Incident Response Plan and Escalation Procedures
For: Rhea Lending Smart Contract System
Last Updated: 2025-12-01
1. Purpose
This document defines the incident response and escalation process for the Rhea lending protocol. Its goal is to ensure that any security or operational incidents (e.g., smart-contract vulnerabilities, abnormal fund movement, or oracle failures) are detected, triaged, and mitigated promptly and transparently.
2. Incident Detection
Incidents can be detected through the following channels:
Continuous on-chain monitoring and anomaly detection (e.g., large withdrawals, liquidity imbalance).
Internal alert systems and automated bots watching protocol metrics.
External disclosures from white-hat researchers or the community.
Third-party security partners or exchanges (e.g., Binance).
Once detected, the incident is immediately categorized by severity.
Critical
Potential or confirmed loss of funds
< 15 minutes
High
Protocol unavailable, pause required
< 1 hour
Medium
Degraded performance or oracle issue
4 hours
Low
Non-critical bug or UX issue
24 hours
3. Immediate Response Actions
3.1 Smart Contract Controls
The protocol includes an emergency pause() function, callable only by the multi-signature Admin wallet.
Purpose: Halt all lending/borrowing/minting functions to prevent further risk propagation.
Implementation:
pause().
When paused, core functions revert immediately.
State remains immutable; no funds are moved automatically.
3.2 Admin Access
The Admin address is a multi-signature wallet.
No single individual has unilateral control.
All administrative actions (pause/unpause, parameter update) require multi-sig approval.
3.3 Escalation Steps
Incident detected → On-call security lead notified.
Severity classified (Critical / High / Medium / Low).
If Critical:
Initiate multi-sig proposal to call pause() immediately.
Notify all Admin signers (via secure communication channel, e.g., Signal or encrypted email).
Execute pause() once quorum reached.
Post-pause verification:
Verify state consistency and that no pending operations remain.
Snapshot relevant contracts and balances.
4. Communication and Coordination
4.1 Internal Coordination
Incident Commander (IC): Zero
Technical Leads: Marco
Multi-sig Signers: Zero, Marco, Joe, Mency, Aescobar
4.2 External Coordination
Notify key stakeholders (e.g., Binance, auditors, oracles, liquidity partners).
Publish transparent updates through official channels (Twitter, Discord, or blog) once the incident is contained.
Engage third-party audit partners if smart-contract patch or redeployment is required.
5. Recovery and Post-Mortem
Assess the root cause and patch the vulnerability (with internal & external review).
Unpause contracts after full verification and sign-off by all Admin signers.
Publish a post-incident report summarizing:
Timeline of events
Impact analysis
Mitigation and permanent fixes
Lessons learned
6. Access Control and Documentation
All privileged roles and their actions are stored in on-chain governance contracts.
Access keys are secured by hardware wallets and multi-sig policies.
All incident communications are logged and archived in secure repositories (Notion + GitHub private repo).
The team performs at least one annual incident-response drill to test the procedure.
7. Summary
Emergency Pause
pause() callable by multi-sig
Immediate freeze of critical functions
Admin Model
Multi-signature
Prevents single-key control
Response Time
< 15 minutes for Critical
24/7 on-call rotation
Escalation
Security Lead → Multi-sig Admin → Public Communication
Documented and auditable
Transparency
All admin actions on-chain
Post-incident report published
Statement
The Rhea protocol maintains a documented, tested, and verifiable Incident Response Plan. The plan ensures that in any critical event, the team can promptly pause protocol activity, protect user assets, and coordinate transparent recovery through the multi-signature admin structure.
Last updated
Was this helpful?