Skip to main content

Overview

Security audits are a critical component of Tori’s security infrastructure. All smart contracts undergo rigorous review by leading security firms before deployment.

Primary Audit Partner

Sherlock

Sherlock

Leading smart contract security platform protecting over $50 billion in assets across Web3 protocols.
Why Sherlock:
  • Comprehensive audit methodology
  • Team of experienced security researchers
  • Ongoing coverage through bug bounty program
  • Proven track record with major DeFi protocols

Audit Scope

Our audits cover all critical protocol components:
ComponentDescriptionStatus
Core ProtocolMain protocol contracts and logicAudited
trUSD TokenERC-20 token contractAudited
strUSD StakingStaking and unstaking contractsAudited
Access ControlAdministrative functions and permissionsAudited
Oracle IntegrationPrice feed integrationsAudited

Audit Reports

Audit reports are published upon completion. Check back for updates as new audits are completed.

Available Reports

AuditScopeDateStatus
Coming soonInitial protocol auditTBDIn Progress

Bug Bounty Program

In addition to formal audits, we maintain an active bug bounty program through Sherlock.

How It Works

1

Discover

Security researchers identify potential vulnerabilities in our smart contracts.
2

Report

Submit findings through our responsible disclosure process.
3

Verify

Our team and Sherlock verify the validity and severity of the finding.
4

Reward

Valid findings receive rewards based on severity.

Severity Levels

SeverityDescriptionTypical Reward
CriticalDirect loss of user fundsHighest
HighSignificant impact on protocolHigh
MediumLimited impact, specific conditionsMedium
LowMinor issues, best practicesLower

Scope

The bug bounty covers:
  • All deployed smart contracts
  • Integration vulnerabilities
  • Economic attack vectors
  • Access control issues
Out of scope:
  • Already known issues
  • Third-party protocols
  • Frontend/UI issues (separate program)
  • Theoretical attacks without PoC

Reporting Vulnerabilities

Email: security@tori.finance

What to Include

A good vulnerability report includes:
  • Clear description of the issue
  • Step-by-step reproduction instructions
  • Proof of concept (if applicable)
  • Potential impact assessment
  • Suggested remediation (optional)

Response Timeline

PhaseTimeline
AcknowledgmentWithin 24 hours
Initial AssessmentWithin 72 hours
Remediation PlanWithin 1 week
Fix DeploymentVaries by severity
Public DisclosureAfter fix is live

Ongoing Security

Security is not a one-time event. We maintain continuous security through:

Re-Audits

TriggerAction
Major UpdatesFull re-audit of changed components
New FeaturesAudit of new functionality
Periodic ReviewRegular security assessments

Continuous Monitoring

Hypernative provides 24/7 monitoring of all protocol activity:
  • Anomaly detection
  • Threat identification
  • Automated alerting
  • Risk scoring

Security Updates

We commit to:
  • Prompt patching of identified issues
  • Transparent communication about security events
  • Regular security status updates

Limitations

Important to understand:
  • Audits reduce risk but don’t eliminate it
  • New vulnerabilities may be discovered after audits
  • Economic attacks may not be caught by code audits
  • Third-party dependencies carry their own risks
Please review our complete Risk Disclosures.

Verification

You can verify our security measures:
What to CheckHow to Verify
Audit ReportsDownload and review full reports
Contract CodeVerified on block explorers
Bug Bounty StatusCheck Sherlock platform
Monitoring StatusHypernative dashboard

Next Steps