Loading XyloNet...

XyloNet's security practices, risk considerations, and safety measures.
XyloNet is designed with security as a top priority. Our contracts implement industry-standard security patterns and are built on battle-tested protocols.
You always control your funds
Fully verifiable code
Based on proven algorithms
All external calls use reentrancy guards to prevent recursive attacks
Solidity 0.8+ with built-in overflow checks
Role-based permissions for administrative functions
All user inputs are validated with proper bounds checking
Minimum output amounts prevent sandwich attacks
Transaction deadlines prevent stale transaction execution
The bridge relies on Circle's Cross-Chain Transfer Protocol for native USDC transfers. CCTP is secured by Circle's attestation service and institutional-grade infrastructure.
Learn more about CCTP security →Our AMM algorithm is based on Curve Finance's StableSwap invariant, which has secured billions of dollars in TVL and has been battle-tested since 2020.
Read the Curve whitepaper →The vault implements the standardized ERC-4626 interface, reducing implementation risk through a well-audited, widely-adopted standard.
View EIP-4626 specification →Despite security measures, smart contracts may contain undiscovered vulnerabilities. Only deposit funds you can afford to lose and consider starting with smaller amounts.
While rare, stablecoins can temporarily or permanently depeg from their target value. The StableSwap curve amplifies losses if tokens significantly depeg.
While CCTP is secured by Circle, cross-chain transfers involve additional trust assumptions. Ensure you understand the attestation process.
Arc Network is currently in testnet phase. Expect potential network instability, resets, and changes before mainnet launch.
If you discover a critical vulnerability or security incident: