Documentation

Security Model

This document describes the security assumptions, threat model, and mitigation strategies used in the VoltPay protocol.

Threat Model

  • Smart contract vulnerabilities
  • Key compromise
  • Routing manipulation

Mitigations

  • Independent audits
  • Restricted admin permissions
  • Multisignature treasury controls