What is the Credible Layer?
The Credible Layer is security infrastructure that enables developers to link security rules to their smart contracts on-chain. Then, the network validates every transaction that interacts with their smart contracts against their security rules, dropping any invalidating transaction.How It Works
Define rules in Solidity
Write assertions—security rules that define states your protocol should never reach. No contract modifications required.
Network validates every transaction
The network checks each transaction against your assertions before inclusion in a block.
I Want To…
Start Building
Write and deploy your first assertion. Get from zero to protected in minutes.
Evaluate Credible Layer
A quick checklist for dApps and networks.
Understand at a High Level
Non-technical overview of how the Credible Layer prevents exploits.
Evaluate the Architecture
Technical deep dive into system design, transaction flow, and integration requirements.
Integrate as a Protocol
High-level adoption flow for protocol teams.
Browse Examples
Explore assertion patterns and see how real-world hacks could have been prevented.
Integrate as a Network
High-level integration for networks and sequencers.
Key Benefits
- Pre-execution prevention — Exploits are blocked before they execute, not detected after
- No contract changes — Add protection to any contract, including immutable ones
- Transparent & verifiable — All rules are public Solidity, auditable by anyone
- No external execution services — Enforcement runs within the network’s block-building flow
- Zero false positives — Binary enforcement based on your rules, no AI guessing
Community & Support
Have questions or want to connect with the Phylax community?- Join our Telegram
- Follow us on X/Twitter
- Explore our GitHub
- Visit the Phylax Website

