• Security

  • Infrastructure Security

    • Network Protection

      • All public endpoints use TLS 1.3 encryption
      • DDoS protection at the reverse proxy layer
      • Rate limiting to prevent abuse
      • Regular security updates and patching
    • Access Control

      • Infrastructure servers use key-based SSH authentication
      • Two-factor authentication required for operators
      • Principle of least privilege for service accounts
    • Monitoring

      • 24/7 automated monitoring with alerting
      • Intrusion detection systems
      • Regular log analysis
  • Blockchain Security

    • Consensus

      • Bostrom uses CometBFT (Tendermint) consensus
      • Byzantine fault tolerant up to 1/3 malicious validators
      • GPU-based proof-of-work component for ranking
    • Validators

      • 100 active validators secure the network
      • Delegated Proof-of-Stake (DPoS) model
      • Slashing for double-signing and downtime
    • Smart Contracts

      • CosmWasm-based smart contracts
      • Permissioned deployment (governance approval required)
      • Code review recommended before interaction
  • User Security Best Practices

    • Wallet Security

      • βœ… Use hardware wallets (Ledger) when possible
      • βœ… Keplr through Ledger is the recommended setup
      • βœ… Never share your seed phrase
      • βœ… Verify transaction details before signing
      • ⚠️ Be cautious of phishing sites claiming to be cyb.ai
    • Verifying Authenticity

      • Official domain: cyb.ai (not cyb.io, cyb.net, etc.)
      • Check SSL certificate: Should be valid and issued to the correct domain
      • IPFS version: cyb.ai is also available via IPFS for censorship resistance
    • IBC Transfers

      • Always double-check recipient addresses
      • Use small test transfers first for new addresses
      • Be aware of timeout periods (usually 10 minutes)
  • Responsible Disclosure

    • If you discover a security vulnerability:
      • DO NOT disclose publicly before it’s fixed
      • Contact the team via:
        • Telegram: DM to @groovybear (mastercyb)
        • Email: security concerns to the core team
      • Provide detailed reproduction steps
      • Allow reasonable time for fixes
  • Incident Response

    • In case of security incidents:
      • Infrastructure team is alerted via monitoring
      • Critical issues trigger immediate response
      • Post-mortems are published for significant incidents
  • Audits

    • ComponentAudit Status
      go-cyberCommunity reviewed, no formal audit
      CosmWasm contractsPer-contract basis
      InfrastructureRegular security reviews
  • Known Risks

    • Smart Contract Risk

      • Contracts may contain bugs; verify before interacting
    • Centralization Risk

      • Validator set concentration β€” stake with diverse validators
    • IBC Risk

      • Cross-chain transfers depend on relayer availability
      • Tokens can be stuck if channels expire (recoverable via governance)
    • Regulatory Risk

      • Cryptocurrency regulations vary by jurisdiction
  • Security Updates