Security
CICADA Finance employs a defense-in-depth security architecture that combines multiple independent audits, continuous onchain monitoring, and institutional-grade governance and custody controls. The objective is to deliver a security posture aligned with risk-aware professional capital, while maintaining transparency and verifiability for all users.
Third-Party Audit Coverage
CICADA Finance’s core smart contracts, including (but not limited to) the LT–RT Rebalance Mechanism, Convertor, Rebase Engine, LaunchX, Yield Engine, and Rebalance Engine, have completed or are currently undergoing independent audits by leading security firms.
CICADA Finance follows a strict deployment standard: no critical module is released to production without external security validation and an internal readiness review.Audit references (public where available):
Beosin https://www.beosin.com/audits/Cicada_202505261718.pdf https://beosin.com/audits/rtUSQ_202601061730.pdf
ScaleBit https://scalebit.xyz/reports/20250821-1-Cicada-Finance-Final-Audit-Report.pdf
CertiK https://skynet.certik.com/projects/mineral
KEKKAI https://github.com/KEKKAI-Inc/audit-reports/blob/master/MNER%20audit%20report.pdf
Note: Certain reports may cover specific modules, assets, or historical deployments. CICADA Finance maintains a versioned audit and release process to ensure upgrades receive appropriate security review prior to deployment.
Multi-Phase Audit Strategy
CICADA Finance applies a phased audit strategy designed for continuous delivery without compromising safety:
Baseline Audit
A comprehensive structural security review of the broader protocol architecture, core flows, and privileged operations.
Modular Audits
Isolated audits for major functional modules (e.g., Rebase Engine, LaunchX, Yield Engine), enabling tighter scope control, clearer remediation, and safer iterative upgrades.
Upgrade Audits
Every material logic change, feature addition, or version iteration triggers additional audit and review cycles before release. This includes changes to parameters or governance-controlled modules where risk impact is non-trivial.
Continuous Onchain Monitoring
Post-deployment, CICADA Finance connects production contracts to monitoring and alerting systems designed to detect abnormal activity and operational anomalies.Monitoring coverage typically includes:
Real-time risk identification across contract interactions
Transaction behavioral analysis to surface suspicious patterns
Immediate anomaly alerting for rapid incident response and containment
Where appropriate, CICADA Finance may implement protective controls such as rate limits, module-level circuit breakers, or phased rollouts to reduce blast radius under adverse conditions.
Institutional-Grade Governance Controls
Multi-Signature Permissioning
All security-critical administrative functions (including yield pool management, parameter adjustments, upgrade rights, and emergency controls) are governed through multi-signature wallets designed to eliminate single-operator risk.Key properties:
Multi-party signing requirement: no single individual or entity can unilaterally execute sensitive actions
Onchain verifiability: signing and execution are transparent and independently auditable
Role-based access segmentation: privileges are segmented to reduce the impact of compromised keys or misconfiguration
Upgrade isolation: upgrade pathways are controlled to prevent privilege escalation and reduce systemic exposure
Custody and Asset Segregation
Tier-1 Institutional Custody
For offchain and real-world asset custody, CICADA Finance partners with institutional-grade custodians (including Copper Clearloop and Ceffu, where applicable). This structure is designed to meet the security and operational expectations of sophisticated participants.Key characteristics:
Offchain custody with onchain spending authorization only where applicable, ensuring separation of assets from operational keys
Dual-layer protection via multi-sig and MPC (Multi-Party Computation) custody models, reducing single-point-of-failure private key risk
Complementary controls that reinforce CICADA Finance’s native multi-signature governance model
Strict Asset Segregation
CICADA Finance maintains clear structural separation between:
Protocol-owned onchain assets (e.g., liquidity pools and protocol-controlled modules)
Custodied offchain / real-world assets (e.g., RWA collateral and external strategy capital)
Each category is ring-fenced through independent custody and authorization arrangements, designed to minimize cross-contamination risk between onchain and offchain domains.
CICADA Finance delivers a battle-tested security model built on:
Multi-auditor validation
Continuous monitoring
Multi-signature governance controls
Institutional custody and strict asset segregation
This security architecture is engineered to support long-term protocol operation and to provide a robust foundation for CICADA Finance’s onchain asset management infrastructure.
Last updated