Threat Model & Mitigations

ZkStable is designed assuming real-world adversaries, chain monitoring systems, MEV bots, state actors, and protocol-level attacks.

Threat Categories & Defenses

🏦 Collateral Theft (Liquidity Seizure)

Risk: Malicious minting without collateral Mitigation: On-chain verifier checks every mint, cannot be bypassed.

🧮 Proof Forgery (Fake zkSNARK)

Risk: Generating false collateral proof Mitigation: Uses Groth16 with deterministic verification; forging is computationally infeasible.

🔁 Replay Attacks

Risk: Resending old proofs to mint again Mitigation: Every proof includes:

  • Unique nullifier set

  • Relay nonce and block height

  • One-time commitment constraints

🕵️ Chain Surveillance

Risk: Wallet deanonymization through metadata Mitigation: Zcash shielded transaction pools + no on-chain identity mapping.

👑 Governance Capture

Risk: Large stakeholder takes control of decisions Mitigation:

  • Quadratic voting

  • Staking-weight caps

  • Time-delayed proposal execution

Summary

ZkStable’s security model assumes:

  • Hostile networks

  • High-value attack incentives

  • Capabilities of nation-state surveillance

And mitigates them through zero-knowledge cryptography, distributed governance, and composable risk controls.

Last updated