• Sec. Infra Overview
  • Past Audits
  • Code Structure
  • Centralization
  • Exposure to other Defi
  • Recommendation
  • User Rating
  • Back
protocol logo

Wildcat V2

Rating

A

Score79.00

Lending

Sec. Infrastructure Overview

Current Bug Bounty: Immunefi
Bug Bounty Max Payout: 10.0K $
Has paid White Hats before:
Date of Last Audit: 1 Jan 1

Recent Security Incidents

  • Incident

    Amount Lost

    Date

Secured By

The Protocol is secured by

  • Name

    Type

    Website

  • logo of list item
    0

Past Audits

Number of Audits

2

Number of Vul. Found

59

Date of Last Audit

1 Jan 1

Past Audit Reports

Last codebase change was on: 1 Jan 1

Show Code Locations
Show all Vulnerabilities

Vulnerabilities reported in past audits

Code Structure

Lines of Code

0

Amount of Contracts

97

External Integrations

0

Code Summery

Wildcat is a decentralized protocol designed to enable undercollateralized borrowing and lending, allowing borrowers to customize their loan terms while providing lenders with new opportunities. Unlike traditional overcollateralized solutions, Wildcat empowers users to define their loan amounts, interest rates, and redemption terms, offering greater flexibility in the credit market. The platform facilitates direct lending to specific borrowers, ensuring more targeted credit exposure and predictable returns through fixed interest rates. Additionally, Wildcat' open-source Master Loan Agreement aligns on-chain interactions with traditional credit agreements, while the protocol itself does not assess borrower creditworthiness, placing the responsibility of risk evaluation on lenders.

Show Dependency Graph

Code Structure & Dependency

Show Codefile metrics

Centralization

Decentralization Score

15 out of 20

Contract Upgradability

No upgradability

Frontend

Go to Dapp

Maintenance Score

1.00

Poor

Excellent

Admin / Governance Functions

Timelocks

No Timelocks

Pauseability

No pause

Admin Wallet

0xC15bE5214978d1fc509ECdd4f9D5BC067C94D9Ae

Recommendations

Users are solely responsible for ensuring their use of the Wildcat Protocol complies with all relevant laws and regulations, including those related to taxes, anti-money laundering, and trade sanctions. They must not use the protocol to violate or bypass any legal or regulatory obligations. Additionally, users are fully accountable for securing their private keys and access credentials, as the Wildcat Foundation cannot recover lost keys or reverse transactions.

User Rating

Avg. User Rating

No ratings

No ratings yet

Submit your review

Protocols on SCAS can't offer incentives to hide reviews

Disclaimer:

SCAS conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.

In case you find any information on this report is incorrect, please fill out following form:Feedback