Skip to main content

What is the Credible Layer?

The Credible Layer is security infrastructure that enables developers to link security rules to their smart contracts on-chain. Then, the network validates every transaction that interacts with their smart contracts against their security rules, dropping any invalidating transaction.

How It Works

1

Define rules in Solidity

Write assertions—security rules that define states your protocol should never reach. No contract modifications required.
2

Network validates every transaction

The network checks each transaction against your assertions before inclusion in a block.
3

Invalid transactions are dropped

Transactions that violate your rules are dropped by the network and never execute.

I Want To…

Start Building

Write and deploy your first assertion. Get from zero to protected in minutes.

Evaluate Credible Layer

A quick checklist for dApps and networks.

Understand at a High Level

Non-technical overview of how the Credible Layer prevents exploits.

Evaluate the Architecture

Technical deep dive into system design, transaction flow, and integration requirements.

Integrate as a Protocol

High-level adoption flow for protocol teams.

Browse Examples

Explore assertion patterns and see how real-world hacks could have been prevented.

Integrate as a Network

High-level integration for networks and sequencers.

Key Benefits

  • Pre-execution prevention — Exploits are blocked before they execute, not detected after
  • No contract changes — Add protection to any contract, including immutable ones
  • Transparent & verifiable — All rules are public Solidity, auditable by anyone
  • No external execution services — Enforcement runs within the network’s block-building flow
  • Zero false positives — Binary enforcement based on your rules, no AI guessing

Community & Support

Have questions or want to connect with the Phylax community?

Learn More

For the visual learners, here’s a video introduction to the Credible Layer: