• Sec. Infra Overview
  • Past Audits
  • Code Structure
  • Centralization
  • Exposure to other Defi
  • Recommendation
  • User Rating
  • Back
protocol logo

BondProtocol

Rating

A

Score79.00

CrosschainLiquidity

Sec. Infrastructure Overview

Current Bug Bounty: Immunefi
Bug Bounty Max Payout: 75.0K $
Has paid White Hats before:
Date of Last Audit: 1 Jan 1

Recent Security Incidents

  • Incident

    Amount Lost

    Date

Secured By

The Protocol is secured by

  • Name

    Type

    Website

  • logo of list item
    0

Past Audits

Number of Audits

4

Number of Vul. Found

20

Date of Last Audit

1 Jan 1

Past Audit Reports

Last codebase change was on: 1 Jan 1

Show Code Locations
Show all Vulnerabilities

Vulnerabilities reported in past audits

Code Structure

Lines of Code

0

Amount of Contracts

33

External Integrations

0

Code Summery

Bond Protocol, launched on October 3rd, 2022, aims to enhance sustainable treasury growth for crypto projects. Its product suite includes Permissionless Bonds and Options Liquidity Mining, available on Ethereum, Arbitrum, and Optimism. The protocol addresses inefficiencies in the crypto industry, particularly the challenges projects face in diversifying their treasury and managing token supply. By providing alternatives to traditional distribution mechanisms, Bond Protocol seeks to reduce slippage, price impact, and incentive misalignment. This innovation helps projects extend their runway and improve treasury management.

Show Dependency Graph

Code Structure & Dependency

Show Codefile metrics

Centralization

Decentralization Score

18 out of 20

Contract Upgradability

No upgradability

Frontend

Go to Dapp

Maintenance Score

2.00

Poor

Excellent

Admin / Governance Functions

Timelocks

Uses Timelocks

Pauseability

No pause

Admin Wallet

The Option Teller has permissioned functions that are controlled by the Bond Protocol RolesAuthority contract. The Bond Protocol MS is the only permissioned contract on the authority.

Can not be paused

No Timelocks

Recommendations

The protocol is permissionless. Fee-on-transfer is explicitly prohibited in the code. Our documentation will reflect that rebasing tokens and tokens without string metadata are not supported. Odd decimal values are supported, though could result in precision loss.

User Rating

Avg. User Rating

No ratings

No ratings yet

Submit your review

Protocols on SCAS can't offer incentives to hide reviews

Disclaimer:

SCAS conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.

In case you find any information on this report is incorrect, please fill out following form:Feedback