Understanding the security measures and recovery processes that protect Setu's cross-chain bridge protocol.
Security is a foundational element of the Setu protocol. Our multi-layered approach combines cryptographic techniques, transparent governance, and recovery mechanisms to ensure a secure cross-chain bridging experience.
No single entity has custody of bridged assets
Multiple security mechanisms at each step
Robust process for transaction recovery
Private keys are split across multiple signers, requiring a threshold for valid signatures
Admin operations require a time delay before execution, allowing for security interventions
Cross-validates transaction data across multiple blockchain RPCs for double verification
Multi-sig governance can pause bridge operations in case of security incidents
Setu implements a multi-signature governance system that requires approval from multiple independent validators for critical operations:
5/9 multi-sig required for protocol parameter updates, with a 48-hour timelock delay
7/9 multi-sig required for adding new chains, with a 1-week timelock
All governance actions are recorded on-chain for full transparency
In the rare event that a cross-chain transaction doesn't complete automatically, Setu provides a recovery process to ensure users regain access to their funds.
User submits transaction hash and destination details via recovery portal
System confirms source transaction details on the blockchain
Recovery request is reviewed by governance committee
If approved, transaction to destination chain is built and signed
Transaction is submitted to destination chain
The Setu team is continuously working to enhance the protocol's security posture. Upcoming improvements include:
Implementing zero-knowledge proofs for more efficient and secure transaction verification
Fully automated recovery process with cryptographic proof validation
Transition to a fully decentralized governance model with token voting
Automatic security measures triggered by on-chain risk indicators