On EVM (Base Mainnet), the default is ERC-3643 (T-REX) — the Token for Regulated EXchanges standard, originally developed by Tokeny SA. ERC-3643 embeds compliance directly into transfer logic: every transfer checks the sender’s frozen status, the receiver’s identity, and a chain of compliance modules before any tokens move.
Libertum also supports ERC-20 (utility / governance tokens), ERC-721 (one-of-a-kind tokenization), CIP-20 (Cardano native fungible tokens) and CIP-113 (Cardano programmable security tokens, on Preview pending audit).
The core ERC-3643 (T-REX) suite is based on the audited Tokeny T-REX implementation. Libertum’s deployments and any Libertum-specific extensions (EscrowController, MarketplaceController, Bonding Factory) follow standard industry practice for review and deployment. The Cardano CIP-113 stack is currently undergoing a third-party security audit before mainnet GA.
Each ERC-3643 offering deploys a full suite of contracts via the TREXFactory:
Plus the per-offering selected compliance modules: Country Allow / Restrict, Supply Limit, Max Balance, Hold Time. All wrapped in UUPS proxies for upgradeability. Deterministic CREATE2 addresses.
Published on the Token Standards & Smart Contracts page. All addresses are public on chain — anyone can verify them on Basescan.
Two privilege levels:
In the EscrowController smart contract on Base Mainnet (0x8f8aDaD75a3795A952979D85b500baF2364BBC54). Investors approve USDC / USDT to the escrow and call subscribe; funds are held until the offering settles, at which point they’re released to the issuer’s wallet (and tokens are minted / transferred to the investor) or refunded.
In a per-issuer custodian wallet managed by Libertum on the issuer’s behalf. The full token supply is minted to the custodian at deployment; tokens transfer out to investors as their orders settle. Custodian-wallet operations are gated by withdrawal limits and auditable per-action.
Only in two narrowly-scoped scenarios, both with full audit trail:
Libertum has no ability to drain custodian wallets or escrow contracts arbitrarily; every privileged action is bounded by the smart-contract rules and the issuer’s agent assignment.
JWT-based with refresh-token rotation. 2FA (TOTP, email or SMS) gates sensitive operations. Idle timeout of 30 minutes on the marketplace, 60 minutes on the admin portal.
| Role | Access |
|---|---|
| Investor / Institution | Investor surfaces |
| IssuedAdmin (Issuer) | Investor + issuer surfaces |
| Admin | Admin portal full access |
| SubAdmin | Admin portal subset filtered by RBAC permissions |
| TransferAgent | TA portal — cap table, whitelist, force transfers |
Sub-admins are configured with a per-module read/write permission matrix. Each sub-admin’s userPermissions array lists, for every module (Users, Offerings, Fee Settings, etc.), whether they have read and/or write access. The admin sidebar filters dynamically by permission.
Frontends are statically built and served via Cloudflare’s global CDN. Backends are containerised and deployed on managed cloud infrastructure with horizontal scale where warranted. Database is managed (with automated backup); Redis with TLS. Secrets are stored in a managed secret store, never in environment files.
Severity classification: SEV-1 (critical: funds at risk / platform offline / key compromised) → SEV-4 (informational). Key recovery scenarios documented and rehearsed:
See Roadmap & Support for the public-facing summary.
Email [email protected] for responsible disclosure. We follow industry-standard incident response with severity classification, communication plans (internal Slack, status page, email to affected users, regulator notification where required), and post-mortem reviews.