Skip to main content

Security & Risk

Yes, Monolith has undergone comprehensive security audits by leading blockchain security firms. We maintain a rigorous audit process and make all reports publicly available.
Our bug bounty program rewards security researchers for responsibly disclosing vulnerabilities:
  • Critical Issues: Up to $100,000 + percentage of recovered funds
  • High Severity: 10,00010,000 - 50,000
  • Medium Severity: 5,0005,000 - 10,000
  • Low Severity: 1,0001,000 - 5,000
For security issues, please use our bug bounty program:
  1. Do not publicly disclose the issue
  2. Contact us through the designated security channels
  3. Provide detailed reproduction steps
  4. Allow reasonable time for fixes
  5. Receive rewards for valid disclosures
Common DeFi security risks include:
  • Smart Contract Vulnerabilities: Code bugs or logic errors
  • Oracle Manipulation: Price feed attacks or manipulation
  • Flash Loan Attacks: Exploits using uncollateralized loans
  • Reentrancy Attacks: Recursive calling vulnerabilities
  • Governance Attacks: Proposal manipulation or voting exploits
We implement multiple layers of oracle protection:
  • Chainlink Price Feeds: Industry-standard decentralized oracles
  • Multiple Sources: Cross-validation with multiple price feeds
  • Staleness Checks: Automatic deactivation during outages
  • Circuit Breakers: Emergency shutdown during extreme volatility
  • Time-weighted Averages: Smoothing of price data
Monolith includes mechanisms to handle insolvency:
  • Bad debt socialization distributes losses across all borrowers proportionally
  • The protocol maintains reserves to cover potential shortfalls
  • Governance can implement emergency measures if needed
Fund security measures:
  • Non-custodial Design: Users maintain control of their assets
  • Smart Contract Security: Audited and formally verified contracts
  • Emergency Procedures: Circuit breakers and pause functionality
  • Reserve Management: Protocol reserves for stability
  • Multi-signature Controls: Administrative functions require multiple approvals
Cross-chain risks include:
  • Bridge Vulnerabilities: Interoperability protocol exploits
  • Network Congestion: Delayed or failed transactions
  • Consensus Risks: Different security assumptions across chains
  • Liquidity Fragmentation: Assets spread across multiple networks
  • Oracle Dependencies: Cross-chain price feed complexities