What is the Credible Layer?
The Credible Layer is security infrastructure that enables developers to link security rules to their smart contracts on-chain. Then, the network validates every transaction that interacts with their smart contracts against their security rules, dropping any invalidating transaction.How It Works
1
Define rules in Solidity
Write assertions—security rules that define states your protocol should never reach. No contract modifications required.
2
Network validates every transaction
The network checks each transaction against your assertions before inclusion in a block.
3
Invalid transactions are dropped
Transactions that violate your rules are dropped by the network and never execute.
I Want To…
Start Building
Write and deploy your first assertion. Get from zero to protected in minutes.
Evaluate Credible Layer
A quick checklist for dApps and networks.
Understand at a High Level
Non-technical overview of how the Credible Layer prevents exploits.
Evaluate the Architecture
Technical deep dive into system design, transaction flow, and integration requirements.
Integrate as a Protocol
High-level adoption flow for protocol teams.
Browse Examples
Explore assertion patterns and see how real-world hacks could have been prevented.
Integrate as a Network
High-level integration for networks and sequencers.
Key Benefits
- Pre-execution prevention — Exploits are blocked before they execute, not detected after
- No contract changes — Add protection to any contract, including immutable ones
- Transparent & verifiable — All rules are public Solidity, auditable by anyone
- No external execution services — Enforcement runs within the network’s block-building flow
- Zero false positives — Binary enforcement based on your rules, no AI guessing
Community & Support
Have questions or want to connect with the Phylax community?- Join our Telegram
- Follow us on X/Twitter
- Explore our GitHub
- Visit the Phylax Website

