# Security

zkAgent is built with advanced security measures to ensure the integrity, privacy, and resilience of the network. To mitigate potential risks, it minimizes the attack surface by requiring verification nodes to contribute either physical resources or economic collateral. This approach not only discourages malicious activities but also ensures that only reliable nodes participate in the network's verification processes.

Privacy is a fundamental feature of the zkAgent Contract. By utilizing Zero-Knowledge Proofs (ZKP), transaction details remain hidden, preserving user confidentiality while maintaining transparency and verifiability where needed. Users have full control over their data, ensuring secure and selective access based on their preferences.

To enhance fault tolerance, the network employs Byzantine Fault Tolerance (BFT) technology. This allows the system to remain operational and secure even when some nodes behave maliciously or fail. With these robust mechanisms in place, the zkAgent Contract provides a secure, decentralized, and privacy-preserving foundation for a wide range of applications and services.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://zkagent.gitbook.io/whitepaper/zkagent/zkagent-contract/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
