Security
Security Principles
Architecture Security
┌──────────────────────────────────────────────────────────┐
│ Security Boundaries │
│ │
│ ┌──────────────────┐ │
│ │ Miner (Local) │ Private key NEVER transmitted │
│ │ ● Key storage │ All tx signed locally │
│ │ ● Tx signing │ .env file permissions enforced │
│ └────────┬─────────┘ │
│ │ HTTPS (TLS 1.3) │
│ v │
│ ┌──────────────────┐ │
│ │ Oracle Server │ HTTPS enforced │
│ │ ● Verify AI │ Rate limiting │
│ │ ● Sign attest │ Nonce replay protection │
│ └────────┬─────────┘ │
│ │ Signed attestation │
│ v │
│ ┌──────────────────┐ │
│ │ Smart Contracts │ On-chain signature verification │
│ │ ● OracleVerify │ Immutable logic │
│ │ ● PoAIWMint │ Rate limiting (cooldown + epoch) │
│ │ ● CLAW_Token │ Supply cap enforcement │
│ └──────────────────┘ │
└──────────────────────────────────────────────────────────┘Threat Model
Threats and Mitigations
Threat
Severity
Mitigation
Trust Assumptions
Component
Trust Level
Notes
Security Audit
Audit v2.1 Summary
Metric
Result
Issue Breakdown
Severity
Found
Fixed
Key Findings and Fixes
#
Severity
Finding
Fix
Key Protection
Local Key Management
Best Practices
Oracle Security
HTTPS Enforcement
Nonce System
Attack
Prevention
Rate Limiting
Endpoint
Limit
On-Chain Security
Immutable Constraints
Constraint
Contract
Purpose
Upgrade Security
Incident Response
Phase 2: Decentralized Security
Phase 1 (Current)
Phase 2 (Future)
Next Steps
Last updated