Security and Abuse Prevention
The paradox of building a “chaos tool” is that it can itself be abused if not carefully controlled. Key security considerations Glitch Gremlin takes:
Multi-sig Control: The upgrade authority for the program and mint is locked behind a multi-sig. This prevents unilateral changes or malicious re-deployments.
Request Throttling: We rate limit how many chaos requests can be initiated within a certain time to avoid spam or overloading the system.
KYC or Access Controls (Coming Soon): In advanced scenarios, the team may require certain verifications for large-scale or potentially destructive chaos tests, especially if they risk collaterally damaging public networks.
Verified Off-Chain Engine: The AI engine signs finalization transactions with a known, verifiable keypair. This ensures that only the official chaos simulations can mark requests as completed.
Third-Party Audits: Coming Soon
Last updated