Emergency Procedures
How to handle security incidents and emergency situations with Integra contracts.
Overview
Integra smart contracts include emergency controls designed to protect users and assets during security incidents. This guide covers the emergency procedures available to contract administrators and the proper protocols for invoking them.
Emergency Controls
Contract Pausing
All Integra contracts implement the Pausable pattern:
// Pause all non-essential operations
function pause() external onlyRole(PAUSER_ROLE);
// Resume normal operations
function unpause() external onlyRole(PAUSER_ROLE);When paused:
- New document registrations are blocked
- Token claims are blocked
- Token transfers continue (ERC standard requirement)
- Resolver hooks still execute
Emergency Withdraw
For contracts holding funds:
// Emergency withdrawal of funds
function emergencyWithdraw(
address token,
address recipient,
uint256 amount
) external onlyRole(EMERGENCY_ROLE);Incident Response Protocol
Level 1: Minor Issues
Symptoms: Unusual transaction patterns, minor bugs
Response:
- Monitor situation closely
- Notify development team
- Prepare patch if needed
- No user communication required
Level 2: Moderate Issues
Symptoms: Exploitable bug discovered, limited impact
Response:
- Pause affected contracts
- Investigate root cause
- Develop and test fix
- Communicate with affected users
- Deploy fix and unpause
Level 3: Critical Security
Symptoms: Active exploit, significant fund risk
Response:
- Immediately pause ALL contracts
- Activate emergency response team
- Coordinate with security partners
- Public disclosure after mitigation
- Post-incident review
Contact Information
Emergency Contacts
- Security Team: security@integra.io
- Emergency Hotline: Available to enterprise customers
- Discord: #security-alerts channel
Bug Bounty
Found a vulnerability? Report it through our bug bounty program for rewards:
- Critical: Up to $100,000
- High: Up to $25,000
- Medium: Up to $5,000
- Low: Up to $1,000
Recovery Procedures
Post-Incident Checklist
- Root cause identified and documented
- Fix deployed and verified
- Affected users identified and notified
- Funds recovered or compensation plan created
- Post-mortem report published
- Security audit of fix completed
Related Documentation
- Security Patterns - Security best practices
- Access Control - Permission system
- Upgradeability - Upgrade procedures