Security
1 min read
Overview
Adjusted's security model spans two layers: how the protocol validates and executes transactions, and how user wallets are secured.
Neither layer operates in isolation. Together, they are designed to reduce risk across every surface a user's funds touch.
Protocol Security
RAC uses a permissioned participation model combined with a simulation-first execution pipeline. Every keeper-routed transaction is simulated, inspected, validated by an AI review layer, and only then executed onchain.
The goal is straightforward: make it materially harder for a harmful transaction to reach the contracts unchecked.
Read the full Protocol Security guide →
Wallet Security
User wallets are non-custodial embedded wallets powered by Privy. Private keys are split into shards distributed across independent security domains and processed inside hardware-backed AWS Nitro Enclaves. The infrastructure is independently audited by Cure53, Zellic, and Doyensec, and holds SOC 2 Type II certification.