Back to Documentation

Security & Recovery

Understanding the security measures and recovery processes that protect Setu's cross-chain bridge protocol.

On This Page

Security Overview

Security is a foundational element of the Setu protocol. Our multi-layered approach combines cryptographic techniques, transparent governance, and recovery mechanisms to ensure a secure cross-chain bridging experience.

🔐

Trustless Design

No single entity has custody of bridged assets

🛡️

Multi-layered

Multiple security mechanisms at each step

🔄

Recovery Ready

Robust process for transaction recovery

Security Features

Threshold Signatures

Private keys are split across multiple signers, requiring a threshold for valid signatures

Time Locks

Admin operations require a time delay before execution, allowing for security interventions

Multi-chain Validation

Cross-validates transaction data across multiple blockchain RPCs for double verification

Emergency Pause

Multi-sig governance can pause bridge operations in case of security incidents

Protocol Governance

Governance Structure

Setu implements a multi-signature governance system that requires approval from multiple independent validators for critical operations:

Admin Operations

5/9 multi-sig required for protocol parameter updates, with a 48-hour timelock delay

Chain Integration

7/9 multi-sig required for adding new chains, with a 1-week timelock

Transparency

All governance actions are recorded on-chain for full transparency

Transaction Recovery

In the rare event that a cross-chain transaction doesn't complete automatically, Setu provides a recovery process to ensure users regain access to their funds.

Recovery Process

Initiate Recovery

User submits transaction hash and destination details via recovery portal

Verification

System confirms source transaction details on the blockchain

Admin Review

Recovery request is reviewed by governance committee

Destination Signing

If approved, transaction to destination chain is built and signed

Completion

Transaction is submitted to destination chain

Future Security Enhancements

The Setu team is continuously working to enhance the protocol's security posture. Upcoming improvements include:

1
Zkp Proof Verification

Implementing zero-knowledge proofs for more efficient and secure transaction verification

2
Automated Recovery

Fully automated recovery process with cryptographic proof validation

3
Community Governance

Transition to a fully decentralized governance model with token voting

4
Self-Executing Security

Automatic security measures triggered by on-chain risk indicators