Security
Security Management approaches adopted by RiskShield.
DeFi applications are constantly exposed to cybersecurity risks. RiskShield intends to resolve these risks through well-designed cover products. But to be able to do so, RiskShield has to ensure the integrity of its own systems and smart contracts, which is why security is paramount to the RiskShield protocol, even more so than for other protocols. To build a highly secure and resilient protocol, RiskShield adopts the best security practices in the industry, such as:
(1) Deploy up-to-date security solutions
RiskShield has adopted solutions to survey and enhance the platform's security, such as monitoring the network's health status, on-chain activities, oracle dependencies, and admin key details. At the same time, the RiskShield protocol continues to explore and adopt the best security features available.
(2) Develop effective security incident response processes
In the event of a security breach, RiskShield's security team has the following contingency plans in place:
Suspending or terminating some or all functions of smart contracts.
Adding a pending session to some suspicious and large transactions.
Reverting suspicious transactions and tracing them back to the root cause.
RiskShield understands that security will always be an area of concern and has made it an integral part of its operations, not least because it is a cover provider. With security built into every facet of the protocol, RiskShield believes it is well placed to protect users in the space.
Last updated