Core Security Principles
Surge’s security posture is structured around architectural constraints rather than procedural controls.
Non-Custodial by Design Surge does not assume custody of user assets or private keys. Asset control remains external to the protocol’s execution boundary.
Layered Containment Security boundaries are enforced at multiple architectural layers. A compromise in one component does not automatically grant authority over ordering, execution, or settlement.
Zero Implicit Trust Access and authority are conditionally granted based on measurable state and defined validation rules. No participant or component is granted unilateral execution or settlement authority by default.
Last updated