OnChain Sentinel Features

The OCS Network is built to address the real-world risks that centralized and traditional systems fail to prevent. Below is a comprehensive list of features, detailing how the L2 Protocol enforces protection.

IDFeatureVs. Address/Supply-ChainVs. Centralized FailureNotes (L2 Context)
Client Integrity
A1Deterministic builds & lockfilesEnsures the L2 client/sequencer code is tamper-proof.
A6Emergency dependency quarantineOrg-wide kill switch on new versions for the L2 infrastructure.
Smart Account Policy
B1Hardware-wallet–first policyThe L2 Smart Account natively requires hardware signatures above defined thresholds.
B2Address Lock / Whitelist (P0)<strong>L2 Protocol Rejection:</strong> On-chain rule ensures the Sequencer rejects transactions to un-approved addresses.
B4Allowance firewallSmart Account policy dictates time/amount limits for token approvals, preventing asset drain.
B6Multi-sig in-policy (P0)<strong>Core L2 Functionality:</strong> Smart Account requires multiple signers before transaction execution.
Transaction Hygiene
C2Clipboard-hijack detectionImmediate protection against malware at the client level before L2 transaction creation.
C5Mempool simulator & decodeEnsures the on-chain L2 target matches the UI intent before the user signs.
PGTAIL Protocol
E1Velocity & anomaly rules<strong>PGTAIL Enforcement:</strong> Sequencer drops transactions that violate user spending patterns.
E2Geo/IP geofencingPGTAIL score enforces contextual access policy integrated into L2 transaction validation.
E4Pre-check async verdict (P0)<strong>Native Validation Behavior:</strong> PGTAIL risk score is a required input for Sequencer validation (Fail-Closed).
E5Incident “pause new recipients” mode (P0)Org-wide lockdown control where the L2 sequencer refuses to process transactions to new addresses.
Operational Visibility
F3Forensics bundle exportAids accountability by exporting signed logs of all policy decisions for post-mortems.

These features form the backbone of the OCS Network’s PGTAIL framework — protecting against supply-chain compromise, address manipulation, and the custodial control failures that plague the existing ecosystem.