Lombard Security Model

Lombard was built with security as the foundation, not an afterthought. When you deposit Bitcoin with Lombard, you're trusting the protocol with real value. We take that responsibility seriously.

This page explains the security measures protecting your funds, from hardware-level key protection to multi-layer verification to ongoing monitoring and audits.


Our Security Philosophy

Most bridge hacks and DeFi exploits share a common pattern: a single point of failure. One compromised key, one buggy contract, one malicious insider — and funds are gone.

Lombard's security model is built on the opposite principle: defense in depth. Every critical operation must pass through multiple independent security layers. An attacker would need to simultaneously compromise several unrelated systems to steal funds.


Security Consortium

The Security Consortium is the foundation of Lombard's trust model. Rather than relying on a single entity or a small multisig, Lombard distributes trust across 15 independent digital asset institutions like Galaxy Digital, Wintermute and Kraken.

Why Institutions Matter

Consortium members aren't anonymous validators. They're established companies with:

  • Public reputations they can't afford to damage

  • Legal accountability in their jurisdictions

  • Professional security teams managing infrastructure

  • No single point of control with geographic and organizational diversity

Supermajority Requirement

Every critical operation requires signatures from two-thirds of Consortium members (10 of 15). This means:

  • A single compromised member can't authorize anything

  • Even 5 compromised members can't authorize anything

  • An attacker needs to simultaneously breach 10 independent institutions

Becoming a Consortium Member

Membership isn't open, it requires vetting and approval:

1. Infrastructure deployment. The candidate deploys required infrastructure: Lombard Ledger node, CubeSigner integration, Bitcoin full node, and destination chain nodes.

2. Review process. Existing members review the candidate, including independent KYB (Know Your Business) checks. Public keys and organizational details are exchanged.

3. Network vote. Existing Consortium members vote to add the new member to the Proof-of-Authority network.

4. Smart contract update. The Lombard Protocol multisig updates contracts to include the new member's public address for signature verification.

This process ensures every member meets security standards before gaining signing authority.

Current Consortium members


CubeSigner: Hardware-Level Protection

CubeSigner, built by Cubist, provides the key management layer that protects all cryptographic operations in Lombard. It addresses the fundamental tradeoff between security and availability that has plagued crypto protocols.

Keys Never Leave Hardware

Private keys are generated inside Hardware Security Modules (HSMs) and never leave. Specifically, Lombard uses HSM-sealed Nitro enclaves designed to prevent key extraction.

This means:

  • No one can see the keys — not Consortium members, not Lombard, not Cubist

  • Keys can't be copied or exported — they exist only in hardware

  • Software attacks can't extract keys — even a fully compromised server can't steal them

Signing Sessions

When Consortium members need to sign operations, they don't access keys directly. Instead, they use CubeSigner signing sessions:

  • Fine-grained scopes — each session restricts who can sign, which messages, and with which keys

  • Short-lived — sessions expire quickly, limiting the window for misuse

  • Instantly revocable — compromised sessions can be killed immediately

Even if an attacker breached a Consortium member's systems, any stolen session would be useless within minutes.

Policy Enforcement

CubeSigner doesn't just protect keys — it enforces rules about how they can be used. These policies run in hardware, making them impossible to bypass through software:

Access control. Defines who can create and use keys, and under what conditions.

Transaction restrictions. Keys can only sign specific transaction types. User keys can only sign Babylon transactions — not arbitrary Bitcoin transactions. Even then, the types of Babylon transactions are restricted.

Usage limits. Controls how many transactions can be signed and their parameters (value, recipient, type).

Multi-party authorization. Certain operations require multiple members and multiple factors (like YubiKeys) to approve. No single party can unilaterally authorize high-risk transactions.

Timelocks. Keys and policies have mandatory waiting periods. Even authorized parties can't use them immediately — this prevents rapid exploitation if credentials are compromised.

Anti-Slashing Protection

Babylon staking introduces slashing risk if validators double-sign. CubeSigner includes Babylon-specific anti-slashing policies that make it cryptographically impossible for validators to sign slashable messages — whether from operational mistakes, bugs, or attacks.


Bascule Drawbridge: Independent Verification

The Bascule Drawbridge, operated by Cubist, provides a completely independent verification layer. It's a separate system that cross-checks every Consortium action before execution.

The Drawbridge Metaphor

Think of it as a literal drawbridge. The bridge is raised by default, minting is blocked. Only when Bascule independently confirms a valid deposit does the bridge lower to allow minting.

This design means that even a fully compromised Consortium can't mint unbacked LBTC. They would also need to compromise Bascule, which is operated by a separate organization with separate infrastructure.

Why Independent Verification Matters

Even well-designed systems can have bugs. The Consortium's verification logic could have an edge case that allows invalid mints. CubeSigner policies could have a misconfiguration.

Bascule is the safety net. It runs independently, with its own view of the Bitcoin network and its own verification logic. If something passes the Consortium but shouldn't, Bascule catches it.

How Bascule Works

For deposits:

  1. Bascule monitors the Bitcoin network independently

  2. When a deposit is detected, Bascule waits for 6 confirmations

  3. Bascule writes an attestation to its smart contract

  4. LBTC minting requires valid signatures from both the Consortium AND Bascule

  5. If either is missing, minting is blocked

For withdrawals (Reverse Bascule):

  1. Bascule monitors redemption events on supported chains

  2. After confirmations, Bascule writes the burn state to CubeSigner

  3. Before authorizing a BTC payout, CubeSigner checks for Bascule's attestation

  4. If the attestation is missing, the payout is blocked


Smart Contract Security

LBTC contracts are deployed on every supported chain. Each contract undergoes rigorous security review.

Audits

Lombard's contracts have been audited by multiple independent security firms:

  • OpenZeppelin — industry-leading smart contract auditors

  • Veridise — formal verification specialists

  • Halborn — blockchain security experts

  • Cantina — competitive audit platform for security researchers

  • Sherlock — decentralized security audit marketplace

Audit reports are publicly available for review.

View audit reports

Bug Bounty Program

Lombard maintains an active bug bounty program through Immunefi with rewards up to $250,000 for critical vulnerabilities. This incentivizes security researchers worldwide to find and responsibly disclose issues before they can be exploited.

Bug bounty program

Runtime Monitoring

Beyond audits, Lombard uses Hexagate for real-time monitoring of contract behavior. Anomalous patterns trigger alerts, enabling rapid response to potential threats.

Safety Features

LBTC contracts include built-in safety mechanisms:

Pausable functions. Critical operations can be paused instantly if a threat is detected.

Two-step upgrades. Contract upgrades require two separate transactions with a timelock between them. This prevents malicious instant upgrades and gives time for community review.

Rate limiting. Unusual patterns (like sudden large mints) can trigger additional verification requirements.


Operational Security

Security isn't just about code — it's about how systems are operated.

Incident Response

Lombard maintains documented incident response procedures. When issues are detected:

  1. Automated monitoring triggers alerts

  2. On-call team assesses severity

  3. If needed, pause functions are activated

  4. Root cause analysis begins

  5. Fix is developed, reviewed, and deployed

  6. Post-mortem is conducted and published

Key Ceremonies

Critical operations like adding new Consortium members or updating policies follow formal key ceremony procedures with multiple witnesses and verification steps.

Ongoing Review

Security isn't a one-time effort. Lombard conducts:

  • Regular security reviews of infrastructure

  • Penetration testing

  • Code audits for all significant changes

  • Monitoring of new attack vectors in the ecosystem


Transparency

Security through obscurity isn't security. Lombard maintains transparency about its security measures:

Proof of Reserve. Chainlink Proof of Reserve feeds verify Bitcoin backing every 10 minutes. Anyone can verify on-chain that LBTC is fully collateralized.

On-chain verification. All Consortium authorizations are recorded on the Lombard Ledger, creating a verifiable audit trail.

Public audits. All security audit reports are published publicly.

Open documentation. This documentation exists so users can understand exactly how their funds are protected.

Proof of Reserve

Audit reports


Known Risks

No system is perfectly secure. We believe in being transparent about risks:

Slashing risk (LBTC only, 0.1%). BTC staked through Babylon is subject to slashing if Finality Providers double-sign. BTC.b is not staked through Babylon. CubeSigner anti-slashing policies mitigate but don't eliminate this risk.

Smart contract risk. Despite audits, undiscovered vulnerabilities may exist in Lombard's contracts or integrated protocols.

Bridge risk. Cross-chain transfers rely on bridge infrastructure (CCIP, LayerZero) which could have vulnerabilities. Dual verification mitigates but doesn't eliminate this.

Consortium risk. While distributed, the Consortium is a permissioned set. A coordinated attack on supermajority of members could compromise the protocol.

Regulatory risk. Future regulations could affect protocol operations or Consortium members.

Understanding these risks helps you make informed decisions about using Lombard.

Risk documentation


Next Steps

Last updated