Lombard Security Model
Lombard’s security philosophy is built on defense in depth rather than relying on single points of failure. The protocol implements multiple independent security layers, requiring attackers to compromise several unrelated systems simultaneously to access funds.

Security Consortium
The Security Consortium distributes trust across 15 independent digital asset institutions. These members possess public reputations, legal accountability, professional security teams, and geographic/organizational diversity.
Members include OKX, Galaxy, DCG, Wintermute, Amber Group, Figment, P2P, Kiln, Kraken, Antpool, and F2Pool.
Key operational requirements:
- Two-thirds majority (10 of 15 members) must sign off on critical operations
- A single or even five compromised members cannot authorize actions independently
- Membership requires infrastructure deployment, KYB review, network voting, and smart contract updates
CubeSigner: Hardware-Level Protection
CubeSigner, built by Cubist, manages cryptographic operations through Hardware Security Modules. Private keys are generated inside HSMs and never leave secure hardware, ensuring keys remain inaccessible to Consortium members, Lombard, or Cubist.
Implementation mechanisms:
- Fine-grained signing sessions with expiration and revocation capabilities
- Transaction restrictions limiting key usage to specific transaction types
- Multi-party authorization requirements for high-risk operations
- Timelocks preventing immediate credential utilization
- Anti-slashing cryptographic policies for Babylon validators
Bascule Drawbridge: Independent Verification
Operating as an independent verification layer, Bascule provides cross-checks preventing a compromised Consortium from minting unbacked LBTC. The system monitors Bitcoin independently, awaits six confirmations, and requires dual authorization from both the Consortium and Bascule.
For deposits: Before any mint, Bascule independently verifies that the BTC deposit exists on the Bitcoin network with 6 confirmations. Minting requires valid signatures from both the Consortium and Bascule.
For withdrawals (Reverse Bascule): Bascule monitors redemption events on supported chains. Before CubeSigner authorizes a BTC payout, the Reverse Bascule verifies that the corresponding LBTC was actually burned.
Smart Contract Security
Lombard contracts undergo rigorous third-party audits from OpenZeppelin, Veridise, Halborn, Cantina, and Sherlock. The protocol maintains an Immunefi bug bounty program offering rewards up to $250,000 and employs Hexagate for real-time behavioral monitoring.
Safety mechanisms include:
- Pausable critical functions
- Two-step upgrades with timelocks
- Rate limiting on unusual patterns
Operational Security
Infrastructure protection includes:
- Documented incident response procedures
- Formal key ceremonies with multiple witnesses
- Regular penetration testing
- Continuous ecosystem threat monitoring
Transparency Measures
Chainlink Proof of Reserve feeds verify Bitcoin backing every 10 minutes. On-chain audit trails, publicly available audit reports, and comprehensive documentation support user verification of security measures.
Known Risks
The protocol acknowledges inherent limitations:
- Slashing risk: 0.1% exposure for Babylon-staked BTC
- Smart contract vulnerabilities: Despite audits, no code is guaranteed bug-free
- Bridge infrastructure dependencies: Cross-chain transfers rely on external validators
- Permissioned Consortium coordination: Requires trust in institutional members
- Regulatory uncertainties: Evolving legal landscape for crypto assets
Next Steps
- Consortium Members — Full list of the 15 Security Consortium members
- Audits — Complete audit history and security review details
- Bug Bounty — Immunefi program details and reward tiers
- Transparency — Proof of Reserve, oracles, and on-chain verification