blog

Threat Modeling for Canton-Based Applications

Category: Web3

Threat Modeling for Canton-Based Applications

POSTED BY: Gabi Urrutia

03.19.2026

Most teams begin threat modeling only after they've designed their smart contracts and wired nodes together. By then, it's already too late.

Building with Canton is fundamentally different from building on a public blockchain. Canton provides a virtual global ledger rather than a globally replicated ledger: no single entity typically sees the full ledger, and each validator stores only the subset of state relevant to the parties it hosts. This represents a paradigm shift in how distributed systems handle trust and privacy but also introduces a new class of security challenges that traditional threat models fail to address.

In previous articles, we've explored Canton's architecture and examined its security boundaries. Here we focus on threat modeling and the structured discipline of identifying, prioritizing, and mitigating security risks before they manifest in production. For Canton-based applications, this isn't optional. When your workflow spans multiple organizations, identities, and private data scopes, a security flaw may not remain isolated. It can become a systemic failure across banks, custodians, brokers, or settlement partners.

In a 2024 pilot, the Canton Network connected 22 distributed ledger applications (dApps) and executed over 350 simulated atomic cross-application transactions across more than 45 institutions. This demonstrates ecosystem traction, but it should not be presented as proof of broad production maturity. This scale and interoperability demand a threat modeling approach that accounts for multi-domain workflows, selective data visibility, atomic cross-domain transactions, and regulated institutional contexts.

Why Traditional Threat Models Don't Fit Canton

Traditional Web2 threat modeling is built around single ownership of applications, centralized processing, and complete visibility within one system. Public blockchain threat models, by contrast, are structured around transparent states, open participation, and consensus-based validation. Canton operates within neither paradigm.

Canton assumes multi-party shared workflows, selective data visibility, and smart contracts that enforce business rules across multiple independent participants. This shifts the focus from securing a single system to securing a network of interdependent participants. Threat modeling now examines the relationships between institutions, the flow of sensitive data across domains, and the enforcement of business rules via Daml contracts.

This shift redefines the very questions that underpin the integrity of the system. “Who can see what?” is no longer determined within a single environment since each node only views what it is explicitly entitled to. Any misalignment in those boundaries can expose sensitive financial data across institutions. “Who can act on what?” now extends across contracts, nodes, and domains, where an overlooked permission can allow a participant to alter contract state beyond its mandate. “What happens if a participant fails or behaves maliciously?” becomes a question of systemic resilience rather than local fault, since disruptions can cascade across synchronized workflows and force aborts, retries, or recovery paths that must preserve atomicity and cross-organization consistency.

If you treat Canton the same way you would a centralized system or a public blockchain, you'll miss the risks that matter. This article lays out how threat modeling must evolve for Canton's privacy-preserving, multi-party architecture. It explains how to map assets, trust boundaries, threats, and mitigations in a structured, continuous, and institutionally aware way so security is built in, not bolted on.

Canton's Architectural Differences 

Canton with Daml provides a distributed ledger protocol for privacy-preserving, multi-party workflows, with smart contracts that define business logic and authorization rules. Unlike public chains, it separates execution, ordering, and cross-domain coordination into distinct layers. Validator nodes (formerly called participant nodes) execute Daml logic and manage the ledger state of the parties they host. Synchronizers handle transaction sequencing and confirmation through sequencers and mediators. Validators can connect to multiple synchronizers, forming a network of networks. On the Canton Network, the Global Synchronizer is one decentralized interoperability service that can be used for cross-application atomic transactions. This decoupling creates distinct trust boundaries and attack surfaces that traditional threat models rarely consider.

Here's what makes Canton's architecture different and why it demands a fresh approach to threat modeling:

  • Data Minimization Through Transaction Views: Sub-transaction partitioning ensures that each participant sees only the data they are authorized for. However, this also means that incorrect partitioning or poorly designed contract templates can create unintended data exposure paths, not through direct access, but through inference from visible transaction patterns.

  • Contract-Level Authorization: Daml contracts embed granular access rules, defining signatories, observers, and controllers to tightly control who can act on or view each contract. Misconfigurations here create permission vulnerabilities and can fundamentally alter the legal and operational semantics of multi-party workflows.

  • Transaction-Level Privacy: Transactions are never broadcast globally; only the relevant encrypted views traverse the network. This maintains confidentiality without sacrificing auditability, but it also means that threat modeling must account for what can be inferred from metadata, timing patterns, and transaction topology rather than just plaintext access.

  • Permissioned Access Model: Nodes, domains, and validators are explicitly permissioned. Inter-domain connectivity is configurable, enabling regulated workflows while preserving composability. At the same time, this creates complex trust relationships where compromise of a single permission boundary can cascade across institutional boundaries.

These features create a tightly interlocked security ecosystem where privacy, access control, and atomicity reinforce one another. Multi-domain workflows proceed without exposing unnecessary state, and synchronizers coordinate atomic workflows to avoid partial commits and inconsistent cross-domain execution. However, unlike traditional DLTs, threats are not only external but can also emerge from misconfigured synchronizer deployments or policies, incomplete contract partitioning, or errors in cross-domain coordination.

Put simply, Canton's architecture defines both the attack surface and the rules for defense. Effective threat modeling must account not just for data visibility and permissions, but also for coordination topology, trust boundaries between domains, and atomicity guarantees. Identifying these elements early ensures that security measures align seamlessly with Canton's multi-domain, privacy-first design.

Why Threat Modeling is Critical for Canton-Based Applications

Canton's unique architecture is powerful, but it also introduces complex security interdependencies. Built-in safeguards aren't enough on their own. This is especially true for multi-party workflows where multiple entities, such as banks, custodians, and brokers, participate in synchronized operations. A flaw in one part of the system can ripple outward, turning a local failure into a network-wide disruption of the financial ecosystem. This interdependence makes comprehensive threat modeling non-negotiable.

Here are the key areas where threat modeling is essential:

  • Private Data Scopes: Canton primarily limits visibility through stakeholders, observers, and transaction views, but threat models must also account for divulgence, disclosure flows, and metadata leakage. However, failures or misconfigurations in these controls can expose sensitive financial information, creating regulatory and reputational risk. Threat modeling must consider both the enforcement of these visibility rules and potential misuse of contract logic, such as overly permissive choices or authorizations, that could bypass them. In Canton, privacy defines the attack surface and must be rigorously validated.


  • No Globally Replicated State: Unlike public blockchains, Canton does not broadcast transaction data to all participants. Each validator operates on a party-specific ledger projection, so threat models must be built per participant view and per trust boundary rather than around a universally visible state. You can't rely on a generic blockchain security framework. As a result, detailed participant-level threat modeling is essential to identify specific risks in how data is shared and processed across organizational boundaries.


  • Atomic Cross-Domain Transactions: Canton's atomic transactions enable seamless cross-domain workflows, but they also increase coordination complexity. These transactions must be coordinated across multiple domains, and any failure, like a node crash, network partition, or timing issue, can cause data inconsistencies or financial loss. Threat models should validate atomic commit assumptions, timeout handling, retry and idempotency behavior, and cross-synchronizer failure recovery, rather than assume a generic rollback mechanism. As the Canton White Paper illustrates with "Swap" workflows, participants only see contract views they are authorized for, ensuring privacy while coordinating atomic settlement. This further reaffirms the need for granular threat modeling to handle different access levels and workflows.


  • Regulatory Exposure: Because Canton-based applications are often deployed in highly regulated environments, threat modeling must account for frameworks such as Basel III, DORA, and GDPR from the outset. Architecture alone does not establish compliance. Institutions still need to demonstrate that security controls, access boundaries, and operational safeguards are effective in practice. If threat modeling ignores these obligations, the fallout can include legal scrutiny, financial penalties, and a loss of trust that is difficult to reverse.


  • Defection & Misbehavior Risks: Participants may act maliciously or fail mid-workflow, potentially undermining transaction integrity. The system must detect these anomalies in real-time and respond automatically, ideally through protocol-level safeguards rather than after-the-fact monitoring. Without proactive threat modeling, these risks can silently erode system reliability and create cascading failures across institutional boundaries.

While the architecture establishes the technical foundation, practical threat modeling is driven by business context. Canton targets institutional finance applications including tokenization of real-world assets (RWAs), collateral management, payments, and regulated financial market infrastructure. Consequently, threat modeling must go beyond technical layers and adapt to these institutional and regulatory environments.

A Structured Threat Modeling Framework for Canton Applications

Threat modeling for Canton-based applications requires a structured, multi-step approach that accounts for its unique architecture and privacy-preserving features. The following framework provides a step-by-step guide to identifying risks and implementing mitigations.

Step 1 – Define the System

Identify Business Workflow: Begin by mapping out the business workflow across domains and participants. This helps define the system's boundaries, interaction points, and critical dependencies. In Canton, workflows often span multiple institutions with different regulatory obligations and risk tolerances.

Diagram Canton Domains, Participants, and External Systems: Create a clear diagram illustrating how each domain interacts, the flow of data and transactions between participants, and integration points with external systems. Special attention should be given to trust boundaries. At this stage, mapping where one organization’s control ends and another’s begins is essential to understanding potential points of risk.

Identify Where Identities Are Managed: Understanding how identities are authenticated and managed is crucial. Separate protocol identity from application authentication: protocol identity is anchored in namespaces, keys, and topology transactions; user and API authentication may use JWT, OAuth2, or OpenID Connect where appropriate; HSMs or KMS protect key material rather than define identity. Identifying these mechanisms helps secure the entry points of your system and prevents identity-based attacks.

Artifacts to Produce:

  • Context diagram showing all participants and domains

  • Data flow diagram mapping transaction views and contract interactions

  • Trust boundary map identifying where institutional control transitions

Step 2 – Identify Assets and Trust Boundaries

Canton-based applications involve a variety of critical assets, each with its own trust boundary and threat profile.

Assets in Canton:

  • Daml Contracts: These define the rules and state of the system, representing high-value assets that encode legal and operational obligations

  • Authorization Decisions: Who is authorized to perform what actions? Mismanagement can lead to privilege escalation or unauthorized access across institutional boundaries

  • Off-Ledger Data: Information stored outside the Canton ledger that may be critical to transaction execution, such as reference data, pricing feeds, or identity information

  • Topology State and Trust Roots: namespace keys, owner-to-key mappings, party-to-validator mappings, vetted packages, and other topology transactions that determine who may act as whom.

  • Key Material for Signing and Administration: namespace root keys, delegated topology-signing keys, protocol-signing keys, TLS private keys, and KMS/HSM-held secrets.

Trust Boundaries:

  • Between Organizations: Different organizations (banks, custodians, brokers) often participate in the same workflows, creating external trust boundaries with different security postures and governance models

  • Between Validators and Synchronizers: sequencers, mediators, and validators form critical trust boundaries within the Canton ecosystem.

  • Between Canton and External Systems: This includes APIs, data feeds, and external databases that integrate with Canton but operate under different security models

Questions to ask:

  • Who owns each asset and who is responsible for its security?

  • Who should NOT have access to certain assets under any circumstances?

  • How are trust boundaries defined, enforced, and monitored?

  • What happens if a trust boundary is compromised?

Step 3 – Identify Threats Using STRIDE

To thoroughly assess potential threats, apply the STRIDE methodology to each component of the Canton architecture. 

STRIDE Category

Canton-Specific Example

Spoofing

Unauthorized entity pretending to be a validator node, potentially signing transactions on behalf of legitimate institutions

Tampering

Attempt to alter Daml contract state, transaction history, or modify synchronizer configuration

Repudiation

Disputes about actions taken within a transaction, especially critical in regulated environments requiring non-repudiation

Information Disclosure

Sensitive contract data exposed to non-stakeholders, or metadata leakage revealing transaction patterns

Denial of Service

Flooding mediators, sequencers, or validator nodes to disrupt multi-party workflows

Elevation of Privileges

Over-privileged identity gaining control over contracts outside authorized scope

In Canton, threats cascade across domains. A spoofed node can trigger cascading inconsistencies in atomic workflows. Tampering or privilege escalation may exploit timing dependencies in cross-domain coordination, creating states that locally comply but globally violate invariants. Information disclosure can reveal inferred transactional relationships through metadata analysis, not just raw data exposure.

In Canton, STRIDE must be applied at the systemic level because threats reverberate across domains. Every threat spans trust boundaries and cross-ledger choreography, turning threat modeling into an exercise in mapping interdependence as much as securing individual components.

Step 4 – Prioritize & Mitigate

Once threats are identified, they must be prioritized based on risk (likelihood × impact). Mitigations can then be applied to address the highest-priority risks.

Mitigation Categories:

Privacy Enforcement: Use stakeholder visibility controls to ensure that only authorized participants can access relevant contract data. Implement least-privilege principles in contract template design, carefully defining signatories, observers, and controllers.

Access Control: Model on-ledger authorization in Daml terms: signatories, observers, controllers, choice observers, and, where relevant, contract key maintainers. Use external RBAC only for API and user access around the ledger.

Network/Infrastructure Security: Use mutual TLS and authenticated service-to-service channels for communication between validators, synchronizers, and external interfaces. Implement HSM-backed keys for key management to prevent unauthorized access to signing material. Enforce certificate rotation policies and signed node configuration files.

Monitoring/Logging: Integrate SIEM for protocol, administrative, and security-relevant events while minimizing exposure of contract payloads and metadata. In production, avoid payload-rich DEBUG or TRACE logging and preserve tamper-evident audit trails. Hash audit trails to ensure tamper-evidence. Implement real-time anomaly detection for unusual transaction patterns or cross-domain coordination failures.

Use Risk Scoring: Assign a risk score to each identified threat by combining Likelihood × Impact. This helps prioritize which threats need immediate attention and which can be addressed later, allowing security resources to be allocated efficiently.

Canton-Specific Threats You Need to Model

The following threats frequently arise in multi-party, privacy-preserving environments like Canton. Each represents a potential failure mode that, if left unchecked, can compromise the integrity, confidentiality, or availability of Canton workflows. By explicitly identifying and addressing them through comprehensive threat modeling, you not only secure the system but also ensure it remains resilient under complex operational and regulatory demands.

Unauthorized Smart Contract Access

Over-permissive choices in Daml templates can allow broader data visibility than intended. For instance, if a contract grants observer rights to unnecessary stakeholders, sensitive data can be exposed across institutional boundaries.

Mitigation: Implement the least privilege principle when assigning permissions to Daml contracts. Ensure that signatories, observers, and controllers are used correctly to restrict access and visibility strictly to authorized participants. Conduct regular contract template audits to identify overly permissive configurations before deployment.

Data Leakage Through Inference

Even though Canton provides privacy isolation between participants through transaction views, incorrect modeling or poor contract design can result in indirect data leakage. When data is derived, replicated, or linked across contracts, unintended inference paths can form. Metadata, such as transaction timing, participant patterns, or contract creation sequences, can reveal business relationships or transaction volumes.

Mitigation: Prioritize data minimization in contract design. Only store necessary data and ensure it's available only to relevant participants. Avoid duplicating data across contracts and ensure clear boundaries for data flow. Consider metadata minimization, batching where appropriate, and carefully justified traffic-shaping techniques. Avoid recommending dummy transactions unless their audit, cost, and compliance impact has been explicitly assessed.

Node Impersonation / Spoofing

If a validator node's identity is compromised, attackers can impersonate legitimate nodes and sign malicious transactions. This can cause serious security breaches, especially if the attacker bypasses identity checks and gains access to signing keys.

Mitigation: Use HSMs or KMS to protect private keys and signing operations; manage certificates for authenticity and lifecycle, not as secret material. Use mutual TLS for authentication between all nodes and domains. Enforce certificate rotation policies and implement signed node configuration files to prevent unauthorized node access. Implement continuous monitoring for unusual signing patterns.

Unauthorized API Access (Off-Ledger Integration Risk)

Many exploits in distributed systems occur at integration boundaries where external systems interact with the core ledger. A compromise in API endpoints can result in unauthorized access to sensitive off-chain data or manipulation of on-chain transactions through the signal-and-response pattern.

Mitigation: Implement Zero Trust API access with strong Authentication (AuthN), Authorization (AuthZ), and rate limiting. Use secure secrets management tools like HashiCorp Vault or cloud-based Key Management Systems (KMS) to protect API keys and tokens. Implement API gateway monitoring to detect anomalous access patterns and potential compromise.

Insider Attacks

Internal actors with privileged access to the system may attempt to modify contract logic, configurations, or key material, undermining system integrity and confidentiality. Insider attacks can be subtle and difficult to detect, especially in environments where administrators have broad access.

Mitigation: Require controlled Daml package upload, validation, and vetting, with segregation of duties, code review, and release provenance checks. Implement Segregation of Duties (SoD) to ensure that no single individual has control over the entire system. Conduct mandatory code reviews for all contract templates and use CI/CD pipelines with integrated security gates to prevent unauthorized changes. Maintain comprehensive audit logs of all administrative actions.

Denial of Service Against Coordination Infrastructure

Attackers can overwhelm the Canton network by flooding validator nodes, sequencers, or mediators with excessive requests, causing system slowdowns or complete disruption of multi-party workflows. DoS attacks are particularly dangerous in Canton because they can cascade across institutional boundaries, affecting all participants in atomic transactions.

Mitigation: Protect the coordination layer with sequencer traffic management, validator and API rate limits, resource limits, and database-aware capacity planning; auto-scaling can help, but it is not the primary control. Implement rate limiting and traffic shaping at both the network and application layers to protect nodes and domains from overload. Use regional redundancy for fault tolerance, ensuring that failure of a single synchronizer deployment doesn't disrupt all workflows. Apply application-layer defenses such as connection limits and request validation. Integrate anomaly detection and threshold-based alerting for real-time identification of attack patterns, ensuring uninterrupted workflow execution and preserving system integrity across institutional boundaries.

Systemic Security Challenges in Canton Ecosystems

Beyond individual threats, Canton presents systemic security challenges that arise from its architectural and operational characteristics:

Protocol Component Behavior Under Adversarial Conditions: Synchronizers, mediators, and sequencers can experience collusion, Byzantine faults, or stress-induced failures. Modeling these systemic vulnerabilities is crucial to anticipating threats beyond individual contract logic. What happens when a sequencer is compromised? How does the system detect and recover from mediator collusion?

Smart Contract Logic Across Daml and EVM Contexts: Developers must understand how contract visibility, authorization rules, and choice semantics affect threat exposure, particularly when integrating Daml with EVM contracts in hybrid environments. Misunderstandings here can create exploitable gaps where assumptions from one execution model don't hold in another.

Infrastructure Governance: Validator nodes, topology managers, and certificate authorities represent broad attack surfaces that traditional smart contract threat models often overlook. Effective threat modeling must explicitly account for these layers to ensure resilience across the system. In most cases, this includes the application layer down to the infrastructure that enables cross-domain coordination.

The general framework for threat modeling, including assets, actors, and trust boundaries, remains reusable across domains. However, each domain may introduce unique confirmation policies, participants, governance structures, and trust assumptions. It's essential to review threat models per domain while leveraging reusable patterns for assets and boundaries, ensuring that all nuances of the specific environment are accounted for.

The Path Forward: Continuous Threat Modeling

As Canton ecosystems mature, emerging technologies and methodologies will shape how threat modeling evolves:

Automated Threat Modeling for DLT Ecosystems: Machine learning-driven detection and metric-based feedback methodologies are expected to mature, enabling continuous refinement of threat models across complex workflows. Automated tools may eventually generate baseline threat models from contract templates and domain configurations, though human expertise will remain essential for understanding institutional context and regulatory requirements.

Standards Development for Multi-Domain Atomic Ledgers: Industry bodies may formalize frameworks specifically for multi-domain atomic ledgers, establishing shared methodologies for risk assessment, mitigation, and audit. Organizations such as ISDA and other industry bodies are exploring standards, interoperability, and operating models for DLT in financial markets.

Regulatory and Compliance Interplay: Privacy-preserving yet auditable distributed ledgers will attract more stringent oversight as they scale. Observer node security, access governance, and forensic traceability will become central operational considerations. Regulators increasingly expect not just audit trails but also proof that systems are designed to prevent unauthorized actions by construction.

Increasing Adversarial Sophistication: As institutional adoption grows, attackers will shift from conventional cybercrime to advanced tactics, including supply-chain compromise, insider threats, collusion, and nation-state-level operations. Threat models must anticipate these evolving dynamics to remain effective, incorporating scenarios that were previously considered theoretical but are now increasingly practical.

Conclusion

Applications built on the Canton Network run on a new class of distributed ledger infrastructure that is permissioned, supports atomic cross-domain workflows, and is inherently privacy-focused. While traditional DLT threat modeling principles still apply, Canton’s architecture requires a continuous and context-aware approach that is tailored to its multi-domain structure and embedded throughout the system lifecycle.

The guiding principle is to model threats early, maintain them as a living artifact, enforce protocol and operational controls, and adapt continuously as the system evolves and new threats emerge.

Let's make sure your system is secure from the start. Whether you're already building on Canton or just getting started, working with a trusted partner to implement a robust threat model is crucial.Get in touch with Halborn's security experts to ensure your Canton-based applications are built securely from the beginning.

Disclaimer

The information in this blog is for general educational and informational purposes only and does not constitute legal, financial, or professional advice. Halborn makes no representations as to the accuracy or completeness of the content, which may be updated or changed without notice.