Introduction to Venn
Last updated
Last updated
Venn is a decentralized cybersecurity infrastructure that protects blockchain applications and protocols from malicious transactions and economic risks. It enables the proactive blocking of malicious activities and protects the operational continuity of blockchain applications by leveraging a combination of off-chain computation and on-chain execution capabilities. Venn's Actively Validated Service (AVS) leverages the crypto-economic security provided by EigenLayer.
Venn employs a unique architecture that integrates both on-chain and off-chain security mechanisms to deliver a distributed defense layer. The off-chain component involves a network of security operators who validate transactions before they are committed to the blockchain. These operators use numerous algorithms to examine each transaction and reach a consensus on its legitimacy. The on-chain component consists of smart contracts that enforce security policies in real-time during transaction execution, ensuring that any malicious activities are blocked without disrupting the protocol's functionality.
Venn Security Network: A decentralized network of node operators responsible for examining transactions and reaching a consensus on their legitimacy before committing to the blockchain. Each transaction undergoes thorough security checks to ensure it is not malicious. This competitive validation process ensures robust and diverse security assessments.
Venn On-chain Firewall: An open-source framework that enables developers to implement on-chain blocking mechanisms within their web3 applications. By integrating at the smart contract level, the firewall receives the network's consensus on the legitimacy of transactions and can block them accordingly.
The Venn Root Network is the foundational layer of the Venn ecosystem, ensuring security validation, consensus, and incentivization for all participants. It acts as the primary and default configuration.
Chains, protocols, developers, and operators who do not wish to create or join a dedicated subnet can join the Venn Root Network directly. This allows for participation without configuring or maintaining a custom subnet.
In Venn, subnets are a powerful feature that provides a flexible, customized, and dedicated security layer. Operating on top of the main Venn root network, subnets allow chains, protocols, developers, security teams, and node operators to build unique security-validating environments. This enables the creation of tailored security frameworks, threat detection models, and validation rules.
Subnets offer security teams, node operators, and protocols to establish customized subnetworks. This enables network participants to design and enforce security standards that align with specific operational goals.
Additionally, subnets allow you to set custom fees and payment structures, enabling the establishment of on-chain agreements on fees, rewards, and service payments, all customized to fit your specific needs.
Two key models of operation are supported:
1. Dedicated Subnet for Chains and Protocols: Protocols and chains can create their subnet to handle transaction validation and operational processes according to custom security requirements with a set of chosen node operators.
2. Dedicated Security Models and Expertise: Subnets can be configured to validate specific security domains, allowing operators to specialize in areas like threat prevention, governance, oracle manipulation, compliance, and user protection to create a dedicated subnet. This creates a decentralized, dedicated security environment where protocols can join subnets that align with their particular security needs.
Proactive Security - Venn's architecture is designed to proactively stop hacks and malicious activities rather than merely mitigating them after the fact.
Decentralized and Reliable - Leveraging a decentralized network of security operators ensures robust and reliable security assessments without relying on a single point of failure.
Battle-Tested Security - More than a concept, Venn is a proven technology that has prevented hacks worth over $2 million this year alone.
Backtested - Venn's testnet phase has rigorously tested its capabilities against most hacks from the past two years, ensuring it can stop attacks before they impact the blockchain state and demonstrating its effectiveness and accuracy.
Cost-Effective Security - Utilizing Venn's network eliminates the capital costs of securing blockchain applications, offering greater security at a much lower cost and effort.
Leveraging Top Security Minds - Venn utilizes top blockchain security experts and diverse methods, ensuring transactions are evaluated with powerful methods and diverse and distributed algorithms. This allows developers to access multiple security methods rather than relying on a single vendor.
Incentivized: Venn’s architecture ensures active and meaningful participation across the network. Node operators, security teams, protocols, and developers are rewarded based on their contributions to the ecosystem's security, performance, and growth.