Meridian operates as a non-custodial protocol. Funds remain in your multisig at all times. Every transaction is co-signed by your organization and verified deterministically against on-chain policy before execution. The system was designed under the assumption that any individual component — including the protocol team — may eventually be untrusted.
Funds are held in a multisig wallet controlled by the client. Meridian executes transactions only when an instruction is signed by both the client's quorum and the protocol's policy verifier. There is no Meridian-controlled hot wallet, no rehypothecation, no spread.
Meridian smart contracts have been reviewed by Trail of Bits and OtterSec. Operational controls are under SOC 2 Type II review with a Big 4 firm. All audit reports are published in full — including findings the protocol team disagrees with — and re-issued after every contract upgrade.
| Scope | Firm | Date | Status | Findings | |
|---|---|---|---|---|---|
| Treasury executor + policy verifier | Trail of Bits | Q1 2026 | Resolved | 2 medium · 4 informational | Report → |
| Treasury executor v0.3 | OtterSec | Q4 2025 | Resolved | 1 high · 3 medium · 7 informational | Report → |
| $MRD vesting + treasury contracts | Trail of Bits | Q1 2026 | Final report Q2 | — | Status → |
| SOC 2 Type II — operational | Big 4 (engagement signed) | In progress | Observation period | — | Engagement → |
| ISO 27001 information security | Schellman | Target Q3 2026 | Pre-engagement | — | — |
The Meridian engineering team operates under controls aligned with SOC 2 and ISO 27001. Production access is segregated, every change is reviewed, every artifact is signed, and every meaningful action — including by the team itself — is logged on-chain.
The protocol's safety properties are stated up front, not implied. Each property is enforced by either contract logic or signed multisig authorization, not by trust in any operator.
Meridian operates a public bug bounty with payouts of up to $1,000,000 for critical findings in production contracts. Researchers acting in good faith are protected under our safe-harbor policy. We confirm receipt within 24 hours and target initial triage within 72 hours.
Request the full security packet — audit reports, threat model, jurisdictional structure, and SOC 2 progress letter — under NDA.