Security and Audits
Last updated
Last updated
Security is the cornerstone of the Re Protocol’s design, ensuring participant trust and the resilience of the platform. By employing rigorous security measures and conducting regular audits, the protocol safeguards its operations, funds, and smart contract integrity.
Independent Audits
The Re Protocol undergoes regular third-party audits to ensure the safety and functionality of its smart contracts and infrastructure. These audits include detailed reviews of the protocol’s codebase to identify and mitigate vulnerabilities.
Hacken Audit:
The protocol’s initial audit was conducted by Hacken, a globally recognized cybersecurity firm specializing in blockchain security.
Hacken’s report verified the robustness of the protocol’s smart contracts, highlighting their compliance with industry best practices.
Latest Audit Reports:
Emergency Mechanisms
Pause Functionality:
In the event of an emergency, the protocol includes a mechanism to immediately halt all transactions and operations. This feature ensures that funds are protected while the issue is resolved.
Recovery Wallets:
Each Insurance Capital Layer (ICL) is equipped with a designated recovery wallet to securely store funds during emergencies.
For the initial ICL, the recovery wallet address is: 0xDf6bF2713b5c7CA724E684657280bC407938F447.
Secure Infrastructure
Smart Contract Security:
All smart contracts are designed with redundancy and fail-safes to minimize risks and prevent unauthorized access.
Multi-signature (multi-sig) wallets are used for critical operations to ensure that no single entity can execute high-impact actions.
Blockchain Transparency:
The protocol’s operations are fully transparent, with all transactions recorded on-chain. This allows participants to independently verify fund movements and smart contract activities.
Compliance and Risk Mitigation
KYC and AML Processes:
The protocol employs rigorous Know Your Customer (KYC) and Anti-Money Laundering (AML) procedures, powered by trusted third-party services like Parallel Markets and Chainalysis.
Ongoing Monitoring:
Continuous monitoring of wallet activities and risk profiles ensures that all participants comply with regulatory requirements.
Participant Assurance
Real-Time Reporting:
Participants can monitor their assets and the protocol’s performance through detailed, real-time dashboards.
Insurance for Custodial Risks:
The protocol is exploring partnerships to provide additional layers of protection against custodial and operational risks.
By prioritizing security and compliance, the Re Protocol creates a safe and transparent environment for participants to engage with the reinsurance market. These measures reinforce trust, enabling the protocol to operate as a resilient and reliable platform for capital allocation.