# Incident Response Plan and Escalation Procedures

Last Updated: 2025-12-01

### 1. Purpose

This document defines the i**ncident response and escalation process** for the Rhea lending protocol.\
Its goal is to ensure that any security or operational incidents (e.g., smart-contract vulnerabilities, abnormal fund movement, or oracle failures) are detected, triaged, and mitigated promptly and transparently.

### 2. Incident Detection

Incidents can be detected through the following channels:

* Continuous on-chain monitoring and anomaly detection (e.g., large withdrawals, liquidity imbalance).
* Internal alert systems and automated bots watching protocol metrics.
* External disclosures from white-hat researchers or the community.
* Third-party security partners or exchanges (e.g., Binance).

Once detected, the incident is immediately categorized by severity.

| Severity | Description                          | Initial Response Time |
| -------- | ------------------------------------ | --------------------- |
| Critical | Potential or confirmed loss of funds | < 15 minutes          |
| High     | Protocol unavailable, pause required | < 1 hour              |
| Medium   | Degraded performance or oracle issue | 4 hours               |
| Low      | Non-critical bug or UX issue         | 24 hours              |

### 3. Immediate Response Actions

#### 3.1 Smart Contract Controls

The protocol includes an emergency pause() function, callable only by the multi-signature Admin wallet.

* Purpose: Halt all lending/borrowing/minting functions to prevent further risk propagation.
* Implementation:
* pause().
* When paused, core functions revert immediately.
* State remains immutable; no funds are moved automatically.

#### 3.2 Admin Access

* The Admin address is a multi-signature wallet.
* No single individual has unilateral control.
* All administrative actions (pause/unpause, parameter update) require multi-sig approval.<br>

#### 3.3 Escalation Steps

1. Incident detected → On-call security lead notified.
2. Severity classified (Critical / High / Medium / Low).
3. If Critical:
   1. Initiate multi-sig proposal to call pause() immediately.
   2. Notify all Admin signers (via secure communication channel, e.g., Signal or encrypted email).
   3. Execute pause() once quorum reached.
4. Post-pause verification:

   1. Verify state consistency and that no pending operations remain.
   2. Snapshot relevant contracts and balances.

#### 4. Communication and Coordination

**4.1 Internal Coordination**

* Incident Commander (IC): Zero
* Technical Leads: Marco
* Multi-sig Signers: Zero, Marco, Joe, Mency, Aescobar<br>

**4.2 External Coordination**

* Notify key stakeholders (e.g., Binance, auditors, oracles, liquidity partners).
* Publish transparent updates through official channels (Twitter, Discord, or blog) once the incident is contained.
* Engage third-party audit partners if smart-contract patch or redeployment is required.

#### 5. Recovery and Post-Mortem

1. Assess the root cause and patch the vulnerability (with internal & external review).
2. Unpause contracts after full verification and sign-off by all Admin signers.
3. Publish a post-incident report summarizing:
   1. Timeline of events
   2. Impact analysis
   3. Mitigation and permanent fixes
   4. Lessons learned<br>

#### 6. Access Control and Documentation

* All privileged roles and their actions are stored in on-chain governance contracts.
* Access keys are secured by hardware wallets and multi-sig policies.
* All incident communications are logged and archived in secure repositories (Notion + GitHub private repo).
* The team performs at least one annual incident-response drill to test the procedure.

#### 7. Summary

| Component       | Control                                                | Description                            |
| --------------- | ------------------------------------------------------ | -------------------------------------- |
| Emergency Pause | pause() callable by multi-sig                          | Immediate freeze of critical functions |
| Admin Model     | Multi-signature                                        | Prevents single-key control            |
| Response Time   | < 15 minutes for Critical                              | 24/7 on-call rotation                  |
| Escalation      | Security Lead → Multi-sig Admin → Public Communication | Documented and auditable               |
| Transparency    | All admin actions on-chain                             | Post-incident report published         |

#### Statement

The Rhea protocol maintains a documented, tested, and verifiable Incident Response Plan.\
The plan ensures that in any critical event, the team can promptly pause protocol activity,\
protect user assets, and coordinate transparent recovery through the multi-signature admin structure.

<br>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://guide.rhea.finance/developers/incident-response-plan-and-escalation-procedures.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
