Your Securityon Linea

We are building the most robust security system in web3. The Linea security stack enables everyone to transact safely onchain.

ImageImage

The Linea Security Stack

Zero-Knowledge Technology

Linea's cutting-edge cryptographically secure ZK infrastructure relies on mathematical proofs of integrity, known as validity proofs, to verify all Linea transactions on Ethereum Mainnet. We trust math, not validators.

Image

EVM Equivalence

Linea is built on top of the Ethereum Virtual Machine (EVM), the most battle-tested smart contract development platform. This means building on Linea is no different from building on Ethereum—allowing builders to use familiar tools, standards, and infrastructure for increased security.

Image

Client Diversity

We support multiple Ethereum execution clients without modifications. This means any attack would require modification to the public versions of Geth, Besu, Erigon, and Nethermind—making any malicious activity immediately detectable.

Image

Open Source Development

Because anyone can review and contribute to Linea's source code, the network can be maintained without relying on a single entity.

Image

Security Partnerships

Our ecosystem of dapps is supported by the biggest and broadest household names in web3 security.

Image

Formal Verification

We use FV to verify the correctness of Linea with respect to the cryptography specification, offering another layer of security, particularly when introducing new features.

Image

Multi-Prover Implementation

With multiple provers, we aim to guarantee that a single bug from a single proof implementation cannot compromise the security of billions of assets in a fully decentralized and trustless system. Linea will not be secured by a single prover, but by multiple, ranging from TEEs to zkVMs.

Image

full spectrumof Ecosystemsecurity partners

Image
Threat Prevention
  • Every line of Linea contract code has been rigorously audited by the industry’s most sophisticated security firms.
  • We create strong incentives for application-level security by only promoting dapps that have undergone successful audits.
  • We offer rewards to developers for reporting vulnerabilities in Linea smart contracts, managed through our bug bounty program.
Image
Real-Time Monitoring
  • Our infrastructure operates 24/7, actively detecting threats with real-time surveillance and response mechanisms. With continuous monitoring, we can identify and address vulnerabilities, thwart attacks, and proactively protect users and protocols.
  • Our security partner, Hexagate, monitors the Linea Bridge to help protect users assets.
Image
Post-Incident Tracing
  • We harness the immutable, transparent nature of onchain activity to identify and trace malicious actors, learn exactly how an exploit occurred, and determine how to counter further vulnerabilities.
Image
User Protection
  • We work with wallet plugins to detect malicious smart contracts; threat scanners to monitor the Linea network for vulnerabilities; and social reputation firms to help users to make informed decisions about which dapps to interact with.