RLAR Protocol Docs
Technical documentation for integrating, submitting data to, and validating on the RLAR Protocol.
Overview
RLAR is a decentralized security oracle that delivers on-chain risk scores for DeFi smart contracts. Protocols integrate RLAR to make automated, security-aware decisions — adjusting parameters, filtering strategies, or warning users based on real-time security data.
The protocol has three layers: the Record Layer (immutable data registry), the Reference Layer (dynamic scoring engine), and the Oracle Interface (on-chain feed for consuming protocols).
Quick Start
Install the RLAR interface package and query your first Risk Score in minutes.
Import the interface in your Solidity contract:
Interface
The primary interface for consuming Risk Scores:
Querying Scores
There are three primary methods for consuming Risk Scores:
Basic Query
Returns score, timestamp, and confidence. Suitable for most integrations.
Threshold Check
Boolean check for score minimum. Gas-efficient for simple gates.
Detailed Query
Returns full score breakdown for advanced integrations that need granular data.
Subscriptions
Oracle access requires an active subscription paid in RLAR tokens. Subscriptions are per-protocol (one subscription covers all queries from your contract addresses).
| Tier | Queries/Month | Fee (RLAR/month) |
|---|---|---|
| Starter | 10,000 | 500 |
| Growth | 100,000 | 2,500 |
| Enterprise | Unlimited | 10,000 |
Events
The Oracle emits events on score updates, enabling off-chain monitoring:
Submitting Data
Security researchers, auditors, and protocol teams submit structured security data to the Record Layer.
Submission Types
| Type | Description | Weight in Score |
|---|---|---|
| Audit Report | Full security audit findings and remediation status | High |
| Incident Disclosure | Exploit, vulnerability disclosure, or near-miss report | High (negative) |
| Config Change | Admin key, proxy upgrade, or dependency change observation | Medium |
| Dependency Update | Changes in underlying contract dependencies | Low-Medium |
Stake Requirements
| Submission Type | Minimum Stake (RLAR) | Slashing Rate |
|---|---|---|
| Audit Report | 5,000 | Up to 30% |
| Incident Disclosure | 2,000 | Up to 50% |
| Config Change | 500 | Up to 20% |
| Dependency Update | 500 | Up to 20% |
Slashing distribution: 70% to successful challenger, 30% to validator committee.
Becoming a Validator
Validators participate in dispute resolution when submissions are challenged.
| Parameter | Value |
|---|---|
| Minimum Stake | 10,000 RLAR |
| Lock Period | 90 days |
| Committee Size | 5-9 validators per dispute |
| Max Single Entity | 20% of committee stake |
| Selection | Random, weighted by stake (quadratic dampening) |
Dispute Resolution
Any staked participant may challenge a submission during its challenge period. The process:
1. Challenger posts counter-evidence and stakes minimum 50% of original submission's stake.
2. A committee of 5+ validators is randomly selected.
3. Each validator independently evaluates the evidence and submits a score.
4. Scores are aggregated via stake-weighted median with quadratic dampening.
5. If the challenge succeeds: submitter is slashed (70% to challenger, 30% to committee). If the challenge fails: challenger's stake is slashed (100% to committee).
Scoring Algorithm
Risk Scores are computed using a hybrid model:
Protocol Parameters
| Parameter | Value | Governance |
|---|---|---|
| Epoch Duration | 7 days | DAO vote |
| Max Score Delta | ±15 per epoch | DAO vote |
| Score Decay | -2/month | DAO vote |
| Attestation Interval | 6 hours | DAO vote |
| Min Node Operators | 7 per round | DAO vote |
| Consensus Threshold | 5 of 7 matching | DAO vote |
| Tier 1 Observation | 24 hours | DAO vote |
| Tier 2 Challenge | 72 hours | DAO vote |
| Governance Quorum | 10% circulating | Fixed |
| Proposal Threshold | 100,000 RLAR | DAO vote |
| Timelock | 48 hours | Fixed |
Contract Addresses
Mainnet deployment planned for Q4 2026. Contract addresses will be published here upon deployment.