Yeti Finance Technical Docs
  • Introduction
  • Terms of Service
  • Disclaimer: Risks & YETI/YUSD
  • How Does Yeti Finance Work?
    • General
    • Borrowing
      • Stablecoin Borrowing
      • Borrowing FAQ
    • Yield Bearing Collateral
    • Redemptions and YUSD Peg
    • Recovery Mode
    • Definitions
    • Stability Pool and Liquidations
    • Interest
  • YETI and YUSD
    • Token Overview
  • About Yeti Finance
    • Protocol Security
    • Contract Addresses
    • Bug Bounty Program
    • Collateral Integration Process
    • Integrations
    • Contract Interaction Through Snowtrace
      • Trove Operations
      • Stability Pool
      • Liquidation
      • Redemption
  • Links
    • Discord
    • Twitter
    • Telegram
    • Website
Powered by GitBook
On this page
  1. About Yeti Finance

Bug Bounty Program

PreviousContract AddressesNextCollateral Integration Process

Last updated 1 year ago

Security is Yeti Finance's top priority. We've spent hundreds of thousands of dollars in security in efforts to create a truly innovative decentralized borrowing protocol and have had an extensive number of audits from firms and independent auditors alike.

Our lucrative bug bounty program rewards anyone who is able to find a security issue or critical vulnerability within our codebase.

If you find any bugs or serious vulnerabilities in Yeti Finance's codebase, please email for disclosures or contact @RoboYeti or @TrucoYeti on telegram.

Audits here.
[email protected]