Battle-Tested Security and Execution
Security and execution are not add-ons in Surf. They are inherited properties of the zkCross stack it is built on.
Before Surf existed as a product, zkCross spent years designing and shipping execution infrastructure that could safely move value across chains, enforce deterministic behaviour, and operate under real-world adversarial conditions. This execution layer is what Surf uses today to run vault strategies, rebalance positions, and enforce risk boundaries without relying on trust or manual oversight.
At the core of this layer is a strict separation between decision-making and execution. Strategy logic can evolve, but execution remains constrained by hard rules embedded in the system. Transactions are only signed and released when they satisfy predefined conditions around slippage, liquidity availability, exposure limits, and safety thresholds. This design prevents undefined behaviour and removes the need for human intervention at critical moments.

Secure Signing and Key Management
zkCross execution relies on secure, non-custodial signing primitives designed to minimise trust assumptions.
Across different environments, this includes MPC-based key management and decentralised signing architectures, ensuring that private keys are never exposed or controllable by a single party. In advanced integrations, such as with the Internet Computer, transaction signing is handled through decentralised canisters using chain-key cryptography, further reducing attack surfaces.
For Surf users, this means assets remain non-custodial while still benefiting from automated execution and rebalancing.
Deterministic Execution and Guardrails
Every action executed by Surf runs through zkCross’s deterministic execution layer.
This layer enforces:
Predefined execution paths and routing constraints
Slippage, liquidity, and pricing limits
Exposure caps and strategy-specific risk rules
Fail-safe behaviour under degraded market conditions
If conditions are not met, execution does not proceed. There are no discretionary overrides, hidden fallbacks, or manual “fixes” during live operation. This makes system behaviour predictable, auditable, and resilient under stress.
Automation Under Real Load
zkCross infrastructure has processed $140M+ transaction volume across multiple chains, operating under live market conditions rather than simulated environments.
This includes high-frequency cross-chain execution, liquidity routing across fragmented pools, and automated flows that must handle gas volatility, bridge latency, and partial failures without compromising safety. The same automation primitives now power Surf’s vault operations, enabling continuous optimisation without increasing operational risk.
Independently Audited Security
All core execution components have undergone independent audits and security reviews by Halborn, including protocol logic, smart contracts, and penetration testing.
These audits were conducted on live infrastructure deployed across EVM and non-EVM chains, validating both correctness and resilience. Surf inherits this security posture directly, rather than relying on untested or composable third-party systems.
What This Enables for Surf
Because execution and security are native, Surf can safely automate yield strategies that would otherwise require constant human supervision.
Users benefit from:
Non-custodial automation with enforced risk limits
Predictable execution behaviour under all conditions
Reduced dependency on external protocols for safety guarantees
This battle-tested execution layer is the reason Surf can operate as an AI yield system with confidence, rather than a strategy wrapper held together by trust assumptions.
Last updated