Security
Security Model
Soltag is designed with a defense‑in‑depth approach:
- No custody of user funds: The protocol never holds tokens.
- Wallet Signatures: All state changes require explicit user approval.
- Deterministic Logic: The program outcome is purely a function of instruction inputs and on-chain state.
Threat Model
We have considered the following risks:
- Unauthorized tag creation: Mitigated via authority checks.
- Spam or abuse: Mitigated via rent costs and future token-gating.
- Malicious upgrades: Mitigated by Multisig upgrade authority.
Audits
Audit status: Planned.
Scope includes all on‑chain programs and critical client logic.
Operations
Releases and Versioning
Each release of the mobile app is versioned and published via the Solana dApp Store CLI. On‑chain releases are immutable and publicly verifiable.
Monitoring and Analytics
Operational metrics include:
- Transaction counts
- Unique signers
- Instruction usage
Analytics are collected without compromising user privacy (no IP logging).