Codes security

1. Third-party audit

Our development team plans to work with third-party auditors and consultants to create the protocol that we believe are secure and reliable.

2. Bug bounty program

Security researchers are eligible to receive bounty for reporting undiscovered vulnerabilities.

3. Bug bounty program

All contract codes and balances can be publicly verified.

Last updated