Nautilus Dev Center
  • Nautilus Developer Documentation
  • Rollup Protocol
  • Security Model
  • Nautilus Mainnet
  • Nautilus Testnet
  • Quickstart: Build a decentralized app with Nautilus (Solidity, Hardhat)
  • Nautilus Bridge
Powered by GitBook
On this page

Security Model

The Nautilus security model reflects other rollups on Celestia.

PreviousRollup ProtocolNextNautilus Mainnet

Last updated 2 years ago

At Nautilus, we take security very seriously. That's why we are still in testnet mode until we've fully audited the codebase. Similarly, we can't fully decentralize Nautilus until these crucial security audits have been completed.

Our security model reflects the security model of all other optimistic sovereign rollups on Celestia. We refer to the for our definitions for various security terminology:

  • : the cost to alter history

  • : anyone can participate in the protocol

  • : assumptions so funds cannot be frozen or stolen

  • : the ratio of transactions per second to the cost of running a full node

The goal of Nautilus is to build a secure, permissionless, trust-minimized, high throughput EVM chain. We highly value your patience and support as we continue to build highly performant decentralized systems.

Eclipse glossary
Security
Permissionless
Trust
Throughput