Your Keys. Your Network. Built for Security.™
A sovereign Layer 2 App-Chain where user-defined policy is cryptographically enforced as the law of the protocol. We eliminate custodian risk entirely.
- Protocol-enforced rejection (PGTAIL)
- Native Smart Account logic
- Zero-Latency Security (ZK Target)
- Immutable on-chain Audit Log
Why We Built a New Foundation
Policy is Native to the Chain
Policy enforcement is no longer a centralized API service. The PGTAIL protocol runs on the L2 Sequencer, blocking invalid transactions *before* they are ever mined.
Smart Accounts by Default
Every user is a programmable vault. You grant limited, high-speed permissions to bots or browser wallets without surrendering root custody.
Immutable Audit Log
Get a cryptographic receipt for every approval or protocol-level rejection, proving that your security rules were enforced as law.
Protocol-Native Transaction Flow
Onboard & Define Rules
User bridges assets from L1 to the OCS L2, creating a Smart Account and writing immutable policies (whitelists, limits) on-chain.
Initiate on the L2
The user initiates a transfer or DEX trade. The request is submitted to the OCS Sequencer for inclusion.
PGTAIL Validation & Rejection
The Sequencer runs a mandatory check against user policy (B2, B6) and risk scores (E4). If invalid, the transaction is natively dropped from the mempool.
Preview: Policy Dashboard (M7.1)
Smart Account Policy: 0x...F2a4
ACTIVE / PROTOCOL ENFORCEDAddress Lock (B2)
Only approved addresses can receive transfers.
Daily Velocity Limit (E1)
Max outflow: 5 ETH per 24 hours.
High-Value Multi-Sig (B6)
Transfers > $50,000 require 2-of-3 co-signers.
Ready for Protocol-Native Security?
Join the waiting list for our Private Testnet launch and secure your spot as an early adopter.