Security @TenzaOne
TenzaOne · Phase 2 Position

DePIN, Infrastructure & Smart-Contract Integrity

How TenzaOne is building defensible, AI-era integrity into the climate-credit pipeline — from the sensor on the project site to the contract on chain. A forward-looking Phase 2 position covering threat posture, DePIN attestation, contract assurance, infrastructure controls, AI-era defences, and the build roadmap.

Phase 2 · Living Document · v1.1.1
1 The 2026 threat surface — and what just changed

A climate-credit platform sits at the intersection of three traditionally distinct threat domains: physical infrastructure (sensors, gateways, substation telemetry), smart-contract finance (token treasuries, on-chain marketplaces, governance), and data-integrity systems (MRV pipelines, registry attestation). Each has its own decade-old playbook. What changed in April 2026 is the public arrival of chained-weakness AI — Anthropic's Mythos and its peers don't scan for known bugs; they simulate adversaries, exploring how protocols interact and combining small weaknesses into real-world exploits.

For DeFi this rotated the threat thesis. Audit budgets historically went into smart-contract code; Mythos's distinctive capability is finding the infrastructure paths between contracts — key-management systems, signing services, bridges, oracle networks, and the cryptographic glue connecting them. As Paul Vijender, head of security at Gauntlet, put it: "The bigger risks sit in infrastructure… I'm less concerned about smart-contract exploits and more focused on AI-assisted attacks against the human and infrastructure layers."

For climate-credit infrastructure the same rotation applies, but with extra surface: physical sensors, calibration services, gateway connectivity, and the off-chain MRV pipeline are all "infrastructure between" surfaces that traditional smart-contract audits don't touch.

Operating assumption: Our adversary has routine access to model-grade chained-weakness discovery. They will read the contract suite, the bridges, the oracles, the key-management posture, and the third-party services we depend on — together — and look for the path through. Defence has to be designed at that same composition layer, not in any one component.
2 Two illustrative incidents (April 2026)

Both happened this month, and both prefigure the threats the position addresses:

Supply-chain · third-party AI tool

Vercel breach via Context.ai

Web infra provider Vercel disclosed a breach this month. Trace: a compromised Google Workspace connection through the third-party AI tool Context.ai, used by an employee. Customer API keys may have been exposed; crypto projects rotated credentials and reviewed code. Lesson: the AI-tool supply chain is now a primary attack vector — not only the AI we run, but the AI tools our staff and vendors run.

Composability contagion

Hyperbridge — $1B minted via cross-chain message flaw

An attacker minted $1B of bridged Polkadot tokens on Ethereum by exploiting how cross-chain messages were verified. Lesson: bridges and oracles are the high-value seam between protocols; a verification flaw in the seam is a contagion event, not a local bug. As Vijender put it, "a minor vulnerability in one protocol can become a critical exploit vector with contagion potential across the ecosystem."

3 Threats we explicitly defend against
Carbon-credit integrity

Double-counting & phantom issuance

Same tonne sold twice across registries; credits issued without a verifiable measurement chain. Unique to climate finance — and the threat that ends platforms.

DePIN device compromise

Sensor spoof & firmware tamper

Remote climate-project sensors are a physical attack surface. Replay attacks, calibration drift, intentionally-falsified readings, and firmware swap are all in scope.

Chained smart-contract exploits

Multi-step exploit chains across protocols

Reentrancy, overflow, access-control gaps, oracle manipulation, flash-loan-leveraged governance attacks. The Mythos shift: small weaknesses combined across composable systems — "multi-step exploit chains that historically only get discovered after money is lost" (Vijender, Gauntlet).

Infrastructure-layer attacks

Keys, bridges, oracles, signers

Per Vijender, the second AI-discovered category: "infrastructure-layer vulnerabilities that traditional audits never touch." Key-management systems, signing services, bridge verification, oracle composition. The Hyperbridge $1B exploit lives here.

Supply-chain compromise

AI-tool & dependency injection

Compromised npm/PyPI packages, malicious upstream commits, build-pipeline injection, SBOM gaps — AND now AI-tool supply chains: an employee's third-party AI assistant becomes the breach path (Vercel/Context.ai pattern).

Governance attacks

Vote-buying & delegate capture

Quadratic voting helps but is not immune to coordinated capture. Sybil attacks, flash-loan vote inflation, off-chain coercion, delegate misalignment.

Long-horizon crypto risk

Post-quantum migration

Long-lived contracts holding decade-scale carbon assets must plan for a post-quantum cryptographic migration before retirement events become unsigned-able.

Old bugs, rediscovered

Previously-deprioritised vulnerabilities

Per Stani Kulechov (Aave Labs): "The Mythos paper shows that AI can uncover old bugs that were previously deprioritised." Smaller vulnerabilities — once dismissed as low-impact — are now recombinable into larger attacks. Triage thresholds need rethinking.

1 Why this matters

Every credit TenzaOne lists traces back to a measurement — a sensor reading, a flow meter, a satellite pass. If the data at the edge is wrong, no amount of on-chain assurance saves the credit. DePIN integrity is the foundation; everything else is downstream protection of an already-trustworthy signal.

Phase 2 establishes a defensible chain of custody from physical sensor to on-chain anchor, with verifiable attestation at every hop.

2 The DePIN integrity stack
Hardware root of trust

Per-device cryptographic identity

TPM / Secure Element on every sensor. Non-cloneable device identity bound at provisioning. Identity is what signs every reading at source.

Verified boot & firmware attestation

Signed builds, remote attestation

Every device boots only signed firmware. Remote attestation publishes the firmware hash on every check-in — tampered firmware reveals itself before the next reading.

Sensor-data signing

End-to-end signed payloads

Each reading signed at source by the device key. Signature travels with the data through every hop — gateway, broker, registry, on-chain anchor — and is verified at each.

Calibration cert chain

Cryptographic provenance for accuracy

Every measurement-bearing sensor has a calibration certificate signed by the calibration lab. Certificates form a chain anchored on-chain. Stale or unverifiable calibrations downgrade the data tier automatically.

Tamper detection

Physical & environmental witnesses

Seal sensors, accelerometers, ambient-light witnesses. Unexpected events emit a tamper attestation immediately — readings during a tamper window are flagged or rejected.

Multi-path egress

Resilient gateways & mesh

No single network path. LoRaWAN + cellular + satellite fallback, with time-bound store-and-forward at the gateway. Loss-of-connectivity is an expected mode, not a failure mode.

Open-data audit

Anyone can recompute the credit

Raw signed sensor data + the calculation methodology + the firmware hash = a fully reproducible credit count. No magic in the middle. This is the integrity-first promise.

Evidence-tier scoring

1–4 grading per data field

Already implemented in the AI VCS Assessment. Tier 1 = direct cryptographically-attested sensor; Tier 4 = unverified self-report. Credit pricing reflects evidence tier.

Phase 2 commitment: No credit lists on TenzaOne with Tier-3 evidence or below as the primary source. Where higher tiers are aspirational (project still on early sensors), the credit listing displays the gap publicly.
1 Pre-deployment assurance

Audit-once is no longer enough. Every critical contract goes through layered review before mainnet, and stays under continuous review afterwards.

Formal verification

Treasury & supply-conservation paths

The treasury, the redemption flow, and any contract enforcing supply conservation get formally verified properties (Certora / K Framework / Halmos). Conservation is a theorem, not a test.

Independent human audits

Two firms, no overlap

Two independent audit firms with no shared partners. Each gets the same scope and findings are reconciled. Reports published.

AI-vs-AI red-team

Adversarial model probes pre-deploy

Multiple frontier models — including Mythos-class — run in adversarial mode against the contract suite, with explicit jailbreaks for "find economic exploits" and "find access-control bypasses". Findings feed back into formal-verification properties.

Reproducible builds

Deterministic compile, signed artifacts

Compiler version pinned, dependency tree hashed, deploy artifact signed. Anyone can recompile and verify the on-chain bytecode matches the audited source.

2 Runtime & upgrade controls
Circuit breakers

Velocity caps & auto-pause

Outflow rate caps per block, per epoch, per actor. Anomalous activity triggers automatic pause. No single block can drain the treasury, regardless of exploit class.

Storage isolation

Per-asset proxy contracts

Each project's tokens live in their own proxy with their own upgrade key, so a bug in one asset can't drain another. Blast radius scoped by design.

Upgrade governance

Timelock + multi-sig + DAO veto

Every upgrade goes through a public timelock, a 5-of-9 multi-sig, and a 72-hour DAO veto window. No unilateral upgrade authority exists.

ERC-3643 compliance

Whitelist + jurisdiction rules

Security-token issuances enforce whitelists, jurisdiction restrictions, and transfer rules at the contract level. Compliance is on-chain, not a frontend honour-system.

Continuous bug bounty

Immunefi + private programmes

Top-tier bounty escalating with treasury size, extending to off-chain components (oracles, gateways). Quarterly payout reports published.

Open contracts & SBOM

Public source, public dependencies

Every deployed contract has its source on a public mirror with the SBOM (software bill of materials) showing every dependency, version, and audit status.

Defence-in-depth principle: Any single layer is presumed circumventable. Treasury safety derives from the composition of formal verification, circuit breakers, storage isolation, timelock, multi-sig, and DAO veto — not from any one of them.
1 Custody & key management

Off-chain keys are the most-attacked surface in any crypto-adjacent platform. The TenzaOne posture, already partially expressed in the DAO governance Settlement & Custody panel, hardens further in Phase 2.

HSM-backed signing

Treasury operations

All treasury-signing keys live in FIPS 140-2 Level 3 HSMs. No raw key material exits the device. Operator access via dual-control + MFA + key-ceremony logging.

MPC for hot wallets

Threshold signatures

Hot operations use threshold MPC; no single node holds a complete key. Compromise of one node yields nothing.

Cold reserves

Air-gapped, geographically distributed

The bulk of platform reserves live in air-gapped cold storage, geographically distributed, requiring physical key ceremonies to move. Slow by design.

User self-custody

Always an option

Users can hold their own keys, bring their own wallet, and operate without trusting the platform with custody. Platform-custody is a convenience, never a requirement.

2 Cloud, identity & observability
Zero-trust networking

mTLS everywhere

Service-to-service authentication via mutual TLS. No implicit-trust subnets. Every request authenticated, every actor identified.

Least-privilege IAM

Short-lived credentials, role-scoped

No long-lived AWS keys. Every access is role-scoped, time-bounded, audit-logged. Standing access revoked on rotation.

Immutable infra

Signed deploys, no SSH

Production hosts immutable. Deploys are signed artifacts pushed via CI; no human SSH into production. All change goes through review.

Anomaly detection

Treasury, balance, and access patterns

Continuous monitoring of treasury outflow, user-balance deltas, login geographies, and admin actions. Surveillance personnel separated from P&L (constitutional principle).

DR & backups

Geographic redundancy, drilled monthly

Backups in multiple regions, restore drills run monthly — not just verified to exist. Time-to-restore is a tracked metric.

Incident response

24/7 oncall, public post-mortems

A documented IR playbook, 24/7 oncall, and a public commitment to publishing blameless post-mortems within 14 days of any user-impacting incident.

1 The shift the industry just confirmed

Coindesk's coverage of Anthropic's Mythos (April 2026) crystallised what serious DeFi security teams had been preparing for. Mythos doesn't just scan for known bugs — it simulates adversaries, exploring how protocols interact and chaining small weaknesses into real exploits. Banks (JP Morgan), exchanges (Coinbase, Binance reportedly approached Anthropic) and DeFi protocols are now treating this as the new baseline, not an outlier.

Two industry voices set the frame:

Stani Kulechov, Aave Labs: "DeFi operates at compute speed, so AI doesn't introduce a new dynamic. It intensifies an environment that has always required constant vigilance." — smart contracts already auto-execute; defences (liquidations, risk parameters) already auto-trigger. The velocity assumption is unchanged; the discovery assumption is what flipped.
Hayden Adams, Uniswap Labs: "Projects that prioritize security will have greater ability to test and harden systems before launching. Projects that don't will be most at risk." — the new dynamic isn't safe vs. unsafe DeFi. It's a widening gap between projects that adapt their security model and ones that don't. TenzaOne picks its side of that gap explicitly.
2 What we do differently
Continuous AI-driven auditing

Pre-deploy audit + post-deploy monitoring is obsolete

Per Vijender (Gauntlet): "To defend against offensive AI, we will need to take an AI-centric approach where speed and continuous adaptation are essential." That means continuous auditing on every commit, real-time simulation against the live system, and the operating assumption that breaches will happen.

AI complements human auditors

"AI-first where it adds value — not replacement"

Aave's posture (Kulechov): AI in workflows for simulation and code review alongside human auditors. TenzaOne adopts the same model. AI catches multi-step chains and infrastructure-layer issues; humans catch what models systematically miss (intent, novel design risks, governance edge cases).

Continuous formal verification

Properties, not snapshots

Critical properties (supply conservation, access boundaries, upgrade authority, bridge-message integrity) re-verified on every commit. CI fails if a property weakens. Audit becomes a state, not an event.

AI-vs-AI red-team

Mythos-class on our side too

We use the same class of model an attacker would — in adversarial mode against our own code and infrastructure paths, before deployment. Special focus on the chained-weakness paths Mythos highlighted: bridges, oracles, key services, third-party integrations.

Reframed bug triage

No "low-impact" dismissals

Per Kulechov: "The Mythos paper shows that AI can uncover old bugs that were previously deprioritised." Small bugs are recombination fuel. We retire the "low-impact" triage tier; every finding gets a chained-exploit-potential review before it's parked.

Velocity caps as the floor

No single-block drains, regardless of exploit class

Compute-speed attacks need fast settlement paths. Per-block, per-epoch, per-actor velocity caps + circuit breakers deny the largest economic outcomes even when the exploit itself bypasses every other layer. Belt against any audit miss.

Transparency premium

Open contracts, open data, open governance

Anything we hide, an adversarial AI eventually re-derives. Openness lets the wider community find issues first; defenders gain more from public scrutiny than attackers gain from public knowledge.

Human-in-loop on autonomy

No AI holds treasury authority

TenzaOne's AI agents (10-Agent Assessment, Verification Coach, Profiler) are advisory only. No AI signs treasury operations, approves contract upgrades, or executes governance proposals.

AI-tool supply-chain hygiene

The Vercel/Context.ai lesson

The AI tools our staff and vendors run are now part of our attack surface. Approved-AI-tool list maintained. SSO + scoped tokens for any third-party AI integration. Code-review tooling that touches secrets goes through an additional review tier.

Adversarial-AI bounty

Pay for AI-discovered findings

Bug-bounty programme explicitly accepts AI-discovered vulnerabilities — including chained, multi-protocol findings that span our bridges/oracles/key services. The bug is the bug, regardless of who or what found it.

The position, in one line: security is no longer about eliminating vulnerabilities — it's about continuously adapting to a system in which vulnerabilities are constantly rediscovered and recombined. TenzaOne is built to be on the right side of the gap Hayden Adams described.
1 What's already built

Phase 2 inherits a meaningful base from earlier work — the integrity-first DAO constitution, the surveillance principle (independence rule), evidence-tier scoring on every assessment, and the off-chain DAO Treasury (virtual escrow with paired-entry conservation).

Constitution v1.0 · integrity-first principle Evidence-tier scoring (1–4) per data field DAO Treasury · paired-entry conservation Surveillance independence rule Public coach + assessment audit trail
2 Phase 2 build sequence
Q4 2025 · ✓
Sensor-pilot data path. First climate-project pilots with signed sensor data flowing through gateways into the platform. Evidence-tier feedback to the AI VCS Assessment.
Q1 2026 · ✓
Smart-contract architecture v1 designed. Treasury, supply-conservation, and per-asset proxy patterns specified. Upgrade-governance model documented.
Q2 2026 · now
Smart-contract MVP audits + hardware-attestation pilot. Two independent audits on the v1 contract suite. First TPM-backed sensor deployments at pilot sites. Calibration cert chain prototype.
2027 · Phase 3
On-chain DAO + ERC-3643 + continuous-audit pipeline. Governance moves on-chain (Snapshot at v2, fully on-chain at v3). Security-token issuance under ERC-3643. Continuous formal-verification CI replaces point-in-time audits as the default.
2028 · Phase 4
Post-quantum migration plan finalised. Long-lived contract migration paths defined; key-rotation flows tested; cryptographic algorithm agility built into upgrade paths.
3 What we will publish

Commitments TenzaOne can be held to as Phase 2 unfolds:

Audit reports · public on commit Formal-verification property suite · open Bug-bounty quarterly payout report Incident post-mortems · 14-day SLA SBOM per release · public Treasury balance · live, on-chain anchored Restore-drill cadence · monthly, logged
Site Tour
Choose Your Tour
✕ Exit Tour
Loading tour...
Privacy Overview
TenzaONE

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.