Usual Tech Docs
Usual WebsiteGeneral DocsContract DeploymentsAuditsAccess dApp
  • 🚀GM GM
    • Usual Tech Hub
  • 🔭Overview
    • Usual Protocol Primer
    • Features
      • USD0
      • USD0++
      • USD0 Mint & Redeem Engine
      • ETH0
      • USUAL
      • USUAL*
      • USUALx (USUAL staking)
      • USUAL distribution
      • USUAL Airdrop
      • Usual USD0++ Investment Vault
    • Architecture
      • Role Management
      • USUAL Distribution Model
  • ⛓️Smart Contracts
    • Protocol Contracts
      • USD0
        • USD0 DaoCollateral
        • Swapper Engine
      • ETH0
        • ETH0 DaoCollateral
      • USUAL
        • USUAL staking
        • USUAL* Vested Allocation Staking
        • USUAL Distribution
          • Distribution Module
          • Yield Module
        • Airdrop Module
    • Token Contracts
      • USD0
      • USD0++
      • ETH0
      • USUAL
      • USUAL*
      • USUALx
      • Usual USD0++ Investment Vault
        • VaultRouter
    • Utility Contracts
      • USD0
        • USD0 ClassicalOracle
        • USD0 Abstract Oracle
        • Chainlink Oracles
        • Pyth Oracles
      • ETH0
        • ETH0 Classical Oracle
        • ETH0 Abstract Oracle
        • Lido wstETH Oracle
      • USUAL
        • RedStone Oracle
    • RWA Collateral
      • USYC by Hashnote
      • M by M0
        • UsualM
      • USDtb by Ethena
    • ETH0 Collateral
      • wstETH by Lido
    • Contract Deployments
  • 🛡️Security & Audits
    • Security Practices
    • Testing Framework
    • Monitoring Framework
    • Audits
    • Bug Bounty
  • 🧩Integrations
    • Integrate USD0++
      • Reward redistribution by integration partner
      • Claim Address Redirect
  • 📚Resources
    • Community & Support
    • References
  • 📖Support
    • FAQ
    • Glossary
  • ⚖️Legal
    • Terms of Services
    • Legal Notice
    • Privacy Policy
Powered by GitBook
On this page
  • Security Approach
  • Multi-layered Security Strategy

Was this helpful?

  1. Security & Audits

Security Practices

Security Approach

Multi-layered Security Strategy

  1. Secure Development Practices: We follow industry-standard secure coding practices and regularly review our codebase for potential vulnerabilities.

  2. Tokenomics Design and Simulation: Mechanisms implemented in our smart contracts undergo thorough analysis by a team of economists to optimize and simulate their behavior to validate the designs.

  3. Access Control: We implement robust access control mechanisms to ensure only authorized parties can interact with sensitive functions.

  4. Upgrade Mechanisms: Our contracts include secure upgrade patterns to allow for improvements without compromising security or user funds.

  5. Smart Contract Security Audits: Our contracts are periodically reviewed by multiple security auditors and bug bounty campaigns to find any vulnerabilities.

  6. Continuous Monitoring: We employ advanced monitoring tools to detect any unusual activity or potential threats in real-time, allowing for swift response to any security incidents.

PreviousContract DeploymentsNextTesting Framework

Last updated 7 months ago

Was this helpful?

🛡️
Page cover image