Security overview

Security is enforced through explicit boundaries, verification flows, and transparent on-chain records.

Security practices

We use responsible disclosure and continuous review to improve reliability and transparency.