Security Model

The security of VeilCore OS relies on a combination of cryptographic assumptions and rigorous operational protocols.

Cryptographic Primitives

The system security is anchored in the following primitives:

  • Hash Functions: We use variants of Poseidon or Rescue-Prime, which are optimized for ZK performance and collision resistance.

  • Polynomial Commitments: FRI (Fast Reed-Solomon Interactive Oracle Proofs of Proximity) is used to ensure the integrity of the STARK proofs.

Audit and Verification

  • Smart Contract Audits: All on-chain verifier contracts undergo continuous audits by top-tier security firms.

  • Open Source Circuits: The ZK circuits defining the VM logic are open-source. This allows the community to verify that there are no backdoors in the privacy logic.

Isolation

The architecture ensures strict isolation. An exploit in one agent's code cannot compromise the global state of the OS. Since every agent runs in its own instance of the ZK-VM, faults are contained locally while the network consensus remains secure.

Last updated