is designed to defend against the following threat categories.

Threat Categories

ThreatMitigation
Man-in-the-middleTLS 1.3 for all communications; end-to-end encryption for PII
Unauthorized data accessRole-based access, jurisdiction scoping, all access audit-logged
Validator collusionQuorum-based consensus; slashing for malicious behavior; stake requirements
Key compromiseImmediate key revocation; HSM-backed storage recommended; rotation policies
On-chain data exposureNo PII on-chain — only attestation hashes and signatures
Replay attacksNonce-based request validation; timestamp verification
DDoSRate limiting, CDN protection, auto-scaling infrastructure
Smart contract exploitsFormal verification; multi-sig admin controls; bug bounty program
Insider threatSeparation of duties; encrypted data; audit logging

Security Testing

  • Penetration testing — Conducted annually by independent security firm
  • Bug bounty program — Public program for responsible disclosure
  • Code audits — Smart contracts audited before mainnet deployment
  • Continuous monitoring — 24/7 infrastructure and anomaly monitoring