Insider Threat

An insider threat occurs when an individual with authorized access to a protocol's systems or keys uses that access for malicious purposes. This could be a developer, a system administrator, or a member of the governance team.

Because they already have the necessary permissions, their actions are often harder to detect than external attacks. Preventing insider threats requires strict separation of duties, comprehensive logging, and multi-party authorization for all sensitive actions.

It is one of the most difficult security challenges to mitigate.

Governance Weight
Governance Proposal Delay Mechanisms
Automated Failover
Threat Modeling Frameworks
Wallet Extended Public Key
Equivocation Risk
Cross-Margin Logic
Supply Cap Enforcement