Security

Protocol Security

  1. Redemption is processed with a 5-day delay, and will be rejected with an incorrect price based on market conditions at the time

  2. Whitelisting is required for any protocol that our vaults interact with

  3. A decentralized multi-sig is used to approve any changes and upgrades to the protocol

Smart Contract Security

Our smart contract architecture is based on Veda's open source BoringVault design, which has been widely tested in the market with billions in TVL.

Last updated