Security

The Rooster Protocol contracts have been audited by trustworthy auditing firms. Any issues identified in the audits have been addressed. You can find the full reports from each of the audits below.

Rooster is built on Maverick AMM v2 contracts, which have also been audited repeatedly. You can find those audit reports here.

Shieldify Report 1/8/25

Omniscia Report 12/31/24

Last updated