Defense-in-Depth

60+ Checks.
Sub-Millisecond.

Every request, no exceptions, passes through 60+ automated security checks before it ever reaches the ordering engine. IP validation, bot detection, rate limiting, fingerprint verification, anomaly analysis. All of it. Every time. Sub-millisecond.

60+ checks
in
25µs

What We Stop

🛡️

IP Guardian

Behavioral analysis of every IP address. Connection velocity tracking, geographic consistency checks, and provider reputation scoring. Customer-managed IP allowlists let you pre-approve trusted sources.

Per-IP Behavioral profile
🤖

Bot Detection

Request fingerprinting identifies automated traffic without CAPTCHAs. Timing analysis, header consistency, behavioral divergence scoring, and connection pattern analysis. All server-side, all invisible to real users.

Zero CAPTCHAs needed
⏱️

Rate Limiting

Sliding-window rate control with intelligent burst detection. Per-user, per-IP, and per-event rate fences operate independently. Customers can configure their own rate limit thresholds via the Admin API.

3 Layers User / IP / Event
📊

Anomaly Detection

Real-time statistical analysis flags abnormal traffic patterns before they become problems. Sudden spikes, geographic clusters, and timing attacks are detected automatically. Stream anomaly alerts live via SSE.

Real-time Statistical analysis
🔑

Dual API Key System

Every account gets two keys: a live key for production requests and a read-only proof key for verification. Separate privilege levels mean a compromised key can't modify ordering data.

2 Keys Live + Proof
🧬

Request Fingerprinting

Each request generates a unique cryptographic fingerprint combining timing, headers, network characteristics, and behavioral signals. No two legitimate users produce the same fingerprint. Clones are obvious.

Unique Per-request fingerprint

What Happens Per Request

Authentication & Key Validation

API key format, expiry, permissions scope, rate-limit state, account status, event binding

IP & Network Analysis

IP reputation, geographic consistency, connection velocity, provider classification, proxy detection, datacenter flag

Request Fingerprinting

Header hash, timing signature, TLS fingerprint, behavioral score, user-agent analysis, encoding patterns, compression negotiation

Rate & Abuse Control

Per-user rate, per-IP rate, per-event rate, burst detection, sliding window state, concurrent connection count

Bot & Automation Detection

Timing variance, request cadence, header consistency, behavioral divergence, replay detection, session continuity

Payload & Intent Validation

Schema validation, field bounds, duplicate submission, idempotency key, event capacity, timestamp freshness

Cryptographic Integrity

Token validity, commitment hash verification, fairness token structure, proof chain continuity

Every Check. Every Request. No Exceptions.

There is no "fast path" that skips checks. There is no "trusted mode." Every single request, from a first-time trial user to the largest enterprise, passes through the same 60+ checks. That's the guarantee.

Zero Trust. Zero Shortcuts.

No Secret Bypass

Many platforms have internal "god mode" keys or admin bypasses. We don't. Admin operations run through the same security stack. The 60+ checks are structurally mandatory. It's not policy, it's architecture.

Fail Closed

If any check can't execute (network issue, resource limit, unexpected input), the request is rejected, not passed through. We fail closed. Always. A false rejection is infinitely better than a compromised ordering.

Immutable Audit Trail

Every check result is logged. Every decision has a paper trail. Combined with Fairness Proofs, you get a cryptographically verifiable record of every security decision made on every request.

Defense in Depth

No single check is the gatekeeper. 60+ independent checks means an attacker needs to evade all of them simultaneously. Breaking one layer gains nothing. The others catch it.

See the Numbers
Behind the Speed

1.3M+ req/sec single node. 25µs per-request processing. 39M+ requests, zero data loss.