# Trust & Compliance

## Built for Security

Sova is engineered to meet **high standards** of on-chain safety and operational security — while maintaining the permissionless, self-custodial nature of crypto.

This is achieved through a **multi-layer architecture** of smart contracts, role-based controls, and audited code.

***

## 1. Non-Custodial Architecture

Sova uses a **modular architecture** to separate control over assets and execution.

### Core Components

* **Conduit**: A smart contract that manages all asset transfers into and out of the vault — ensuring no funds move without proper authorization
* **Vault Contract**: Holds cbBTC deposits and issues svBTC tokens
* **Reporter**: Provides on-chain valuation updates

> **Self-Custodial**
>
> Users retain on-chain ownership of their svBTC tokens at all times. The underlying cbBTC is held in the vault smart contract, not by any third party.

***

## 2. Role-Based Access Control

Sova implements a strict **hierarchical role system** to minimize risks and prevent abuse:

| Role                  | Responsibilities                                          |
| --------------------- | --------------------------------------------------------- |
| **Protocol Admin**    | System-level permissions, governance control              |
| **Strategy Admin**    | Approves new strategies and asset integrations            |
| **Price Updater**     | Updates NAV via oracle reporters                          |
| **Strategy Operator** | Executes operational actions (e.g., liquidity management) |

> **Zero Unauthorized Access**
>
> Every smart contract interaction is permission-gated. Unauthorized access is blocked at the protocol level.

***

## 3. Audit Coverage

All core contracts powering Sova are **fully audited** and follow security best practices:

* **ERC4626 vault logic**
* **Deposit and withdrawal flows**
* **Reporter and price oracle integration**
* **Access control and role manager systems**

Audit reports: See [Security](https://github.com/SovaNetwork/sovaprime-ts/blob/main/docs/vaults/technical-resources/security.md) for full audit details.

***

## 4. Oracle & Valuation Integrity

Valuation updates are submitted by authorized roles only, using the **Reporter contract**.

### To ensure accuracy and prevent manipulation:

* **All NAV updates** are timestamped and versioned
* **Price changes** above a set deviation threshold are automatically rejected
* **Role-based permissions** restrict who can submit updates

***

## 5. Smart Contract Security

### Security measures include:

* **Audited contracts** by Omniscia
* **ERC-4626 standard** compliance for vault operations
* **Minimal proxy pattern** for gas-efficient, battle-tested deployments
* **Hook system** for extensible operational controls

> **Transparent Operations**
>
> All vault operations are on-chain and verifiable on BaseScan.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.sova.io/legal-information/trust-and-compliance.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
