The Lux Standard smart contract stack implements comprehensive security practices including automated continuous auditing, fuzz testing, and static analysis integrated into our CI/CD pipeline.
Our security infrastructure runs automatically on every push and pull request:
| Tool | Purpose | Frequency |
|---|---|---|
| Slither | Static analysis, vulnerability detection | Every PR |
| Echidna | Property-based fuzzing (Trail of Bits) | Every PR |
| Medusa | Fast parallel fuzzing (Trail of Bits) | Every PR |
| Semgrep | SAST with Solidity-specific rules | Every PR |
| CodeQL | Deep semantic analysis | Every PR |
| Aderyn | Rust-based Solidity analyzer | Every PR |
| Forge Fuzz | Native Foundry invariant testing | Every PR |
Additionally, the full security suite runs weekly via scheduled GitHub Actions.
- Build & Test:
.github/workflows/ci.yml- Compilation and unit tests - Security Analysis:
.github/workflows/security.yml- Full security suite - Deployment:
.github/workflows/deploy.yml- Controlled deployments
slither contracts/ --exclude-dependencies --sarif results.sarifConfiguration: echidna.yaml
echidna . --contract TestContract --config echidna.yamlConfiguration: medusa.json
medusa fuzz --config medusa.json| Date | Auditor | Scope | Findings |
|---|---|---|---|
| 2026-01-31 | Claude AI (Opus 4.5) | Full stack | 25 Critical, 41 High, 40 Medium |
| Date | Auditor | Scope | Report |
|---|---|---|---|
| TBD | Trail of Bits | Full stack | Pending |
| TBD | OpenZeppelin | Governance | Pending |
If you discover a security vulnerability, please report it responsibly:
- Email: security@lux.network
- Bug Bounty: Immunefi Program (Coming Soon)
Please do NOT:
- Open public GitHub issues for security vulnerabilities
- Exploit vulnerabilities on mainnet
- Share vulnerability details publicly before fix
| Severity | Response Time | Bounty Range |
|---|---|---|
| Critical | 24 hours | $50,000 - $250,000 |
| High | 72 hours | $10,000 - $50,000 |
| Medium | 1 week | $2,500 - $10,000 |
| Low | 2 weeks | $500 - $2,500 |
- Checks-Effects-Interactions: All state changes before external calls
- Reentrancy Guards: Applied to all fund-moving functions
- Access Control: Role-based permissions via OpenZeppelin
- Upgrade Safety: UUPS pattern with Ownable2Step
- Oracle Staleness: MAX_PRICE_STALENESS checks on all feeds
- Signature Security: ECDSA.recover for all signature verification
- Unit Tests: 100% coverage on critical paths
- Fuzz Tests: 1000+ runs per invariant
- Invariant Tests: Protocol-wide property verification
- Integration Tests: Full deployment flow testing
- OpenZeppelin Defender for transaction monitoring
- Forta for real-time threat detection
- Custom alerts for large transfers and admin actions
- Detection: Automated alerts + community reports
- Triage: Security team assessment within 1 hour
- Response: Pause mechanisms for critical issues
- Communication: Status page + Discord announcements
- Remediation: Fix deployment + post-mortem
- Audit Summary - Detailed findings and fix status
- Architecture - System design
- Deployment - Contract addresses
Last updated: 2026-01-31