Skip to content

Security

Pridge is designed with security and privacy as core principles. This page explains our security model.

Threat Model

What Pridge Protects Against

ThreatProtection
On-chain trackingDisposable addresses break the link
Server data collectionNo backend, everything client-side
URL snoopingPrivate keys in URL fragments (never transmitted)
Key theft in transitKeys never leave your browser

What Pridge Does NOT Protect Against

ThreatWhy
Compromised browserMalware can read browser memory
Shared claim linksAnyone with the link can claim
Network analysisBridge transactions are still visible
Compromised RPCMalicious RPC could potentially manipulate data

Security Architecture

Client-Side Only

┌─────────────────────────────────────────────┐
│              YOUR BROWSER                    │
│  ┌─────────────────────────────────────┐    │
│  │  Keypair Generation                  │    │
│  │  Transaction Signing                 │    │
│  │  Claim Link Encoding                 │    │
│  └─────────────────────────────────────┘    │
│                    │                         │
│                    │ Read-only API calls     │
│                    ▼                         │
└─────────────────────────────────────────────┘

      ┌──────────────┼──────────────┐
      ▼              ▼              ▼
  [Solana RPC]  [deBridge API]  [EVM RPC]

No backend server ever sees your private keys.

URL Fragment Privacy

The claim link structure:

https://pridge.io/#3bkJCGFKYvkogDh3fjv8...

                   This is NEVER sent to servers

Per RFC 3986, URL fragments are processed client-side only.

Keypair Generation

typescript
// Cryptographically secure random generation
import { Keypair } from '@solana/web3.js';
const disposable = Keypair.generate();
// Uses crypto.getRandomValues() under the hood

Best Practices

Do

  • Save claim links securely (password manager, encrypted storage)
  • Test with small amounts first
  • Verify you're on the correct domain (pridge.io)
  • Use a fresh browser session for sensitive operations
  • Clear browser data after claiming

Don't

  • Share claim links on public channels
  • Reuse disposable addresses
  • Claim to wallets already linked to your identity
  • Use on untrusted devices or networks
  • Screenshot claim links (they may sync to cloud)

Audits

WARNING

Pridge has not been formally audited. Use at your own risk.

The codebase is open source for community review:

Responsible Disclosure

Found a vulnerability? Please report privately:

  1. Do not open a public GitHub issue
  2. Contact us via Twitter DM
  3. Allow reasonable time for fixes before disclosure

Dependencies

Pridge relies on:

DependencyPurposeTrust Level
Solana Web3.jsKeypair, transactionsHigh (official SDK)
deBridge APICross-chain messagingMedium (external service)
Ethers.jsEVM interactionsHigh (industry standard)
Helius RPCSolana RPCMedium (external service)

Open Source

All code is MIT licensed and available for inspection:

bash
git clone https://github.com/xvoidlabs/pridge

We encourage security researchers to review and report findings.

Privacy-first cross-chain bridge