Security Philosophy

Axiom is built with defense in depth: multiple independent layers of security so that no single point of failure compromises the system. Cryptographic algorithms are selected from NIST standards. The codebase is written in Rust to eliminate memory safety vulnerabilities. All arithmetic is performed with fixed-point integers to prevent floating-point consensus divergence.

Security extends beyond code. The distribution model uses no pre-mine, no team allocation, and no privileged access. Every AXM is earned through proof of work. The RPC interface binds to localhost by default. Wallet keys are encrypted at rest and never transmitted.

Cryptographic Primitives

🔑

ML-DSA-87 (FIPS 204)

Post-quantum digital signature scheme based on lattice problems. NIST Category 5 — equivalent to AES-256 security. Protects all transaction signatures against quantum computing attacks.

🛡

SHA3-256

Keccak-based hash function used for proof-of-work, block hashing, and merkle trees. NIST standardized. Distinct construction from SHA-2 — no length extension attacks.

🔒

Argon2id + XChaCha20-Poly1305

Memory-hard key derivation prevents brute-force password attacks. Authenticated encryption protects wallet keys at rest. 256-bit keys, 192-bit nonces.

📄

BIP39 Mnemonics

24-word seed phrases (256-bit entropy) for wallet generation. Standard format compatible with secure physical backup practices.

PurposeAlgorithmStandardSecurity Level
Transaction signaturesML-DSA-87FIPS 204Category 5
Proof of workSHA3-256FIPS 202256-bit
Block hashingSHA3-256FIPS 202256-bit
Key derivationArgon2idRFC 9106Memory-hard
Wallet encryptionXChaCha20-Poly1305RFC 8439+256-bit
Seed generationBIP39BIP-0039256-bit entropy

Node Verification Model

Every full node independently verifies every block and transaction. There is no trusted third party. This is the fundamental security guarantee of the network.

Full Validation

Nodes verify proof-of-work, transaction signatures, input availability, amounts, merkle roots, and block structure. Invalid blocks are rejected and the sending peer is penalized.

Deterministic Consensus

Q64 fixed-point arithmetic ensures identical reward calculations on all platforms. No floating-point divergence. Consensus cannot split due to hardware differences.

Network Trust Model

Axiom operates on a zero-trust network model. Peers are never trusted — all data received from peers is independently verified before acceptance.

  • Blocks are validated against all consensus rules before acceptance
  • Transactions are verified for valid signatures and unspent inputs
  • Peers that send invalid data receive ban score penalties
  • Peers exceeding the ban threshold are disconnected and blocked
  • Connection limits prevent resource exhaustion from malicious peers
  • Checkpoint hashes for historical blocks are hardcoded in the binary

Verify Downloads

Always verify the integrity of downloaded binaries before running them. Each release includes SHA-256 checksums.

Linux / macOSbash
curl -LO https://github.com/axiom-network/axiom/releases/latest/download/SHA256SUMS
sha256sum -c SHA256SUMS
Windows (PowerShell)
Get-FileHash axiom-v0.5.0-x86_64-pc-windows-msvc.zip -Algorithm SHA256
# Compare output against published checksum

Responsible Disclosure

🛡
Report a vulnerability

If you discover a security vulnerability in Axiom, please report it responsibly. Do not open a public issue. Instead, email the details to security@axiom-network.org with a description of the vulnerability, steps to reproduce, and your assessment of impact. We will acknowledge receipt within 48 hours.

We commit to:

  • Acknowledging reports within 48 hours
  • Providing regular updates on remediation progress
  • Crediting researchers in security advisories (with permission)
  • Not pursuing legal action against good-faith researchers