• Sec. Infra Overview
  • Past Audits
  • Code Structure
  • Centralization
  • Exposure to other Defi
  • Recommendation
  • User Rating
  • Back
protocol logo

Index

Rating

A

Score73.00

YieldAggregator

Sec. Infrastructure Overview

Current Bug Bounty: Immunefi
Bug Bounty Max Payout: 200.0K $
Has paid White Hats before:
Date of Last Audit: 1 Jan 1

Recent Security Incidents

  • Incident

    Amount Lost

    Date

Secured By

The Protocol is secured by

  • Name

    Type

    Website

  • logo of list item
    0

Past Audits

Number of Audits

4

Number of Vul. Found

40

Date of Last Audit

1 Jan 1

Past Audit Reports

Last codebase change was on: 1 Jan 1

Show Code Locations
Show all Vulnerabilities

Vulnerabilities reported in past audits

Code Structure

Lines of Code

0

Amount of Contracts

297

External Integrations

0

Code Summery

The main purpose of the Index Coop application is to build decentralized finance (DeFi) products that promote prosperity for everyone. It operates as a decentralized autonomous organization (DAO), consisting of core contributors and a broader community of token holders who collaborate on product development. The INDEX Token serves as a governance token, enabling holders to vote on various proposals related to product launches, treasury allocations, and governance decisions. While the current utility of the INDEX token is limited to DAO governance, it is up to the community to explore and establish additional uses and value for the token in the future.

Show Dependency Graph

Code Structure & Dependency

Show Codefile metrics

Centralization

Decentralization Score

18 out of 20

Contract Upgradability

No upgradability

Frontend

Go to Dapp

Maintenance Score

2.00

Poor

Excellent

Admin / Governance Functions

Timelocks

Uses Timelocks

Pauseability

No pause

Admin Wallet

0x9467cfadc9de245010df95ec6a585a506a8ad5fc

Use timelocks on updating fees

Recommendations

The Aave V3 FLI strategy has keeper bots

User Rating

Avg. User Rating

No ratings

No ratings yet

Submit your review

Protocols on SCAS can't offer incentives to hide reviews

Disclaimer:

SCAS conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.

In case you find any information on this report is incorrect, please fill out following form:Feedback