Security

Protocol Security

  1. Redemption is processed with a 5-day delay, and will be rejected with an incorrect price based on market conditions at the time

  2. Whitelisting is required for any protocol that our vaults interact with

  3. A decentralized multi-sig is used to approve any changes and upgrades to the protocol

Smart Contract Security

Our smart contract architecture is based on Vedaarrow-up-right's open source BoringVaultarrow-up-right design, which has been widely tested in the market with billions in TVL.

Last updated