Project Pi Docs
Home
  • PROTOCOL
    • πŸ§‘β€πŸš€Mission
    • πŸ“‘Litepaper
    • πŸͺ™Tokenomics
    • πŸ“Analytics
    • πŸ”’Security
      • πŸ”ŽAudits
        • πŸ”RD Auditors
        • πŸ”SourceHat
        • πŸ”Zokyo
        • πŸ”Chain Audits
    • Project Pi App
  • Liquid Staking
    • πŸ’§What is Liquid Staking?
    • ⛓️How Liquid Staking Works
    • πŸ’ΈYield - APY
    • πŸ“˜Guide: How to Stake - Unstake PLS
    • Liquid Staking
  • Pipool
    • Pi Pool Withdrawal Address
    • πŸ’¦What is a Pi Pool?
    • βš™οΈHow Pi Pool Works
    • πŸ’ΈYield - APY
    • 🚦Pi Pool Statuses
    • βš’οΈGuide: How to Launch a Pi Pool
    • Launch Pi Pool
  • NFT Staking
    • πŸ–ΌοΈWhat is NFT Staking?
    • πŸ“˜Guide: How to Stake - Unstake NFT
    • Launch NFT Staking
  • Technical Information & Compliance
    • πŸ“’Contract Addresses
    • πŸ’ΏTerms of Service
    • πŸ”Privacy Policy
  • Brand Assets
    • ♾️Logos
    • πŸ” Fonts
    • 🎨Marketing Colors
Powered by GitBook
On this page

Was this helpful?

  1. PROTOCOL

Security

Audits & Vulnerability Reports

Last updated 4 months ago

Was this helpful?

Security is at the core of Project Pi’s operations. Our commitment to safeguarding our platform and users is evidenced by the strict security measures and processes we have in place:

  • Audited and Verified: We've undergone comprehensive security audits by reputable firms, including RD Auditors, SourceHat, Zokyo, and Chain Audits , to ensure the integrity of our protocol and to identify and address potential vulnerabilities.

Our dedication to maintaining a secure and reliable platform ensures the safety of user assets and reinforces confidence in our liquid staking protocol.

πŸ”’
πŸ”ŽAudits