Security & Trust

Transparency and security are the core pillars of Soltag. We are committed to building a trustless, non-custodial protocol.

Non-Custodial

We never touch your keys.

Immutable

Logic is frozen on-chain.

Audited

Verified by experts.

Threat Model

Soltag operates on a "User-Signed" model. The protocol cannot perform actions on behalf of a user without their explicit signature. All state changes (tagging, voting) are atomic transactions on the Solana blockchain.

We do not maintain any centralized database for the core logic. Leaderboards are derived from on-chain data, ensuring that the API cannot "fake" rankings without being detected against the chain state.

Smart Contract Verification

You can verify the deployed program against the source code.

Deployment Details

Program ID
SOLTAGxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Upgrade Authority
Multisig (3/5)