Skip to main content

Our Approach

Security is foundational to Tori Finance. We employ a defense-in-depth strategy with multiple layers of protection, partnering with industry-leading security providers to safeguard user assets. Our security philosophy: trust but verify. Every critical component is independently audited, monitored, and attested.

Security Partners

We work exclusively with established, reputable security providers:

Sherlock

Smart Contract AuditsComprehensive audits with ongoing bug bounty coverage

Hypernative

Real-Time MonitoringAI-powered 24/7 threat detection and prevention

Accountable

Proof of ReservesIndependent, real-time reserve attestations

Smart Contract Security

Audits by Sherlock

All Tori smart contracts are audited by Sherlock, a leading smart contract security platform protecting over $50 billion in assets across Web3.
What’s AuditedDescription
Core ProtocolMain protocol contracts and logic
Staking ContractsstrUSD staking and unstaking
Access ControlAdministrative functions and permissions
IntegrationsThird-party integrations and bridges
View Audit Reports →

Bug Bounty Program

We maintain an active bug bounty program through Sherlock to incentivize responsible disclosure of potential vulnerabilities. How it works:
  • Security researchers can report vulnerabilities for rewards
  • Severity-based payouts for valid findings
  • Responsible disclosure process
  • Quick response to reported issues

Real-Time Monitoring

Hypernative Protection

Hypernative provides AI-powered threat detection with comprehensive monitoring:
CapabilityDescription
24/7 SurveillanceContinuous automated monitoring of all protocol activity
Anomaly DetectionAI identifies unusual patterns that may indicate threats
Instant AlertingImmediate notifications on suspicious activity
Proactive PreventionAutomated response to detected threats
Risk ScoringContinuous assessment of protocol risk levels

What We Monitor

  • Smart contract interactions
  • Large or unusual transactions
  • Governance activities
  • Known attacker addresses
  • Protocol parameter changes
  • External dependencies

Proof of Reserves

Accountable Attestations

Accountable provides real-time, independent attestations on reserves and financials. This transparency enables anyone to verify the backing of trUSD at any time. What’s attested:
  • Total assets under management
  • Asset composition
  • Liability coverage ratio
  • Reserve fund status
  • Custody verification

Why This Matters

Unlike traditional finance where you trust institutions with your assets, Tori’s Proof of Reserves allows cryptographic verification:
  • Independent - Third-party attestation, not self-reported
  • Real-time - Continuous verification, not periodic
  • Verifiable - Anyone can check at any time
  • Transparent - Full visibility into backing

Asset Security & Custody

All assets are held in institutional-grade secure custody:

On-Chain Assets

Security LayerImplementation
Audited ContractsAll contracts audited by Sherlock
Multi-SignatureCritical operations require multiple approvals
Time LocksDelays on sensitive parameter changes
Access ControlRole-based permissions for all functions

Off-Chain Assets

Security LayerImplementation
Institutional CustodiansQualified custodians with insurance
Segregated AccountsUser funds separate from operations
Counterparty StandardsRigorous due diligence on all partners
Geographic DiversificationReduce single-point-of-failure risk
User funds are never commingled with operational funds. All assets are held in segregated accounts with qualified custodians.

Operational Security

Our team follows strict operational security practices:

Access Control

PracticeDescription
Multi-Factor AuthenticationRequired for all team access
Hardware Security ModulesFor key management and signing
Principle of Least PrivilegeMinimal access for each role
Regular Access ReviewsPeriodic audits of access rights

Incident Response

PhaseActions
DetectionAutomated monitoring and alerting
AssessmentRapid triage and severity classification
ContainmentImmediate steps to limit impact
RemediationFix underlying issues
CommunicationTransparent updates to users
Post-MortemAnalysis and preventive measures

Responsible Disclosure

Reporting Vulnerabilities

If you discover a security vulnerability, please report it responsibly: Email: security@tori.finance
Please do NOT:
  • Publicly disclose vulnerabilities before they’ve been addressed
  • Exploit vulnerabilities beyond what’s needed to demonstrate the issue
  • Access or modify other users’ data

What to Include

When reporting:
  • Detailed description of the vulnerability
  • Steps to reproduce
  • Potential impact assessment
  • Suggested fix (if any)

Our Commitment

  • Acknowledge receipt within 24 hours
  • Provide updates on remediation progress
  • Credit reporters (if desired) after fixes are deployed
  • No legal action against good-faith researchers

Continuous Improvement

Security is an ongoing process, not a destination. Our approach:
PracticeDescription
Ongoing AuditsRegular reviews as the protocol evolves
Bug BountyIncentivize white-hat discovery of issues
24/7 MonitoringReal-time threat detection and response
Industry Best PracticesStay current with security developments
While we employ extensive security measures, no system can guarantee perfect security. Audits are point-in-time assessments, and new challenges can emerge. This is why we use multiple layers of protection. See Risk Disclosures for more information.

Next Steps