vaultSecurity

CICADA Finance employs a defense-in-depth security architecture that combines multiple independent audits, continuous onchain monitoring, and institutional-grade governance and custody controls. The objective is to deliver a security posture aligned with risk-aware professional capital, while maintaining transparency and verifiability for all users.

Third-Party Audit Coverage

CICADA Finance’s core smart contracts, including (but not limited to) the LT–RT Rebalance Mechanism, Convertor, Rebase Engine, LaunchX, Yield Engine, and Rebalance Engine, have completed or are currently undergoing independent audits by leading security firms.

CICADA Finance follows a strict deployment standard: no critical module is released to production without external security validation and an internal readiness review.Audit references (public where available):

Beosin https://www.beosin.com/audits/Cicada_202505261718.pdfarrow-up-right https://beosin.com/audits/rtUSQ_202601061730.pdfarrow-up-right

ScaleBit https://scalebit.xyz/reports/20250821-1-Cicada-Finance-Final-Audit-Report.pdfarrow-up-right

CertiK https://skynet.certik.com/projects/mineralarrow-up-right

SlowMist https://github.com/slowmist/Knowledge-Base/blob/master/open-report-V2/smart-contract/Cicada%20Protocol%20rMner%20-%20SlowMist%20Audit%20Report.pdfarrow-up-right

KEKKAI https://github.com/KEKKAI-Inc/audit-reports/blob/master/MNER%20audit%20report.pdfarrow-up-right

circle-info

Note: Certain reports may cover specific modules, assets, or historical deployments. CICADA Finance maintains a versioned audit and release process to ensure upgrades receive appropriate security review prior to deployment.

Multi-Phase Audit Strategy

CICADA Finance applies a phased audit strategy designed for continuous delivery without compromising safety:

Baseline Audit

A comprehensive structural security review of the broader protocol architecture, core flows, and privileged operations.

Modular Audits

Isolated audits for major functional modules (e.g., Rebase Engine, LaunchX, Yield Engine), enabling tighter scope control, clearer remediation, and safer iterative upgrades.

Upgrade Audits

Every material logic change, feature addition, or version iteration triggers additional audit and review cycles before release. This includes changes to parameters or governance-controlled modules where risk impact is non-trivial.

Continuous Onchain Monitoring

Post-deployment, CICADA Finance connects production contracts to monitoring and alerting systems designed to detect abnormal activity and operational anomalies.Monitoring coverage typically includes:

  • Real-time risk identification across contract interactions

  • Transaction behavioral analysis to surface suspicious patterns

  • Immediate anomaly alerting for rapid incident response and containment

Where appropriate, CICADA Finance may implement protective controls such as rate limits, module-level circuit breakers, or phased rollouts to reduce blast radius under adverse conditions.

Institutional-Grade Governance Controls

Multi-Signature Permissioning

All security-critical administrative functions (including yield pool management, parameter adjustments, upgrade rights, and emergency controls) are governed through multi-signature wallets designed to eliminate single-operator risk.Key properties:

  • Multi-party signing requirement: no single individual or entity can unilaterally execute sensitive actions

  • Onchain verifiability: signing and execution are transparent and independently auditable

  • Role-based access segmentation: privileges are segmented to reduce the impact of compromised keys or misconfiguration

  • Upgrade isolation: upgrade pathways are controlled to prevent privilege escalation and reduce systemic exposure

Custody and Asset Segregation

Tier-1 Institutional Custody

For offchain and real-world asset custody, CICADA Finance partners with institutional-grade custodians (including Copper Clearloop and Ceffu, where applicable). This structure is designed to meet the security and operational expectations of sophisticated participants.Key characteristics:

  • Offchain custody with onchain spending authorization only where applicable, ensuring separation of assets from operational keys

  • Dual-layer protection via multi-sig and MPC (Multi-Party Computation) custody models, reducing single-point-of-failure private key risk

  • Complementary controls that reinforce CICADA Finance’s native multi-signature governance model

Strict Asset Segregation

CICADA Finance maintains clear structural separation between:

  • Protocol-owned onchain assets (e.g., liquidity pools and protocol-controlled modules)

  • Custodied offchain / real-world assets (e.g., RWA collateral and external strategy capital)

Each category is ring-fenced through independent custody and authorization arrangements, designed to minimize cross-contamination risk between onchain and offchain domains.

CICADA Finance delivers a battle-tested security model built on:

  • Multi-auditor validation

  • Continuous monitoring

  • Multi-signature governance controls

  • Institutional custody and strict asset segregation

This security architecture is engineered to support long-term protocol operation and to provide a robust foundation for CICADA Finance’s onchain asset management infrastructure.

Last updated