Codes security
1. Third-party audit
Our development team plans to work with third-party auditors and consultants to create the protocol that we believe are secure and reliable.
2. Bug bounty program
Security researchers are eligible to receive bounty for reporting undiscovered vulnerabilities.
3. Bug bounty program
All contract codes and balances can be publicly verified.
Last updated