Security
Last updated
Last updated
The Rooster Protocol contracts have been audited by trustworthy auditing firms. Any issues identified in the audits have been addressed. You can find the full reports from each of the audits below.
Rooster is built on Maverick AMM v2 contracts, which have also been audited repeatedly. You can find those audit reports .