๐Contracts & Audits
Lobster's contracts security
Smart-contract technology ๐งพ
Lobster uses on-chain smart contracts for its workflow. More globally, they play a central role in the DeFi ecosystem. They are designed to automate and execute financial operations while ensuring the safety of user funds.
One of the essential characteristics of smart contracts is their immutability. Once deployed, these contracts cannot be modified, which guarantees security of users' funds.
Lobster relies on third-party contracts (see dedicated section below), deployed on layer 2 blockchains, where they interact with the following DeFi protocols : Uniswap v3 for yield, AAVE for adjusting exposure, and 1Inch for swaps. Our off chain algorithm is plugged to those smart contracts, and will send commands to be executed, among a whitelist of authorized commands. We benefit from the prohibition of modification of access rights to a third-party application, and the prohibition of whitelisting new protocols, which guarantee the correct execution of the algorithm on well-defined tasks.
Lobster's contracts ๐ฆ
Lobster initially relies on Dhedge's smart contracts infrastructure. This implies that the security of Lobster users' funds depends on the smart contracts created by Dhedge. Dhedge is an established protocol that currently oversees over $30 million in assets, having undergone multiple audits. See more about Dhedge here --> https://docs.dhedge.org/.
See more about Dhedge last audit here -> https://docs.dhedge.org/audits
You can also insure Dhedge contracts to remove this layer of risk. See more in our "Insurance" page.
A โmade by Lobsterโ smart contract infrastructure is currently being developed, opening up the possibility of exploring new perspectives. For example, it would enable the development of additional strategies on various blockchains in the future.
All underlying contracts ๐
Please note that for each strategy, all underlying contracts are listed in the detailed section of the strategy.
Protocols
Tokens
This is a list of all the tokens we may use, but all the specific underlying tokens that we use for each strategy are listed in the detailed section of each strategy.
Last updated