Atlas Protocol Docs
  • Introduction
    • What is Atlas Protocol?
    • Understanding the Bitcoin Landscape
    • The Problem
    • The Solution
  • Atlas Protocol Basics
    • Multi-chain Bitcoin Liquid Staking
    • Security
    • Decentralization
    • Custody
    • How Atlas Works
    • atBTC (Atlas Bitcoin)
    • Yield Generation
    • Chain Abstraction on NEAR
  • 'The First Pillar' Testnet
    • Quest 1 - Walkthrough Guide
    • Quest 2 - Walkthrough Guide
    • Quest 3 - Walkthrough Guide
    • Quest 4 - Walkthrough Guide
    • Quest 5 - Walkthrough Guide
  • Advanced Process Flows
    • Deposit BTC Process Flow
    • Redeem atBTC Process Flow
  • Roadmap
  • Links
Powered by GitBook
On this page
  • Security Audit (Under Review)
  • Native vs. Wrapped or Bridged BTC
  • Real-time Protocol Monitoring
  • Secure MPC Infrastructure
  1. Atlas Protocol Basics

Security

The #1 priority for Atlas Protocol is the security of users' assets. This is achieved through a carefully crafted array of security measures outlined below.

Security Audit (Under Review)

We're currently undergoing a security audit by Halborn, a leading blockchain security firm. This audit will thoroughly examine the protocol's smart contracts, architecture, and overall security posture.

Native vs. Wrapped or Bridged BTC

By utilizing native Bitcoin staking instead of wrapped or bridged BTC, Atlas Protocol significantly reduces potential attack vectors associated with cross-chain bridges and centralized custodians.

Real-time Protocol Monitoring

Atlas employs both internal and external advanced monitoring systems to track the protocol's operations in real-time, allowing for quick detection and response to any anomalies or potential security threats. We have engaged a third party, 24/7 security monitoring firm and also built our own network of validator nodes to validate transactions, including block-by-block proof of reserves.

Secure MPC Infrastructure

Leveraging NEAR's Multi-Party Computation (MPC) nodes enhances the security of cross-chain operations and key management, providing an additional layer of protection for user assets.

PreviousMulti-chain Bitcoin Liquid StakingNextDecentralization

Last updated 6 months ago