Monitoring Framework
Our security operations provides 24/7/365 monitoring of the Usual protocol. This ensures that any potential issues or anomalies are detected and addressed promptly.
Passive Monitoring
This foundational level focuses on monitoring the critical components that form the backbone of our protocol's security:
Critical Role Monitoring: Continuous tracking of all accounts with elevated privileges within the system.
Multisig Activity: Real-time monitoring of all multisignature wallet activities to ensure proper authorization of significant actions.
Key Event Tracking: Vigilant observation of crucial events such as:
Changes in role assignments
Updates to proxy implementations
Administrative changes
Any activity at this level triggers immediate notifications to our security team for verification and response.
Active Monitoring
This level involves monitoring the operational aspects of our protocol to detect any deviations from expected behavior:
Contract State Changes: Tracking significant state changes across all protocol contracts.
Mechanism Monitoring: Continuous oversight of key protocol mechanisms, including:
Collateral Backing Ratio (CBR) activations and deactivations
Pausing and unpausing of contract functionalities
Activities within the DaoCollateral and SwapperEngine contracts
Threshold Alerts: Notifications triggered by unusual transaction volumes, large token movements, or unexpected price fluctuations.
Anomalies detected at this level prompt immediate investigation by our security and development teams.
Automated defense mechanisms
Our highest level of security involves automated circuit breakers that immediately pause contract operations in response to critical security events:
Asset Protection: Automatic pause triggers in response to suspicious movement of protocol funds
Protocol Integrity: Immediate response to unexpected changes in core protocol metrics, balances, and under collateralization.
Access Security: Detection and response to potential security access anomalies
Smart Contract Safety: Automated protection against suspicious contract interactions that could impact protocol security
These automated defense mechanisms serve as the protocol's last line of defense, automatically pausing relevant contract operations when critical security thresholds are breached. This "circuit breaker" approach ensures the protocol can enter a safe state while our security team investigates and responds to potential threats.
Last updated
Was this helpful?