Security Model
This document describes the security assumptions, threat model, and mitigation strategies used in the VoltPay protocol.
Threat Model
- Smart contract vulnerabilities
- Key compromise
- Routing manipulation
Mitigations
- Independent audits
- Restricted admin permissions
- Multisignature treasury controls