Skip to Content
DocumentationSecurity & Risk

Security and Risk

Why Security Matters

Security at Mintly works quietly in the background, just like the rest of our systems. You already have enough to manage without worrying about whether your Ethereum is protected.

Origin Protocol Security — Mintly builds on Origin Protocol’s battle-tested infrastructure. Origin’s products have been audited by top-tier security firms and have protected hundreds of millions of dollars in total value locked.


Multiple Layers of Protection

Non-Custodial Design

Mintly never takes custody of your funds. Your ETH remains in smart contracts you control.

Verified Oracle Pricing

All yield calculations and rebalancing decisions use verified price feeds to ensure fair, accurate performance tracking.

Automated Safety Protocols

Our backend systems operate within strict parameters designed to prevent unexpected behavior and prioritize capital preservation.

Role-Based Access Control

Smart contracts use granular permission systems to ensure only authorized operations can be performed, with your wallet maintaining ultimate ownership.

Plain Language

Security explained in terms that make sense. We believe you deserve to understand how your Ethereum is protected, not just trust that it is.


Origin Protocol’s Security Track Record

Mintly builds on Origin Protocol’s proven security foundation. Origin’s products have been:

  • Audited by multiple top-tier security firms
  • Battle-tested with hundreds of millions in TVL
  • Operating securely since launch with no security incidents

Note on Mintly Security: The security track record referenced above applies to Origin Protocol’s underlying infrastructure. Mintly’s smart contracts are built on this foundation and implement additional security measures including role-based access control and non-custodial design. Users should understand that while we leverage Origin’s audited infrastructure, Mintly represents a new layer of smart contract functionality. We are committed to transparency about our security practices and will update this documentation with our own audit status as it becomes available.

Last updated on