⚡
Zeebu Protocol
Stake NowDune AnalyticsDefiLlama
  • 📣ZBU Protocol
    • ZBU Legacy
    • Protocol Simplified
    • Ecosystem Participants
      • Delegators
      • Locked ZBU (VeZBU)
      • On-Chain Clearing House (OCH)
      • OLP
      • Penalty
    • Security
      • Key Addresses
      • Transparency
    • User Guide
      • User Onboarding
      • Login & Dashboard
      • How to change "Blockchain"
      • Stake ZBU
      • How To Add & Stake Liquidity (LP)
      • How to Buy/Swap ZBU
      • How to become Deployer
    • Announcements
Powered by GitBook
On this page
  • Zeebu Protocol Audits:
  • Key Fundamentals for the security

Was this helpful?

Export as PDF
  1. ZBU Protocol

Security

Security in ZBU Protocol is multifaceted, focusing on protecting the blockchain infrastructure, user transactions, and data integrity. This section introduces the comprehensive security strategies implemented, including encryption methods, smart contract auditing, network surveillance, and contingency plans for potential breaches. It underscores ZBU Protocol's commitment to creating a secure and trustworthy environment for its participants, reflecting the latest advancements in blockchain security and risk management

Zeebu Protocol Audits:

Scope
Company
Report

OCH - Invoice Settlement Dapp

Certik

ZBU Token BASE chain

Hacken

Voting Escrow, Reward Distributor, Launchpad, Lens

Certik

Balancer Vault, Weighted Pool, Stable Pool

Certora

Voting Escrow, Reward Distributor, Launchpad, Lens

Trail of Bits

Voting Escrow, Reward Distributor, Launchpad, Lens

Openzepplin

Voting Escrow, Reward Distributor, Launchpad, Lens

Hacken

Balancer Vault, Weighted Pool, Stable Pool

Trail of Bits

Voting Escrow, Reward Distributor, Launchpad, Lens

Certora

Key Fundamentals for the security

  1. Code Review and Auditing:

    • Regularly Smart-Contract Audits and Pentest with thorough code reviews, security audits, Grey-box testing along with Application code, and deployer daemon.

  2. Authentication and Authorization:

    • Strong authentication and authorization mechanisms with ECC to ensure that only authorized deployers can initiate deployments. Multi-factor authentication (MFA) for additional layer of security

  3. Encryption and Secure Communication Channels:

    • SHA-256 Encryption is used to protect data in transit and ensure that all communication between deployers and the blockchain network is conducted over secure channels.

  4. Regular Updates and Patch Management:

    • All software components of the Platform, Application & deployer daemon are updated with the latest security patches and updates recommended by Community and active hackathon participations

  5. Intrusion Detection and Prevention Systems:

    • Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are deployed to monitor network traffic for suspicious activities and block potential threats.

  6. Access Control and Least Privilege:

    • Principle of least privilege and Whitelisted IPs are implemented to all system components, ensuring that each part of the system has only the access necessary to perform its function.

  7. Rate Limiting and Throttling:

    • Rate limiting and throttling is implemented to prevent abuse of the deployment system, using denial-of-service protection and secure network

  8. Logging and Monitoring:

    • Comprehensive logs of all activities are updated and regularly monitored for signs of unauthorized access or unusual behavior.

  9. KYT Screening

    • All incoming and outgoing transactions intracting within the pools are screened using chainalysis for proper compliance and AML screening.

Zeebu's security measures go beyond surface-level precautions. The protocol has undergone rigorous audits by six industry-leading firms: . Each brings unique expertise to scrutinize different aspects of Zeebu's architecture.


These audits dissect smart contracts, examine tokenomics, and stress-test network resilience. They uncover potential vulnerabilities before malicious actors can exploit them. While no system is invulnerable, Zeebu's multi-layered approach to security audits demonstrates a commitment to safeguarding user assets and maintaining the integrity of its decentralized ecosystem.

PreviousPenaltyNextKey Addresses

Last updated 2 months ago

Was this helpful?

📣
July 2, 2023
July 18, 2024
July 29, 2024
Sep 4, 2024
Sep 9, 2024
Sep 13, 2024
Oct 1, 2024
Oct 8, 2024
Feb 7, 2025