# Codes security

**1. Third-party audit**

Our development team plans to work with third-party auditors and consultants to create the protocol that we believe are secure and reliable.

**2. Bug bounty program**

Security researchers are eligible to receive bounty for reporting undiscovered vulnerabilities.

**3. Bug bounty program**

All contract codes and balances can be publicly verified.
