Security & Risk Management

12.1 Security-First Approach

Security is a foundational principle of the PORTLY platform.

From initial system design to ongoing operations, PORTLY prioritizes conservative security assumptions and minimizes exposure to operational risk. The platform is built to provide portfolio intelligence without introducing unnecessary trust dependencies.


12.2 Non-Custodial Architecture

PORTLY operates under a strict non-custodial model.

Key characteristics include:

  • No storage or control of user private keys

  • No custody of user assets

  • No default transaction execution authority

Users retain full ownership and control of their assets at all times. PORTLY’s role is limited to analysis, insight delivery, and access management.


12.3 Read-Only Access Model

The platform uses a read-only access model when connecting user wallets.

PORTLY only requests permissions necessary to retrieve on-chain data for portfolio analysis. At no point does the platform request or require permissions to transfer assets or execute transactions on behalf of the user.

This model reduces attack surfaces and ensures transparent permission boundaries.


12.4 System Architecture Security

PORTLY’s system architecture is designed with layered security principles.

Security measures include:

  • Separation of analysis and user interaction layers

  • Restricted access controls for internal systems

  • Continuous monitoring of system integrity

All components are developed following secure coding practices and undergo internal review processes.


The dual-token structure (POTLP and POTL) incorporates additional risk mitigation mechanisms.

Risk control considerations include:

  • Separation of platform participation from market liquidity

  • Controlled token release through vesting schedules

  • Swap mechanisms designed to prevent sudden supply shocks

These measures help maintain ecosystem stability and reduce exposure to market-driven volatility.


12.6 User Data Protection

PORTLY is designed to minimize the collection and storage of sensitive user data.

Key principles include:

  • Collection of only essential operational data

  • No storage of private keys or sensitive wallet credentials

  • Responsible handling of user interaction data

User privacy and data protection are integral to platform trust.


12.7 Risk Disclosure

Digital asset management involves inherent risks, including market volatility, smart contract risks, and external platform dependencies.

PORTLY does not provide financial or investment advice. All insights and analytics are provided for informational purposes only.

Users are responsible for evaluating risks and making independent decisions regarding their assets.


12.8 Continuous Risk Evaluation

Security and risk management are ongoing processes.

PORTLY continuously evaluates system architecture, operational practices, and ecosystem dynamics to identify potential risks and implement appropriate safeguards.

Platform updates and enhancements are assessed through a security-focused lens to ensure long-term resilience.

Last updated