Security
Ember Security and Infrastructure
At Ember Protocol, every layer, from vault architecture to strategy management, is designed with continuous assurance in mind. Ember Protocol was co-incubated by teams that have built battle-tested infrastructure that manages over $700M in assets and have had zero security incidents in over 4 years of operating. Security at Ember begins with code and extends into process. Assurance is continuous, not point in time.
Two independent full audits completed by OtterSec and Asymptotic (here’s the audit)
Formal verification in progress to mathematically prove key invariants (available mid-November)
Continuous retainer partnerships with OtterSec and Asymptotic, meaning no new code ships without their review of pull requests.
Active bug bounty partnership with HackenProof (Bug Bounty)
Secure development lifecycle with mandatory peer review, automated invariant testing, and CI/CD integration.
This model replaces point-in-time audits with an active assurance loop. The same engineers and security teams stay engaged across the entire development lifecycle, ensuring every release inherits the context of the last.
We extend that philosophy beyond code through layered defence and containment. Risk is modelled across smart contract, market, integration, operational, and user domains, each with built-in circuit breakers that enforce limits, delay withdrawals, validate oracles, and trigger alerts. This creates mechanical containment: when anomalies occur, the system remains controlled, visible, and recoverable. Real-time monitoring through Guardrail ensures that every invariant and circuit breaker is continuously observed and acted upon, transforming potential threats into manageable events.
Finally, Ember curates what it connects to. Only audited, battle-tested protocols and proven institutional curators like MEV Capital and Gamma are approved. Transparency completes the loop: public audits, formal verification reports, live monitoring dashboards, verified builds, and an open bug bounty. Security at Ember is not promised; it’s proven, visible, and continuously verified.
Last updated