Ownership Verification
The Credible Layer uses admin verifier modules to determine who can deploy assertions for a contract. Most deployments use owner-based verification by default. This design will continue to expand with additional ownership patterns.Current Implementation
The common default verifier expects contracts to implement theowner() function (Ownable pattern). Here’s an example of the expected interface:
Managing assertions is a sensitive role. We recommend using hardware wallets and multisig accounts for protocol admin (assertion manager) addresses.
Manual Verification (Overview)
If your contracts are immutable or don’t expose an admin interface, you may be able to request manual verification. In this path, Phylax validates that the requesting team controls the protocol and then registers a protocol admin (manager) address for the specific contracts in the State Oracle registry. High-level requirements and signals include:- Demonstrated control over the protocol codebase (e.g., ability to merge to the official repo and manage collaborators)
- Strong public proof that the protocol wants to use the Credible Layer and that the selected admin address reflects the organization’s intent (e.g., multisig signatures or official social announcements)
- Willingness to share identity or evidence when needed
Future Development
We are actively researching alternative ownership verification methods that will:- Support different ownership patterns
- Enable seamless ownership transfers
- Maintain security requirements
Next Steps
- Quickstart Guide - Get started with the Credible Layer
- Assertion Guide - Learn how to write assertions
- Deploy Assertions - Learn how to deploy assertions
- FAQ - Find answers to common questions

