Skip to content

Security: neus/network

SECURITY.md

Security

Responsible disclosure

Please do not open public issues for security vulnerabilities.

  • Email: dev@neus.network
  • Include: impact, affected component (SDK / widgets / API / contracts), steps to reproduce, suggested mitigation

Architecture

NEUS uses a trust-minimized architecture anchored on public blockchains.

  • Non-custodial: NEUS never holds your private keys or assets.
  • Cryptographic proofs: verifications are cryptographically signed and verifiable.
  • Request-bound identifiers: Proof IDs (qHash) are derived from the signed request payload.

Authentication

All verification submissions are authenticated via wallet signatures.

  • EVM: EIP-191 (and smart account standards like EIP-1271 / EIP-6492).
  • Replay protection: requests include a timestamp within a short freshness window.
  • Request binding: signatures are bound to the full request payload (verifiers + data + chain context).

Enterprise API keys (sponsorship)

Enterprise API keys can sponsor billing and unlock deployment-specific surfaces, but they do not replace wallet authorization for user-owned proofs.

For external_lookup verifiers, a key holder may run delegated checks against a subject wallet address. In that case the proof owner remains the signer (the key holder) and the subject wallet is verifier input data.

Rate limiting

Public endpoints are rate-limited to prevent abuse and ensure fair usage.

There aren’t any published security advisories