Vanta SDK Whitepaper

Security Model

Threat Model

Replay Attacks

Threat: Reusing payment proof to access resource multiple times.

Mitigation: Single-use challenges marked as used after verification. Challenge IDs are unique and time-limited.

Front-Running

Threat: Observing payment and using proof before original requester.

Mitigation: Payment proof includes signature from sender wallet. Only the payer can use the proof.

Challenge Forgery

Threat: Creating fake challenges to trick clients.

Mitigation: Challenges are signed by server. Clients verify signature before payment.

Double Spending

Threat: Using same payment for multiple challenges.

Mitigation: Challenge ID embedded in tx.data. Each payment uniquely bound to one challenge.

Operational Security

  • Use HTTPS for all communications
  • Rotate token secrets periodically
  • Monitor for unusual payment patterns
  • Implement rate limiting even with payments
  • Use reliable RPC providers with fallbacks

Idempotency

Payment verification is idempotent—verifying the same proof twice returns the same result without side effects.