Secure Asset Management

Secure Asset Management refers to the infrastructure, technology, and procedures Avant Protocol uses to custody, transfer, and manage all protocol-controlled assets. Our approach is founded on using institutional-grade, multi-provider custody solutions to eliminate single points of failure and enforce strict, policy-based security on all transactions.

To achieve this, Avant leverages a combination of leading digital asset custody platforms, including Fireblocks and FORDEFI. These platforms provide the core technologies that underpin our secure asset management framework.

Multi-Party Computation (MPC) Wallets

Instead of relying on traditional private keys, which can be a single point of failure, Avant secures assets using Multi-Party Computation (MPC) wallets.

MPC is an advanced cryptographic method where a private key is split into multiple encrypted shares. These shares are distributed across independent systems, and a transaction can only be signed when a required threshold of parties cooperates in a secure cryptographic protocol. A complete private key is never regenerated or held in a single location. This technology provides superior protection against both external hacks and internal threats.

Transaction Policy & Governance Engine

A critical component of our security is a powerful policy engine that enforces a predefined set of rules on all outgoing transactions. This creates robust operational guardrails and minimizes the risk of human error or malicious action. Key policies include:

  • Address Whitelisting: Strategists are only permitted to interact with smart contracts and addresses that have been carefully reviewed and pre-approved by the security team. This prevents protocol funds from ever being sent to unauthorized or potentially malicious contracts.

  • Controlled Transaction Types: The policy engine restricts operations to specific, approved functions (e.g., certain types of swaps or deposits). This reduces the attack surface and prevents unauthorized or high-risk transactions.

  • Role-Based Access Control (RBAC): Team members are assigned specific roles with granular permissions, ensuring they can only perform the actions necessary for their duties within the established security parameters.

Secure Transfer Environment

All transactions are conducted within a secure environment that protects assets from external threats during transit.

This multi-faceted approach to asset management provides operational efficiency without compromising on the institutional-grade security required to protect user funds.

Last updated