Security & Transparency

Verifiable Builds

Last updated: March 14, 2026 Network: Solana Mainnet-Beta Toolchain: Rust / cargo-build-sbf

Kavachswap is committed to on-chain transparency. This page documents deployed program IDs and how to verify that the on-chain binary matches the published source. Verifiable builds help guarantee that the code you review is the code running on Solana Mainnet.

01 Deployed Program Registry

Kavach Core AMM
Program ID: 9SYzdw4Wd3cxDyUotZ6nhrtZt4qDHVtKQnQsiJVUsHiM
Source pathprograms/kavach_amm_core/
Swap mathConstant-product (x·y = k), Token-2022
Target pairsGeneral pairs, volatile
Upgrade authorityDeployer wallet — time-lock planned

02 Build Environment

Reproducible builds require identical toolchain versions. Typical versions: Rust stable (per rust-toolchain.toml), Solana Tools 1.18.x (cargo-build-sbf), solana-program 1.18.x, spl-token/spl-token-2022, borsh. Build on Linux x86-64 for reproducible hashes; macOS ARM may produce different binaries.

Important: Binaries compiled on different OS/architecture can have different checksums. For reproducibility, use Linux x86-64 or the solana-verify Docker method.

03 How to Verify

Use solana-verify (Ellipsis Labs) or manual hash comparison:

# Build Core AMM
cd programs/kavach_amm_core
cargo build-sbf

# SHA-256 of local build
sha256sum ../../target/deploy/kavach_amm_core.so

# Dump on-chain program and compare
solana program dump 9SYzdw4Wd3cxDyUotZ6nhrtZt4qDHVtKQnQsiJVUsHiM /tmp/on_chain_core.so
sha256sum /tmp/on_chain_core.so

Hashes should match if the deployed binary was built from the same source. Program IDs and upgrade authority: solana program show 9SYzdw4Wd3cxDyUotZ6nhrtZt4qDHVtKQnQsiJVUsHiM.

04 Reporting Build Discrepancies

If a deployed program's binary does not match published source, this is a critical security issue. Report immediately:

Email: kavachswap@gmail.com
See: security.txt for disclosure policy.