Security Policy
Effective Date: 17 July 2025
At Solken, the security of our users, infrastructure, and ecosystem is our highest priority. This Security Policy outlines the measures we take to protect data, transactions, wallets, and smart contracts associated with the Solken Layer 2 protocol.
1. Platform Architecture
Solken is built on a modular and secure Layer 2 framework that operates on top of the Solana blockchain. Our protocol isolates execution and settlement layers to reduce attack vectors and improve scalability.
2. Smart Contract Security
- All Solken smart contracts are developed following industry-standard secure coding practices.
- Each contract undergoes manual code review and automated static analysis.
- Third-party independent security audits are performed prior to deployment.
- Upgradability is restricted and controlled via time-locked governance processes.
3. Infrastructure and Network Security
- Our nodes and backend services are hosted on secure, encrypted cloud infrastructure.
- Firewalls, DDoS mitigation systems, and multi-layered access controls are in place.
- Private keys are stored in hardware wallets or HSM modules.
4. Wallet & Key Management
- Solken never stores users' private keys.
- Wallet integration relies on trusted third-party providers such as Phantom, Solflare, or Ledger.
- Users are responsible for securing their own seed phrases and private keys.
5. Data Protection
- All user data is encrypted in transit (TLS 1.2+) and at rest.
- We implement strict access control, data minimization, and activity logging.
- KYC/AML data, where applicable, is handled by regulated and certified providers.
6. Bug Bounty Program
We encourage responsible disclosure. If you discover a vulnerability in the Solken ecosystem, please report it to our security team. Eligible reports may be rewarded under our official bug bounty program.
📩 Report bugs: pre-sale@solken.co
7. Incident Response
We have a dedicated internal security team monitoring for suspicious activity 24/7. In case of a breach:
- Users will be notified promptly
- All affected systems will be isolated
- Forensic analysis and patching will be initiated immediately
8. User Responsibilities
Users must:
- Use strong passwords and 2FA where applicable
- Never share private keys or seed phrases
- Report suspicious activity immediately
9. Policy Updates
This policy may be updated periodically. Any material changes will be communicated through official channels.
10. Contact & Socials
If you have security concerns or questions:
📩 pre-sale@solken.co
Stay connected:
Your security is our shared responsibility. Thank you for trusting Solken.