Security & Privacy

Your security is our top priority. We implement industry-leading security measures to protect your funds, data, and privacy while using Zora Agent.

Non-Custodial Architecture
Implemented

Users maintain full control of their private keys and funds at all times.

Private keys never leave user devices
No central authority can access funds
Privy-powered secure authentication
Hardware wallet support
End-to-End Encryption
Implemented

All sensitive data is encrypted using industry-standard protocols.

TLS 1.3 for data in transit
AES-256 encryption at rest
Zero-knowledge architecture
Encrypted API communications
Smart Contract Security
Implemented

Audited and verified smart contracts with formal security analysis.

Multi-signature governance
Time-locked upgrades
Formal verification
Bug bounty program
Privacy Protection
Implemented

Comprehensive privacy measures to protect user data and trading activity.

No personal data collection
Anonymous analytics
GDPR compliance
Optional privacy modes
Security Audits

CertiK

Passed

Smart Contracts

Q3 2024Score: 96/100

Trail of Bits

Passed

Infrastructure

Q3 2024Score: A+

Quantstamp

Passed

Protocol Security

Q4 2024Score: 95/100
Compliance & Standards

SOC 2 Type II

Security, availability, and confidentiality controls

Certified

GDPR

European data protection regulation compliance

Compliant

CCPA

California Consumer Privacy Act compliance

Compliant

ISO 27001

Information security management system

In Progress
Threat Model & Risk Assessment

Private Key Compromise

Low Risk

Non-custodial architecture, hardware wallet support, secure key derivation

Smart Contract Vulnerabilities

Low Risk

Multiple audits, formal verification, time-locked upgrades

API Attacks

Low Risk

Rate limiting, input validation, authentication, CORS policies

Data Breaches

Very Low Risk

Minimal data collection, encryption, zero-knowledge architecture

Social Engineering

Medium Risk

User education, multi-factor authentication, security alerts

User Security Tips

Use Hardware Wallets

Store your private keys on hardware devices for maximum security

Enable 2FA

Add an extra layer of security to your account

Verify URLs

Always check you're on the official Zora Agent website

Keep Software Updated

Use the latest versions of wallets and browsers

Incident Response
1

24/7 Monitoring

Continuous security monitoring and threat detection

2

Rapid Response

Immediate action on security incidents within 15 minutes

3

User Communication

Transparent communication about any security events

4

Post-Incident Review

Thorough analysis and improvements after any incident

Security Contact

Found a security vulnerability? We appreciate responsible disclosure and offer rewards for valid security reports through our bug bounty program.