Security & Risk Management
12.1 Security-First Approach
Security is a foundational principle of the PORTLY platform.
From initial system design to ongoing operations, PORTLY prioritizes conservative security assumptions and minimizes exposure to operational risk. The platform is built to provide portfolio intelligence without introducing unnecessary trust dependencies.
12.2 Non-Custodial Architecture
PORTLY operates under a strict non-custodial model.
Key characteristics include:
No storage or control of user private keys
No custody of user assets
No default transaction execution authority
Users retain full ownership and control of their assets at all times. PORTLY’s role is limited to analysis, insight delivery, and access management.
12.3 Read-Only Access Model
The platform uses a read-only access model when connecting user wallets.
PORTLY only requests permissions necessary to retrieve on-chain data for portfolio analysis. At no point does the platform request or require permissions to transfer assets or execute transactions on behalf of the user.
This model reduces attack surfaces and ensures transparent permission boundaries.
12.4 System Architecture Security
PORTLY’s system architecture is designed with layered security principles.
Security measures include:
Separation of analysis and user interaction layers
Restricted access controls for internal systems
Continuous monitoring of system integrity
All components are developed following secure coding practices and undergo internal review processes.
12.5 Token-Related Risk Controls
The dual-token structure (POTLP and POTL) incorporates additional risk mitigation mechanisms.
Risk control considerations include:
Separation of platform participation from market liquidity
Controlled token release through vesting schedules
Swap mechanisms designed to prevent sudden supply shocks
These measures help maintain ecosystem stability and reduce exposure to market-driven volatility.
12.6 User Data Protection
PORTLY is designed to minimize the collection and storage of sensitive user data.
Key principles include:
Collection of only essential operational data
No storage of private keys or sensitive wallet credentials
Responsible handling of user interaction data
User privacy and data protection are integral to platform trust.
12.7 Risk Disclosure
Digital asset management involves inherent risks, including market volatility, smart contract risks, and external platform dependencies.
PORTLY does not provide financial or investment advice. All insights and analytics are provided for informational purposes only.
Users are responsible for evaluating risks and making independent decisions regarding their assets.
12.8 Continuous Risk Evaluation
Security and risk management are ongoing processes.
PORTLY continuously evaluates system architecture, operational practices, and ecosystem dynamics to identify potential risks and implement appropriate safeguards.
Platform updates and enhancements are assessed through a security-focused lens to ensure long-term resilience.
Last updated