🔒 Security Architecture
Key Principles
No Private Keys in Memory:
All transactions signed via Ledger/Phantom.
Config Encryption:
Real-Time Monitoring:
Alerts for suspicious activity via Telegram bot.
Audit Process
Daily automated checks via Sec3.
Monthly manual audits by Halborn.
Last updated