Squads Labs

626 posts

Squads Labs banner
Squads Labs

Squads Labs

@SquadsLabs

Growing the onchain economy. Building @multisig, @altitude, @fusewallet and Grid.

Katılım Aralık 2022
38 Takip Edilen3.3K Takipçiler
Squads Labs retweetledi
Altitude
Altitude@altitude·
Businesses no longer need a bank account. We've raised $18M on this bet. Go altitude.xyz
English
126
84
859
355K
Squads Labs retweetledi
Squads
Squads@multisig·
Announcing Solana Multisig Tools Three new open-source tools for Squads Protocol v4. All three are small, self-hostable, and built with minimal dependencies. We're actively engaging with STRIDE to help strengthen multisig management practices on Solana. This is the first step towards multiple independent frontends and access points to v4. multisig-cli A focused Rust CLI for reviewing, simulating, signing, and executing multisig proposals. It parses multisig accounts and instructions directly instead of pulling in a large dependency tree. The result is a binary that's easy to audit and well suited for high-trust operational workflows. If you're using an older CLI, we recommend switching to this multisig-cli which has minimal dependencies. multisig-verifier A static, zero-backend browser UI. Reads multisigs state directly from Solana RPCs, decodes proposals, tracks approvals, and lets members approve or reject from their own wallet. No secrets leave the browser. Strict CSP rules by default. multisig-monitor Real-time visibility into multisig activity. Watches configured multisigs, decodes actions, and emits notifications when members create, vote on, execute, or modify configuration. Treasury and governance events surface as they happen. The pattern across all three: inspect before signing, verify before approving, monitor after execution. Smaller dependency surfaces reduce supply-chain risk. Direct decoding reduces blind signing. Open implementations are reviewable end-to-end. Monitoring closes the loop. We strongly encourage every team to verify what they're signing through more than one interface. Don't rely solely on any single frontend. Cross-check with a CLI, an independent verifier, or a second client before approving anything that matters. We're working with a number of security teams who will host their own versions of the multisig-verifier. You can self-host today. Soon teams will also be able to access independently operated instances run by parties with no affiliation to Squads. Link to the repo in the post below.
English
24
47
296
85.5K
Squads Labs retweetledi
Altitude
Altitude@altitude·
When things go agentic, will your stack be ready?
English
4
8
44
3.3K
Squads Labs retweetledi
Altitude
Altitude@altitude·
Old rails. New money. Wrong combination. If you're feeling it, DM @philjacobson.
English
3
6
39
2.4K
Squads Labs retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
An update on what we're focusing on with @multisig in light of the Drift incident last week. What we're building now: 1. A proxy program for v4 that lets you opt in to killing durable nonces for a specific signer. This removes the ability for pre-signed transactions to sit indefinitely waiting to be executed. 2. A dedicated protocol management multisig program with configurable template policies and a UI you can run locally. Built for teams that need tighter governance controls over admin operations. 3. Exploring clear signing with intents so signers can verify exactly what a transaction does before approving it (cc @Redacted_Noah). What's already available on v4 and can be set up by your team today: – Timelocks. You can set these up in Settings. They create a mandatory delay between proposal approval and execution. – Signer permissions. You can assign Propose, Vote, and Execute rights separately, so not every signer has the same level of access. – Multisig nesting. You can set up configurations where eg two separate multisigs are signers on a third. Adding a layer of operational separation. -Minimal UI. An interface on top of v4 that you can run locally (github.com/Squads-Protoco…). If you're unsure about your current setup or want guidance on how to configure any of this, DM us.
Squads@multisig

Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.

English
18
35
214
33.7K
Squads Labs retweetledi
Squads
Squads@multisig·
Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.
English
49
79
484
83.6K
Squads Labs retweetledi
Altitude
Altitude@altitude·
Your business doesn’t need a bank account, it needs to go higher with Altitude.
English
5
6
59
8.5K
Squads Labs retweetledi
Altitude
Altitude@altitude·
52 years old. Still somehow how the world moves money across borders. We built Altitude on stablecoins. We added SWIFT anyway.
Altitude tweet media
English
4
6
37
1.7K
Squads Labs retweetledi
Altitude
Altitude@altitude·
You moved your treasury to USDC. Every bill still pulls you back into a bank account. Altitude Bill Pay closes the gap. Pay directly from your stablecoin balance and deliver via ACH, wire, SEPA, or SWIFT.
Altitude tweet media
English
13
10
41
7.1K
Squads Labs retweetledi
Altitude
Altitude@altitude·
We're hiring a BDR. Find the right companies, reach them at the right moment, and bring them to Altitude. Apply with the link in the reply.
Altitude tweet media
English
19
12
101
14.5K
Squads Labs retweetledi
Altitude
Altitude@altitude·
Your treasury stays in USDC. Your supplier gets paid in JPY. Your contractor receives BRL. Your agency invoices in HKD. The conversion happens. The wire lands. You never left Altitude.
English
5
14
97
7.1K
Squads Labs retweetledi
Altitude
Altitude@altitude·
ACH. SEPA. Stablecoins. And now SWIFT. One Altitude account. Pay anyone, anywhere. Go altitude.squads.xyz/start
English
14
8
43
3.6K
Squads Labs retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
Building permissionless primitives is fun because when we originally shipped the protocol we thought we built infrastructure for specialized crypto native use cases. Instead, our users decided that we built onchain banking and money movement infrastructure by depositing $2B in stablecoins and doing $13B in gross stable transfer volume since 2022. Seeing this growth informed our stablecoin thesis years ago and now any time we need to get even more bullish on the future of stablecoins - we just look at our dashboards.
English
3
7
56
7.2K
Squads Labs retweetledi
Stabledash
Stabledash@stabledash·
TOMORROW LOCATION: THE FRONTIER
English
2
7
17
1.9K
Squads Labs retweetledi
Altitude
Altitude@altitude·
SWIFT transfers are live. Pay any bank account, anywhere in the world. Directly from your Altitude account. 200 countries. 11,000 banks. 1 balance.
English
55
61
507
154.9K