OnChain Sentinel Features
The OCS Network is built to address the real-world risks that centralized and traditional systems fail to prevent. Below is a comprehensive list of features, detailing how the L2 Protocol enforces protection.
| ID | Feature | Vs. Address/Supply-Chain | Vs. Centralized Failure | Notes (L2 Context) |
|---|---|---|---|---|
| Client Integrity | ||||
| A1 | Deterministic builds & lockfiles | — | Ensures the L2 client/sequencer code is tamper-proof. | |
| A6 | Emergency dependency quarantine | — | Org-wide kill switch on new versions for the L2 infrastructure. | |
| Smart Account Policy | ||||
| B1 | Hardware-wallet–first policy | The L2 Smart Account natively requires hardware signatures above defined thresholds. | ||
| B2 | Address Lock / Whitelist (P0) | <strong>L2 Protocol Rejection:</strong> On-chain rule ensures the Sequencer rejects transactions to un-approved addresses. | ||
| B4 | Allowance firewall | Smart Account policy dictates time/amount limits for token approvals, preventing asset drain. | ||
| B6 | Multi-sig in-policy (P0) | <strong>Core L2 Functionality:</strong> Smart Account requires multiple signers before transaction execution. | ||
| Transaction Hygiene | ||||
| C2 | Clipboard-hijack detection | — | Immediate protection against malware at the client level before L2 transaction creation. | |
| C5 | Mempool simulator & decode | Ensures the on-chain L2 target matches the UI intent before the user signs. | ||
| PGTAIL Protocol | ||||
| E1 | Velocity & anomaly rules | — | <strong>PGTAIL Enforcement:</strong> Sequencer drops transactions that violate user spending patterns. | |
| E2 | Geo/IP geofencing | — | PGTAIL score enforces contextual access policy integrated into L2 transaction validation. | |
| E4 | Pre-check async verdict (P0) | <strong>Native Validation Behavior:</strong> PGTAIL risk score is a required input for Sequencer validation (Fail-Closed). | ||
| E5 | Incident “pause new recipients” mode (P0) | Org-wide lockdown control where the L2 sequencer refuses to process transactions to new addresses. | ||
| Operational Visibility | ||||
| F3 | Forensics bundle export | — | Aids accountability by exporting signed logs of all policy decisions for post-mortems. | |
These features form the backbone of the OCS Network’s PGTAIL framework — protecting against supply-chain compromise, address manipulation, and the custodial control failures that plague the existing ecosystem.