Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
Security Assurance

Adversarial Threat Model

Structured analysis of adversary categories, attack surfaces, attack scenarios, and residual risks. Institutional counterparties can evaluate exactly what JIL defends against and where residual risk remains.

← All Assurance

Threat Modeling Philosophy

JIL's threat model follows the principle: assume breach, design for containment. Rather than assuming the perimeter is impenetrable, the architecture limits the blast radius of any single compromise. Every component is designed to fail safely - degrading to a halt rather than producing incorrect settlements.

  • Defense in depth - multiple independent controls at each layer
  • Fail-closed - ambiguous states halt processing rather than proceeding
  • Blast radius containment - compromise of one component does not compromise all
  • Transparent disclosure - known risks are published, not hidden

Adversary Categories

The threat model considers four categories of adversaries, each with different capabilities, motivations, and attack budgets.

CategoryCapabilityMotivationBudget
External AttackerNetwork access, public API exploitation, phishingFinancial gain, service disruptionLow-Medium
Compromised InsiderLimited system access, credential theft, social engineeringFinancial gain, coercionMedium
Colluding ValidatorsConsensus participation, attestation manipulationFinancial gain, censorshipMedium-High
State-Level ActorInfrastructure compromise, cryptographic resources, legal coercionSurveillance, disruption, sanctions enforcementHigh

Attack Surfaces

Five primary attack surfaces are considered in the threat model. Each surface has specific mitigations and monitoring.

1. Consensus Layer

Critical Surface

Attacks targeting validator quorum, settlement ordering, or attestation forgery. Mitigated by 14-of-20 threshold, geographic distribution, and 7-gate validator bootstrap.

2. Wallet / MPC Layer

Critical Surface

Attacks targeting key shard compromise, MPC protocol exploitation, or unauthorized signing. Mitigated by 2-of-3 threshold, WebAuthn, and shard isolation.

3. Bridge Layer

High Surface

Attacks targeting deposit spoofing, mint bypass, or chain watcher manipulation. Mitigated by validator attestation, rate limits, and contract verification.

4. Infrastructure Layer

Medium Surface

Attacks targeting server compromise, DNS hijacking, or supply chain poisoning. Mitigated by image digest verification, signed deployments, and multi-zone redundancy.

5. API / Application Layer

Standard Surface

Attacks targeting API abuse, input injection, or authentication bypass. Mitigated by rate limiting, input validation (Zod), JWT authentication, and CORS enforcement.

Consensus Attack Scenarios

Scenario: Validator Collusion (6 of 20)

Attack6 validators collude to approve fraudulent settlement
ResultAttack fails - requires 14 of 20 attestations. 6 validators cannot reach quorum.
DetectionSentinelAI flags anomalous attestation patterns and voting divergence
ResponseCompromised validators identified, keys revoked, nodes replaced

Scenario: Validator Key Compromise (Single Node)

AttackAttacker obtains signing key for one validator
ResultAttacker can cast 1 vote in consensus - insufficient for quorum. No settlement impact.
DetectionAnomalous voting patterns, geographic origin mismatch, heartbeat irregularity
ResponseImmediate key revocation, node replacement, forensic investigation

Wallet Attack Scenarios

Scenario: User Key Shard Compromise

AttackAttacker obtains user's MPC key shard via phishing or device compromise
ResultAttacker has 1 of 3 shards. Cannot sign alone - needs a second shard from JIL infrastructure.
DetectionUnusual signing requests, geographic anomaly, device fingerprint mismatch
ResponseAccount freeze, key rotation, user notification

Scenario: MPC Cosigner Compromise

AttackAttacker compromises JIL's MPC cosigner service
ResultAttacker has 1 shard (cosigner). Still needs user shard to sign. Cannot unilaterally settle.
DetectionSigning request volume anomaly, compliance gate violations, infrastructure alerts
ResponseCosigner service isolation, key rotation across all affected wallets

Bridge Attack Scenarios

Scenario: Deposit Event Spoofing

AttackAttacker submits fake deposit event to chain watcher
ResultChain watcher only reads events from verified JILBridge contract address. Fake events ignored.
DetectionRejected event logged, source IP flagged
ResponseNo action required - attack is structurally prevented

Scenario: Bridge Contract Exploit

AttackVulnerability in JILBridge.sol allows unauthorized withdrawal
ResultExposure limited to bridge contract balance. Rate limits cap single-transaction and daily withdrawal amounts.
DetectionWithdrawal volume monitoring, balance deviation alerts
ResponseEmergency pause via owner, bridge formal verification on roadmap (Q4 2026)

Infrastructure Attack Scenarios

Scenario: Supply Chain - Malicious Docker Image

AttackAttacker injects malicious code into Docker image during build or transit
ResultValidators verify image digest before deployment. Digest mismatch causes rejection.
DetectionJILHQ release pipeline detects digest mismatch, validator rejects pull
ResponseImage quarantined, build pipeline investigated, rebuild from verified source

Residual Risks

The following risks are acknowledged but not fully mitigated in the current architecture. They are actively managed through monitoring and roadmap items.

RiskSeverityCurrent MitigationPlanned Resolution
Quantum computing threat to Ed25519Low (future)Dilithium/Kyber implemented, not activatedActivation after audit (2027)
Zero-day in Node.js/Docker runtimeMediumRegular patching, minimal base imagesContinuous dependency scanning
Coordinated state-level validator seizureLow10 zones, diverse jurisdictionsExpand to 20 zones post May 2026
DNS-level traffic redirectionMediumCloudflare proxy, HTTPS enforcementDNSSEC implementation (roadmap)
Smart contract vulnerability in bridgeMediumRate limits, Sourcify verificationFormal verification Q4 2026

Monitoring and Incident Response

  • Real-time monitoring: SentinelAI fleet inspector with automated threat scoring across all validator nodes
  • Anomaly detection: Voting pattern analysis, geographic origin tracking, signing velocity monitoring
  • Auto-recovery: Fleet cycle triggers when health drops below 30% for 5 consecutive monitoring cycles
  • Incident escalation: Automated alerting with defined severity levels and response procedures
  • Anti-loop protection: Max 3 fleet cycles per 2 hours, max 2 failed cycles per node per 2 hours
  • Post-incident: Root cause analysis, assumption review, and control updates

Ready to verify?

Start with a structured POC. Evaluate JIL settlement infrastructure on a single corridor.

Request a POC All Assurance