Skip to main content
TAC implements a comprehensive security framework with multiple layers of protection, professional audits, and continuous monitoring to ensure the safety of hybrid dApps and user assets.

Multi-Layer Security Architecture

TAC’s security model operates across multiple layers to provide comprehensive protection for users and applications.

TON Adapter Security

The TON Adapter implements distributed architecture with multiple validation layers:
Current State: TON Adapter operates with distributed sequencer groups providing redundancy.Future Decentralization: Architecture designed for progressive decentralization as the network matures.
Multi-Group Validation: Cross-chain messages require consensus from multiple independent sequencer groups.Economic Stakes: Sequencers stake collateral to participate in validation, creating financial incentives for honest behavior.Cryptographic Proofs: All cross-chain operations protected by Merkle proofs and cryptographic verification.
Asset refund: Automatic refund of locked assets if cross-chain transaction fails for any reason.
It also provides economic security:
Every sequencer group must stake collateral:
  • Minimum stake set by DAO governance
  • Higher stakes earn proportionally higher rewards
  • Stake must remain above threshold during participation
  • Partial stake locking during proof submission
Performance-based incentives:
  • Rewards distributed proportionally to stake size
  • Executor selection based on collateral weight
  • Commission sharing within groups
  • Penalty mechanisms for incorrect operations
Democratic group selection:
  • New groups approved through DAO voting
  • Regular election cycles (DAO configurable)
  • Performance monitoring and rating systems
  • Penalty applications and network-wide voting

EVM Layer Security

TAC EVM undergoes comprehensive security audits by industry-leading firms to ensure the highest security standards. You can review the completed ones on this page. New reports will appear as the protocol evolves and new features are added.
Modern EVM Implementation: TAC EVM is based on the Cancun upgrade, incorporating the latest Ethereum security improvements and optimizations.Proven Technology: Built on battle-tested EVM specifications with all security features and protections of modern Ethereum networks.Standard Compliance: Full compatibility with Ethereum security models ensures familiar security guarantees for developers.
TAC Token Security: Network consensus secured by delegated Proof of Stake using $TAC tokens as the staking mechanism.Validator Incentives: Economic incentives align validator behavior with network security through staking rewards and slashing penalties.Distributed Validation: Multiple independent validators secure the network through distributed consensus mechanisms.

Continuous Monitoring

TAC implements 24/7 security monitoring and incident response capabilities to detect and respond to potential threats.

Real-Time Threat Detection

24/7 Security Monitoring: Hypernative provides continuous monitoring of TAC networks, detecting potential exploits and anomalous behavior.Mempool-Level Detection: Advanced monitoring capabilities detect suspicious transactions at the mempool level before they’re executed.Real-Time Alerts: Immediate notifications for potential security threats enable rapid response and mitigation.
24/7 Security Operations: Fully dedicated Security Operations Center (SOC) team monitoring TAC infrastructure around the clock.Incident Response: Trained security professionals ready to respond to any security incidents or threats.Proactive Monitoring: Continuous analysis of network activity and security metrics to identify potential issues before they become problems.

Future Enhancements

TAC has planned significant security upgrades that will provide additional layers of protection and decentralization.

1. FROST Consensus Upgrade

Already live on TAC Testnet!
Planned migration to FROST-Ed25519 threshold signatures with Distributed Key Generation (DKG).
Enhanced Cryptographic Security:
  • Threshold signature creation requires t+1 out of n participants
  • Attackers controlling up to t participants cannot forge signatures
  • Ed25519 compatibility with existing verification systems
  • Round-optimized design minimizes communication overhead

2. Babylon Bitcoin Restaking Integration

TAC plans integration with Babylon’s Bitcoin restaking protocol to add massive economic security:
Leveraging Bitcoin’s Economic Strength:
  • Bitcoin holders delegate BTC stakes to Babylon validators
  • Validators cryptographically verify TAC EVM blocks and Merkle roots
  • Self-custodial delegation maintains decentralization without custody risk
  • Exponentially increases attack costs through Bitcoin’s security budget
Economic Penalties for Malicious Behavior:
  • Validators providing conflicting signatures face automatic slashing
  • Double-signing detection through Babylon protocol mechanisms
  • Direct economic penalties via Bitcoin blockchain enforcement
  • Makes attacks economically irrational at Bitcoin-scale security

Bug Bounty Program

Bug bounty program is live!
Reward Security Research: We are ready to reward security researchers for discovering vulnerabilities. Reach out to our Discord. Responsible Disclosure: Clear processes for responsible vulnerability disclosure and coordinated fixes.