Skip to main content

Smart Contract Security

Have the smart contracts been audited?

Yes. All Tori smart contracts are audited by Sherlock, a leading smart contract security platform protecting over $50 billion in assets across Web3.

View Audit Reports

Read our complete audit reports and findings

Is there a bug bounty program?

Yes. We maintain an active bug bounty program through Sherlock. Security researchers can earn rewards for responsibly disclosing vulnerabilities.
SeverityReward Range
CriticalUp to $100,000+
High10,00010,000 - 50,000
Medium1,0001,000 - 10,000
LowUp to $1,000
Report vulnerabilities to: security@tori.finance

How often are contracts audited?

EventAction
Initial deploymentFull comprehensive audit
Major updatesRe-audit of changed components
New featuresAudit before deployment
OngoingContinuous bug bounty coverage

Are the contracts upgradeable?

Yes. Contracts use upgradeable proxy patterns to allow security fixes and improvements. Safeguards in place:
  • Multi-signature approval required for upgrades
  • Time locks on sensitive changes
  • Transparent upgrade process

Asset Security

Where are funds held?

On-Chain Assets

Audited smart contracts with multi-signature controls and time locks

Off-Chain Assets

Qualified institutional custodians with segregated accounts
Important: User funds are never commingled with operational funds.

Are funds insured?

No. Deposits are not insured by:
  • Any government agency (like FDIC)
  • Private insurance companies
This is standard for DeFi protocols. Only use funds appropriate to your risk tolerance.

Who are the custodians?

We work exclusively with qualified institutional custodians that meet our rigorous due diligence standards:
RequirementWhat We Look For
RegulationLicensed and regulated entities
Track RecordProven history in digital asset custody
SecuritySOC 2 compliance and industry-leading security
SegregationFull segregation of client assets

Can the team access user funds?

The protocol is designed with strict access controls:
ControlImplementation
Multi-signatureCritical operations require multiple approvals
Time locksDelays on sensitive parameter changes
Role separationLimited access based on function

Verification & Transparency

How can I verify reserves?

Three ways to verify:
1

Proof of Reserves

Check real-time attestations from Accountable - independent, third-party verification
2

On-Chain Data

Verify smart contract balances directly on Etherscan
3

Token Supply

Compare total trUSD supply against backing

How often are reserves verified?

Real-time. Proof of Reserves from Accountable updates continuously - not monthly or quarterly like traditional finance.

Where can I see the Proof of Reserves?

SourceWhat You’ll Find
Tori appDashboard showing live backing data
AccountableIndependent attestation platform
EtherscanOn-chain contract balances

Monitoring & Incident Response

How is the protocol monitored?

Hypernative provides AI-powered 24/7 threat detection:
CapabilityDescription
Continuous surveillanceAutomated monitoring of all protocol activity
Anomaly detectionAI identifies unusual patterns in real-time
Instant alertingImmediate notification on suspicious activity
Risk scoringOngoing assessment of protocol risk levels

What happens during a security incident?

Our incident response process:
1

Detection

Automated monitoring identifies the issue immediately
2

Assessment

Rapid triage to understand severity and potential impact
3

Containment

Immediate steps to limit damage (may include pausing operations)
4

Communication

Transparent updates through official channels
5

Remediation

Fix the underlying issue
6

Post-Mortem

Analysis and implementation of preventive measures

Can the protocol be paused?

Yes. Emergency pause capabilities exist for critical situations. This is a protective measure to prevent further damage during security incidents.

Protecting Yourself

How can I stay safe?

Verify URLs

Only use app.tori.finance. Bookmark it to avoid phishing sites.

Verify Contracts

Check addresses on our Contracts page before interacting.

Secure Your Wallet

Never share private keys or seed phrases with anyone. Ever.

Stay Cautious

Be skeptical of DMs, airdrops, and “support” messages.

What are common scams to watch for?

Scam TypeRed Flags
Phishing sitesWrong URL, requests for seed phrase
Fake supportDMs on social media claiming to be Tori
Airdrop scams”Free tokens” requiring wallet connection
ImpersonationAccounts pretending to be Tori team members

What will Tori team NEVER do?

The Tori team will NEVER:
  • ❌ Ask for your seed phrase or private keys
  • ❌ DM you first on social media
  • ❌ Ask you to send tokens to “verify” your wallet
  • ❌ Offer exclusive deals via DM
  • ❌ Ask you to download software outside the official app

What security features should I use?

RecommendationWhy
Hardware walletBest security for larger amounts
Transaction simulationPreview what will happen before signing
Address whitelistingPrevent accidental sends to wrong addresses
MFA on exchangesIf you’re bridging from centralized exchanges

Reporting Issues

How do I report a security vulnerability?

Email: security@tori.finance Please include:
  • Clear description of the vulnerability
  • Steps to reproduce
  • Proof of concept (if applicable)
  • Potential impact assessment
Responsible disclosure: Please don’t publicly disclose vulnerabilities before they’ve been addressed. We commit to acknowledging reports within 24 hours.

How do I report a scam or phishing attempt?

Email security@tori.finance with:
  • Screenshots of the scam
  • URLs involved
  • Any other relevant details
Reporting helps us protect the community.

I think my wallet was compromised

If you suspect unauthorized activity:
  1. Stop - Don’t make any more transactions
  2. Move funds - Transfer remaining funds to a new, secure wallet
  3. Report - Contact support@tori.finance
  4. Document - Save transaction hashes and screenshots

Security Approach

How does Tori approach security?

Security is multi-layered. We don’t rely on any single protection:
LayerHow It Helps
AuditsProfessional review identifies issues before deployment
Bug bountyOngoing incentive for researchers to find issues
24/7 monitoringReal-time detection of anomalies and threats
Multi-sigCritical operations require multiple approvals
Reserve fundBuffer against adverse conditions

What are the limitations?

No system can guarantee perfect security. We’re transparent about this:
  • Audits are point-in-time assessments
  • New attack vectors can emerge
  • DeFi is experimental by nature
This is why we use multiple overlapping protections rather than relying on any single measure. See Risk Disclosures for complete information.

More Questions?

For security-related inquiries: security@tori.finance For general support: support@tori.finance