Security Model
Rollr implements multiple layers of security to protect users from MEV attacks, ensure fair execution, and maintain protocol integrity. Security is our highest priority.
Private Mempool
Transactions submitted through Rollr are not broadcast to the public mempool, preventing frontrunning and sandwich attacks.
Direct Validator Routing
Bundles are sent directly to validators via encrypted channels, never touching the public mempool.
Zero Information Leakage
Failed bundles are never published on-chain, protecting your strategy from being observed by competitors.
Bundle Simulation
All bundles are simulated against current chain state before submission to ensure profitability and prevent wasted gas fees.
Pre-Execution Validation
Bundles are simulated in an isolated environment to verify all transactions will succeed before sending to validators.
Profitability Analysis
Simulation engine calculates expected MEV profit and verifies it exceeds bundle cost before execution.
State Conflicts Detection
Identifies potential conflicts with other pending transactions and adjusts routing accordingly.
Validator Security
Rollr maintains strict standards for validator participation to ensure network security and reliability.
Identity Verification
All validators undergo KYB (Know Your Business) verification before network access is granted.
Performance Monitoring
Continuous monitoring of validator uptime, latency, and bundle success rates with automatic alerting.
Slashing Protection
Validators who violate protocol rules or attempt to censor bundles face stake slashing and network removal.
Decentralization
Network maintains geographic and operator diversity to prevent centralization and single points of failure.
Smart Contract Security
Multiple Audits
Comprehensive security audits by independent firms specializing in Solana smart contract security.
Bug Bounty Program
Active bug bounty program with rewards up to $100,000 for critical vulnerability disclosures.
Transparency & Monitoring
Rollr maintains transparency through real-time metrics and on-chain data while protecting user privacy.
Public Metrics
Bundle count, success rates, and total MEV captured are published in real-time on the dashboard.
On-Chain Verification
All executed bundles are verifiable on-chain through Solana explorers for complete transparency.
Privacy Protection
Individual bundle contents and searcher identities remain private until on-chain execution.
Best Practices for Users
Use Hardware Wallets
Always use hardware wallets (Ledger, Trezor) when signing high-value transactions through Rollr.
Verify Bundle Contents
Double-check all transaction parameters before signing. Rollr never asks for seed phrases or private keys.
Set Slippage Limits
Always include appropriate slippage protection in swap transactions to prevent unexpected losses.
Monitor Confirmations
Track bundle status through the Rollr dashboard and verify execution on Solana explorers.
Incident Response
In the unlikely event of a security incident, Rollr maintains a comprehensive response protocol:
Pause affected systems, notify core team, begin investigation
Public disclosure via Twitter, Discord, and status page with known details
Deploy fixes, restore services, publish post-mortem analysis
Implement additional safeguards, update procedures, conduct external review