Squads

4.7K posts

Squads banner
Squads

Squads

@multisig

Building the next generation of financial services. Home to @altitude, @fusewallet and Solana’s leading multisig solution.

Solana شامل ہوئے Mayıs 2021
420 فالونگ37K فالوورز
پن کیا گیا ٹویٹ
Squads
Squads@multisig·
We’re excited to announce a strategic partnership with @Coinbase. Together, we’ll accelerate USDC adoption and advance our shared mission of stablecoin-powered finance. Over $1 billion in USDC lives on Squads today — and the stablecoin era is just getting started.
Squads tweet media
English
59
72
593
170.1K
Squads ری ٹویٹ کیا
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
An update on what we're focusing on with @multisig in light of the Drift incident last week. What we're building now: 1. A proxy program for v4 that lets you opt in to killing durable nonces for a specific signer. This removes the ability for pre-signed transactions to sit indefinitely waiting to be executed. 2. A dedicated protocol management multisig program with configurable template policies and a UI you can run locally. Built for teams that need tighter governance controls over admin operations. 3. Exploring clear signing with intents so signers can verify exactly what a transaction does before approving it (cc @Redacted_Noah). What's already available on v4 and can be set up by your team today: – Timelocks. You can set these up in Settings. They create a mandatory delay between proposal approval and execution. – Signer permissions. You can assign Propose, Vote, and Execute rights separately, so not every signer has the same level of access. – Multisig nesting. You can set up configurations where eg two separate multisigs are signers on a third. Adding a layer of operational separation. -Minimal UI. An interface on top of v4 that you can run locally (github.com/Squads-Protoco…). If you're unsure about your current setup or want guidance on how to configure any of this, DM us.
Squads@multisig

Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.

English
17
31
207
30.5K
Squads ری ٹویٹ کیا
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
This is an example of truly great ecosystem leadership from the Foundation. Squads is joining SIRN as a founding member while continuing to help strengthen Solana’s security through multisig and beyond.
Solana Foundation@SolanaFndn

Solana was built for security. As the ecosystem scales, so does our investment in the tools, standards, and support. Today that commitment deepens with a new security program, active monitoring, formal verification for top protocols, and a new crisis response network. Learn more 👇

English
14
23
189
31.9K
Squads ری ٹویٹ کیا
Solana Foundation
Solana Foundation@SolanaFndn·
Solana was built for security. As the ecosystem scales, so does our investment in the tools, standards, and support. Today that commitment deepens with a new security program, active monitoring, formal verification for top protocols, and a new crisis response network. Learn more 👇
Solana Foundation tweet media
English
206
236
1.1K
427K
Squads
Squads@multisig·
Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.
English
49
78
481
79.1K
Squads ری ٹویٹ کیا
Drift
Drift@DriftProtocol·
We are observing unusual activity on the protocol. We are currently investigating. Please do not deposit funds into the protocol while we investigate. This is not an April Fools joke. Proceed with caution until further notice. We’ll provide additional updates from this account.
English
767
278
1.8K
1.4M
Squads
Squads@multisig·
There is an ongoing security incident happening with @DriftProtocol. We encourage everyone not to interact with Drift until this is resolved. We will be posting all further updates here. Squads Protocol has not been compromised and all systems remain operational.
English
15
32
294
42.4K
Squads ری ٹویٹ کیا
Altitude
Altitude@altitude·
Your business doesn’t need a bank account, it needs to go higher with Altitude.
English
5
6
57
8.1K
Squads ری ٹویٹ کیا
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
Solana ecosystem participants have now executed 1M+ @multisig transactions. We like the programmable wallets with execution layer guarantees.
English
11
9
99
8.8K
Squads ری ٹویٹ کیا
Altitude
Altitude@altitude·
You moved your treasury to USDC. Every bill still pulls you back into a bank account. Altitude Bill Pay closes the gap. Pay directly from your stablecoin balance and deliver via ACH, wire, SEPA, or SWIFT.
Altitude tweet media
English
13
11
39
6.5K
Squads ری ٹویٹ کیا
Altitude
Altitude@altitude·
We're hiring a BDR. Find the right companies, reach them at the right moment, and bring them to Altitude. Apply with the link in the reply.
Altitude tweet media
English
19
12
101
14.2K
Squads ری ٹویٹ کیا
etn.
etn.@etnshow·
Good people of technology. It's Thursday 26th March. Here's today's Order of Play: - @samstphenson, Founder @meetgranola - @SimkinStepan, CEO @multisig and Founder @altitude - @Pradey, Partner at @GPBullhound - Michelle You, Co-founder and CEO at Supercritical - @SamuelBeek, Founder Schematik @schematikio - @JensHilgers, Founding General Partner @BitkraftVC - @GeorgiaS_IV, Partner @IndexVentures Onwards
etn.@etnshow

Granola $125M Founder Joins, Sora Dies, Epic Layoffs, Stunt of The Week x.com/i/broadcasts/1…

English
0
6
18
3.3K
Squads ری ٹویٹ کیا
Altitude
Altitude@altitude·
Your treasury stays in USDC. Your supplier gets paid in JPY. Your contractor receives BRL. Your agency invoices in HKD. The conversion happens. The wire lands. You never left Altitude.
English
5
13
97
7K
Squads ری ٹویٹ کیا
Altitude
Altitude@altitude·
ACH. SEPA. Stablecoins. And now SWIFT. One Altitude account. Pay anyone, anywhere. Go altitude.squads.xyz/start
English
14
8
43
3.5K
Squads ری ٹویٹ کیا
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
Building permissionless primitives is fun because when we originally shipped the protocol we thought we built infrastructure for specialized crypto native use cases. Instead, our users decided that we built onchain banking and money movement infrastructure by depositing $2B in stablecoins and doing $13B in gross stable transfer volume since 2022. Seeing this growth informed our stablecoin thesis years ago and now any time we need to get even more bullish on the future of stablecoins - we just look at our dashboards.
English
3
7
57
7.2K