Overview

Pingu takes security very seriously. Code and processes are thoroughly reviewed, stress-tested, and independently audited.

Monad Security

Contract security starts with underlying blockchain security. Monad is a high-performance Layer 1 blockchain built from the ground up with security and decentralization at its core. As an independent Layer 1 that maintains Byzantine Fault Tolerance, Monad can tolerate up to one-third of nodes being malicious or offline while continuing to operate correctly. The network's robust security is achieved through multiple layers:

  1. MonadBFT, Monad's custom consensus mechanism derived from HotStuff, uses linear communication where validators send votes to leaders who aggregate them into Quorum Certificates, requiring a supermajority of two-thirds plus one validators to agree before blocks are finalized.

  2. The protocol includes built-in tail-forking resistance, preventing malicious validators from abandoning validated blocks to exploit MEV opportunities. This ensures fairness and prevents particularly harmful attacks that plague other blockchain networks.

  3. Monad achieves sub-second finality with 400ms block times and 800ms finality, meaning transactions become irreversible almost instantly while maintaining full security guarantees.

  4. Full EVM bytecode compatibility ensures that Monad inherits the battle-tested security standards of Ethereum smart contracts while dramatically improving performance.

This architecture, combined with custom database optimization and low hardware requirements, enables real decentralization from day one with a global network of validators running on consumer-grade hardware.

Oracle Security

Pingu contracts rely on accurate price data to determine when order execution and liquidations occur, which in turn determine profits and losses for both traders and liquidity providers.

Pingu uses Pyth to price orders on-demand. Pyth sources prices from several of the most liquid and reliable global trading venues, minimizing reliance on a single source and the likelihood of price wicks or data errors.

Learn more about order settlement.

Risk Mitigation

Ensuring protocol integrity is essential to security. Learn more about Pingu's risk mitigation tactics.

Audit

Pingu has run 2 independent audits with Shellboxes: https://shellboxes.com/audit/reports/Pingu_Exchange_Audit_Report.pdf https://shellboxes.com/audit/reports/Pingu_Exchange_v2_Audit_Report.pdf

Last updated