At Noders, we take validator security and operational integrity seriously.
Below is an overview of our current practices:
1. Infrastructure Security
We operate on trusted infrastructure providers such as Hetzner and AWS.
All validator and sentry nodes are protected by firewalls, private networking, and IP whitelisting.
Redundant architecture is implemented using sentry nodes and backup validators to ensure high availability.
2. Updates & Monitoring
We apply security updates and patches promptly.
Monitoring includes block production, missed slots, peer connectivity, and validator health.
We use alerting systems (e.g., Prometheus + Alertmanager, Telegram bots) to detect anomalies in real time.
3. Key Management
All validator keys are generated offline and stored in secure, isolated environments (air-gapped or hardware-based).
We enforce strict access controls and regular integrity checks.
Key rotation procedures are in place if needed.
4. Recovery & Backups
We maintain automated and encrypted backups of node state and configurations.
A clearly documented disaster recovery plan ensures minimal downtime in the event of failure.
5. Access Control
Node access is limited to a small, trusted team with role-based privileges.
All access is logged and audited.
6. Software Policy
We run official client software only.
No third-party modifications or custom consensus changes are applied.
7. Incident Reporting
If you observe a potential issue with our validator node, please contact us at security@noders.team