Evaluating Security Models for Shared Infrastructure Services Across Ecosystem Projects

Hey everyone,

Let’s discuss the security models of shared infrastructure services used across ecosystem projects. As more teams rely on common components like indexers, SDKs, wallets, and oracle-style services, these pieces increasingly become part of the critical path for many applications at once.

Shared infrastructure is convenient and often necessary, but it also concentrates risk. A flaw or compromise in one widely used service can have cascading effects across multiple projects. I’m curious how teams think about minimizing this blast radius. Are there architectural patterns that help isolate failures, or ways to design services so that trust assumptions are explicit and limited?

Another question is around standards and expectations. Should ecosystem-wide services meet some baseline security or reliability criteria before others depend on them? Audits, open specifications, or reference implementations might help, but they also introduce coordination and maintenance overhead.

I’d be especially interested in hearing from teams that operate or depend on shared services today. What security assumptions do you make, and how do you communicate them to downstream users? Have you encountered incidents or near misses that changed how you approach shared infrastructure?

This seems like an important topic as the ecosystem matures, and learning from real experiences could help newer projects avoid repeating the same mistakes.