ββ€ Block Parliament Security Policy ββ
ββ€ Overview ββ Β§
Block Parliament is a Solana mainnet validator operated by Gabe Rodriguez, a core contributor to the Agave validator client at Anza. This document describes the security measures and operational practices in place to protect delegator stake and maintain reliable validator operations.
Important: When you delegate, your SOL moves to a stake account that remains under your control. Validators cannot access, move, or withdraw your delegated stake.
ββ€ Key Management ββ Β§
The validator's withdrawal authority key (AN58nFDFdehKbP7d3KALhnCJAsWNE7cWpCR6dLVAj9xm) is stored separately from the validator identity and vote account keys. This key is kept offline and never resides on the validator server, preventing unauthorized fund access even in the event of server compromise.
The validator identity key is stored on the server with restricted file permissions (owned by the sol user, mode 600). Administrative access (via the ubuntu account) is separate from the validator process account (sol), which has no sudo privileges.
Critical keys are backed up to hardware wallets stored in secure physical locations. Seed phrases are never stored digitally or transmitted over networks.
ββ€ Infrastructure ββ Β§
The validator runs on dedicated bare-metal hardware (not shared cloud VMs) hosted in a professional data center with redundant power and network connectivity. Hardware specs: AMD EPYC 24-core CPU, 377 GB RAM, NVMe storage in RAID configuration.
Linux installation with only essential packages plus monitoring agents (Alloy for metrics, Prometheus exporters). The validator process runs under a dedicated unprivileged user account.
- β’ Strict firewall rules: only necessary ports exposed (Solana gossip/turbine/repair, SSH, metrics exporter)
- β’ SSH access via public-key authentication only (password auth disabled)
- β’ fail2ban active with aggressive settings (5 attempts β 12hr ban)
- β’ DDoS mitigation provided at the data center level
ββ€ Access Control ββ Β§
Server access is limited to the operator (Gabe Rodriguez) and one contractor (Christopher Vannelli). No other third-party vendors have access to validator infrastructure.
- β’ Administrator account (
ubuntu) separate from validator process account (sol) - β’ SSH root login disabled
- β’ Validator user cannot sudo or access admin functions
ββ€ Monitoring & Alerting ββ Β§
A dedicated watchtower service monitors validator health from an independent location (separate from the validator itself). Alerts are sent via Telegram for:
- β’ Validator delinquency (not voting)
- β’ Health check failures
- β’ Vote account issues
System and validator metrics (CPU, memory, disk, slot lag, vote performance) are collected and stored in Grafana Cloud for trend analysis and incident investigation.
Validator performance is publicly verifiable via Stakewiz, validators.app, and on-chain data.
ββ€ Software & Updates ββ Β§
Running the Jito-enhanced Agave client for MEV rewards. As an Anza core developer, the operator has deep familiarity with the client codebase and can respond quickly to issues.
- β’ New releases tracked via Solana Tech Discord
- β’ Updates tested on testnet validator before mainnet
- β’ Tower file backed up before any upgrade (prevents consensus issues)
- β’ OS security patches applied regularly
The validator runs standard Jito-Agave releases without custom consensus modifications that could affect network behavior.
ββ€ MEV & Jito Integration ββ Β§
Block Parliament runs Jito MEV infrastructure. MEV tips are distributed automatically by Jito's on-chain programsβthe validator receives its configured commission, and Jito distributes the remainder to stakers.
- β’ Block Engine: Frankfurt (eu-frankfurt)
- β’ Tip programs: Official Jito mainnet contracts
- β’ Current commission rates: view on Solscan β
ββ€ Incident Response ββ Β§
In the event of a security incident or validator issue, the operator follows these procedures:
- 1. Detection β Automated alerts or manual observation
- 2. Assessment β Determine scope and severity
- 3. Containment β Isolate affected systems if needed
- 4. Resolution β Apply fixes, restore service
- 5. Review β Document lessons learned, improve processes
For issues affecting delegators, updates will be posted via @grod220 on X.
ββ€ Verify On-Chain ββ Β§
All claims on this page can be verified independently:
- β’ Vote account on Solscan β β commission, authority keys
- β’ Performance on Stakewiz β β uptime, skip rate, APY
- β’ Withdraw authority:
AN58nFDFdehKbP7d3KALhnCJAsWNE7cWpCR6dLVAj9xm
ββ€ Security Contact ββ Β§
To report security concerns or vulnerabilities related to Block Parliament validator operations:
- X/Twitter: @grod220
- Telegram: @grod220