Security program built for encrypted cross-chain routing
Learn how Lunarys defends the DEX with confidential encryption, attested infrastructure, and real-time detection built for institutional throughput.
Hardware-backed isolation
Validator and relayer clusters run inside hardware security modules and SGX enclaves. Signing keys never leave the enclave boundary, and release policies must be satisfied before any transaction is finalized.
- Remote attestation on every boot with tamper-evident logs
- Threshold signatures across independent compute zones
- Immutable deployment manifests reviewed by a dual-control team
End-to-end encrypted payloads
DEX requests are encrypted with FHE before touching public infrastructure. Even when transactions are pending on-chain, the decrypted destination and amount remain private until proofs unlock the release circuit.
- Homomorphic encryption keeps routing data unreadable to operators
- FHE proofs bind encrypted payloads to policy decisions
- Encrypted ledger mirrors retain no user-identifying metadata
Continuous monitoring and response
Every relayer event streams into our threat graph. Velocity rules, MEV simulations, and anomaly scoring trigger circuit breakers that can halt payout flows in under three seconds.
- 24/7 protocol operations with on-call escalation
- Automated rollback to safe-mode circuits after failed attestations
- Shared incident channel for institutional desks with runbook delivery
Independent assurance
Our control surface is audited by multiple third parties and red-team engagements every quarter. Findings are tracked publicly and patched within defined SLAs.
- Smart contracts: Quantstamp, Zellic, and Trail of Bits
- Infrastructure: OtterSec adversarial testing
- Privacy stack: FHE review and cryptography validation
Need the full security dossier?
Request the detailed security whitepaper, compliance mappings, and compensating controls documentation.