MethLab Security Methodology
SUMMARY
MethLab's multi-layered approach to security. Learn how the protocol tackles security at each level through a comprehensive waterfall model.
MethLab follows a comprehensive, multi-layered security approach. Our primary goal is to safeguard our users' assets while maintaining a seamless and efficient user experience. This document outlines our security methodology. Key stages of our approach:
Architecture Design and Review
Code Development and Review
Pre-Deployment Testing
Post-Deployment Monitoring and Maintenance
null
Information
MethLab will be releasing documentation and findings from each step. Follow this page for latest updates and releases.
Architecture Design and Review
Step 1: Architecture Formulation
- Creating a resilient and scalable system, integrating best practices in smart contract development.
- Key components: risk assessment models, collateral management, and abstractions.
Step 2: Expert Review
- Review by external experts in DeFi.
- Scrutinization of architecture for potential vulnerabilities and scalability issues.
Code Development and Review
Step 3: Code Development
- Translation into Solidity and helper infrastructure.
- Development of robust engineering practises.
Step 4: Internal Code Review
- Intensive internal review: Manual testing, financial testing, fuzzing.
- Checks for bugs, vulnerabilities, and compliance with the initial design specifications.
Step 5: External Code Audits
- Reputed auditing firms with a track record in DeFi projects are hired.
- Uncover any overlooked issues and validate the security practices.
Pre-Deployment Testing
Step 6: Testnet Deployment
- Prior to mainnet launch, deployment of the protocol on testnets.
- Monitor the protocol's performance under varied conditions without risking real assets.
Step 7: Bug Bounty Programs
- Engage the wider community through bug bounty programs.
- Incentivize the discovery and reporting of vulnerabilities, further strengthening the security of the protocol.
Post-Deployment Monitoring and Maintenance
Step 8: Mainnet Launch
- The protocol is deployed on the mainnet.
- Maintnet Testing of all cases for final verification.
Step 9: Continuous Monitoring
- Post-deployment, implement active monitoring systems.
Step 10: Ongoing Audits and Updates
- Commit to regular audits even after deployment.
- Stay up-to-date of any security related disclosures.