Own security across protocol-layer components (L2, bridge, custody) Act as the final gatekeeper before code hits main Lead threat modeling, design reviews, and mitigation planning Write critical patches and drive hardening when bandwidth is limited Maintain security CI tooling: sig-verification, SAST, fuzzing, secrets scanning Review 100% of protocol-relevant PRs and enforce automated checks Run secure coding workshops and pair-program during critical sprints Interface with auditors and bounty researchers to scope, triage, and fix issues Authority to block merges or deploys on security grounds Direct commit access for emergency fixes