Chainlink is integrating Chainalysis's real-time risk data, allowing institutions to enforce compliance policies as executable code across any blockchain.Chainlink is integrating Chainalysis's real-time risk data, allowing institutions to enforce compliance policies as executable code across any blockchain.

Chainlink, Chainalysis partner to automate onchain compliance

2025/11/04 06:00

Chainlink is integrating Chainalysis’s real-time risk data directly into its oracle network, allowing institutions to enforce compliance policies as executable code across any blockchain.

Summary
  • Chainlink and Chainalysis are integrating real-time risk data into Chainlink’s oracle network to automate compliance enforcement across blockchains.
  • The partnership combines Chainalysis’s KYT intelligence with Chainlink’s Automated Compliance Engine, enabling policy-based, onchain responses to risk alerts.

On Nov. 3, Chainalysis announced a strategic partnership with Chainlink to merge its Know-Your-Transaction risk intelligence with Chainlink’s Automated Compliance Engine.

The integration, slated for Q2 2026, will enable users to programmatically act on KYT alerts, automatically halting transfers, mints, or withdrawals based on pre-set policies. This move directly tackles the current industry standard of manual reviews and disjointed, chain-specific compliance setups that have burdened institutions.

Bringing compliance logic closer to the chain

At the core of this collaboration are two specialized systems designed to work in concert. Chainalysis’s KYT service is the data intelligence layer, a system used by leading global exchanges and regulators to monitor cryptocurrency transactions in real-time. It functions as a continuous risk radar, scanning for patterns of suspicious activity across blockchain networks.

Chainlink’s ACE serves as the enforcement mechanism. It is a standards-based framework that allows developers to translate written compliance rules directly into executable code.

Through its Policy Manager, institutions can codify controls like allow lists, volume limits, or role-based permissions. The key innovation is that these policies are then enforced with deterministic on-chain outcomes, meaning the result of a compliance check is predictable, automatic, and auditable.

For developers and institutions, ACE introduces a “build once, enforce everywhere” capability. This is achieved through its Cross-Chain Token Compliance Extension, which links assets to a unified identity layer known as Cross-Chain Identity.

This means a compliance policy written for a token on one blockchain can automatically apply to that same token when it moves to another. The framework also includes a Monitoring and Reporting Manager to provide alerts and audit logs, strengthening operational resilience.

Chainlink’s role as foundational infrastructure is already well-established. As the industry-standard oracle network, it secures the vast majority of decentralized finance. Its standards and technology have been adopted by major financial players including Swift, Euroclear, Mastercard, and UBS, providing the critical link between traditional finance and onchain applications.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Here is What Every Investor Should Do in a Crypto Bear Market

Here is What Every Investor Should Do in a Crypto Bear Market

The post Here is What Every Investor Should Do in a Crypto Bear Market appeared on BitcoinEthereumNews.com. When prices start to crater, crowds of traders run for the hills in fear, selling into a market bottom. But history has also shown that, painful as they are, downturns in crypto can be among the richest moments for those who know what they are doing. But unlike traditional markets, crypto never sleeps and trades off narratives, as well as moves right now on innovation, or news around the world. Which is why bear markets are so volatile — and also a time when they can be fertile ground for disciplined investors who are ready rather than panicked. In past cycles, the money managers who took this longer-term approach rather than chasing quick rebounds tended to make the biggest gains when the bull market returned. Against that kind of backdrop, the humpbacked migration-type of big-game whale behavior, like seen on MAGACOIN FINANCE, is a signal that pro money has already been quietly positioning for what’s upcoming, regardless of whether retail follows their tempo or not.  Focus on Fundamentals Bear markets separate the wheat from the chaff, revealing who is genuinely building utility and who was just hype. Investors would do well to monitor developer activity, real-world applications and active partnerships along with them. Strongly established, tech-backed cryptocurrencies with active communities have the best chances of weathering a storm and also making it against the upcoming bull cycle.  Accumulate Gradually Finding the exact bottom is nearly impossible. Instead of waiting for the “perfect” entry, strategies like dollar-cost averaging (DCA) allow steady accumulation over time. This approach lowers the emotional pressure of market timing and builds exposure at more favorable prices, preparing portfolios for recovery when optimism returns. Diversify Wisely Focusing on one token is exhilarating when the market is booming, but it can also be destructive during down cycles. Holding a…
Share
BitcoinEthereumNews2025/09/20 10:16
Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

Preliminary analysis of the Balancer V2 attack, which resulted in a loss of $120 million.

On November 3, the Balancer V2 protocol and its fork projects were attacked on multiple chains, resulting in a serious loss of more than $120 million. BlockSec issued an early warning at the first opportunity [1] and gave a preliminary analysis conclusion [2]. This was a highly complex attack. Our preliminary analysis showed that the root cause was that the attacker manipulated the invariant, thereby distorting the calculation of the price of BPT (Balancer Pool Token) -- that is, the LP token of Balancer Pool -- so that it could profit in a stable pool through a batchSwap operation. Background Information 1. Scaling and Rounding To standardize the decimal places of different tokens, the Balancer contract will: upscale: Upscales the balance and amount to a uniform internal precision before performing the calculation; downscale: Reduces the result to its original precision and performs directional rounding (e.g., inputs are usually rounded up to ensure the pool is not under-filled; output paths are often truncated downwards). Conclusion: Within the same transaction, the asymmetrical rounding direction used in different stages can lead to a systematic slight deviation when executed repeatedly in very small steps. 2. Prices of D and BPT The Balancer V2 protocol’s Composable Stable Pool[3] and the fork protocol were affected by this attack. Stable Pool is used for assets that are expected to maintain a close 1:1 exchange ratio (or be exchanged at a known exchange rate), allowing large exchanges without causing significant price shocks, thereby greatly improving the efficiency of capital utilization between similar or related assets. The pool uses the Stable Math (a Curve-based StableSwap model), where the invariant D represents the pool's "virtual total value". The approximate price of BPT (Pool's LP Token) is: The formula above shows that if D is made smaller on paper (even if no funds are actually withdrawn), the price of BPT will be cheaper. BTP represents the pool share and is used to calculate how many pool reserves can be obtained when withdrawing liquidity. Therefore, if an attacker can obtain more BPT, they can profit when withdrawing liquidity. Attack Analysis Taking an attack transaction on Arbitrum as an example, the batchSwap operation can be divided into three stages: Phase 1: The attacker redeems BPT for the underlying asset to precisely adjust the balance of one of the tokens (cbETH) to a critical point (amount = 9) for rounding. This step sets the stage for the precision loss in the next phase. Phase Two: The attacker uses a carefully crafted quantity (= 8) to swap between another underlying asset (wstETH) and cbETH. Due to rounding down when scaling the token quantity, the calculated Δx is slightly smaller (from 8.918 to 8), causing Δy to be underestimated and the invariant D (derived from Curve's StableSwap model) to be smaller. Since BPT price = D / totalSupply, the BPT price is artificially suppressed. Phase 3: The attackers reverse-swap the underlying assets back to BPT, restoring the balance within the pool while profiting from the depressed price of BPT—acquiring more BPT tokens. Finally, the attacker used another profitable transaction to withdraw liquidity, thereby using the extra BPT to acquire other underlying assets (cbETH and wstETH) in the Pool and thus profit. Attacking the transaction: https://app.blocksec.com/explorer/tx/arbitrum/0x7da32ebc615d0f29a24cacf9d18254bea3a2c730084c690ee40238b1d8b55773 Profitable trades: https://app.blocksec.com/explorer/tx/arbitrum/0x4e5be713d986bcf4afb2ba7362525622acf9c95310bd77cd5911e7ef12d871a9 Reference: [1]https://x.com/Phalcon_xyz/status/1985262010347696312 [2]https://x.com/Phalcon_xyz/status/1985302779263643915 [3]https://docs-v2.balancer.fi/concepts/pools/composable-stable.html
Share
PANews2025/11/04 14:00