MELD Dev Docs
  • Welcome to MELD
  • OVERVIEW
    • Core Concepts
      • EVM Compatible
      • Staking/Block Rewards
      • L1-Subnet
    • Bug Bounties
    • Careers
    • Security & Audits
      • Double Spend Prevention
  • DEVELOP
    • Developing on MELD
    • Basics
      • Kanazawa Testnet
      • Test Tokens & Faucet
      • MELD Mainnet
      • RPC connections
        • RPC Methods
      • Explorers
    • Tools
    • Oracles
      • Integrating Supra Oracles
    • Deploy a Smart Contract
      • Smart Contract Languages
      • Smart Contract Testing
      • Using Remix IDE
      • Using Hardhat
      • Verify Your Smart Contract
    • Token Standards
      • MLD-20: Fungible Tokens
        • Interacting With MLD-20 Tokens
      • MLD-721: NFTs
      • MLD-1155: Multi-token standard
      • MLD-404: Semi-fungible tokens
      • MDL-6551: Token Bound Accounts
    • Deploy NFTs
      • Using Remix
    • dApp
      • Develop a Full Stack dApp on MELD
      • Secure your dApp
    • Decentralized Storage
    • Cross Chain Bridging
      • Integrating Chainport
        • Bridging Between MELD and EVM Chains
          • Main Chain -> Side Chain
          • Side Chain -> Main Chain
          • Side Chain -> Side Chain
      • Akamon Bridge
      • Yield Boost
  • VALIDATORS
    • Overview
    • Consensus
    • Run a Validator node
    • MELD Staking
  • Tutorials
    • Using MELD with your metamask
    • Create a Token
    • Add a Token to Asomi DEX
    • Lock/Burn Liquidity
  • FAQ
    • General FAQ
    • Borrowing & Lending FAQ
    • MELD ISPO FAQ
Powered by GitBook
On this page
  1. OVERVIEW

Security & Audits

Best Practices & Protocol Audits

PreviousCareersNextDouble Spend Prevention

Last updated 1 year ago

Ensuring the safety and trustworthiness of our platform is our top priority. From day one, we've taken proactive measures to maintain the highest standards of security, ensuring that our community can interact with our protocols with confidence.


Comprehensive Security Practices

Every product and feature on MELD undergoes rigorous internal testing and code reviews before being introduced. We follow best security practices and have implemented robust internal protocols to detect and rectify vulnerabilities.


Third-Party Audits

Understanding the importance of external validation, we have partnered with leading industry experts to audit our smart contracts and systems. These third-party audits provide an impartial assessment, ensuring that our solutions are free from known vulnerabilities and are designed with optimal security in mind.


Bug Bounty Program

Our commitment to security extends to our community. We value the expertise of our community members and white-hat hackers and encourage them to help us identify and rectify potential vulnerabilities. Through our bug bounty program, we reward those who help us make MELD even safer.


Continual Improvement

In the ever-evolving landscape of blockchain and DeFi, we stay abreast of the latest threats and vulnerabilities. Our team is dedicated to continuous learning, ensuring that our security measures evolve with the changing dynamics of the industry.


Recommendations for Users:

  1. Stay Informed: Regularly visit our official channels for any announcements or updates.

  2. Guard Your Private Keys: Never share your private keys or mnemonic phrases. MELD will never ask for them.

  3. Beware of Phishing: Always double-check URLs and be wary of suspicious links or requests.


Connect With Us

If you have any security concerns, suggestions, or inquiries, please reach out to us at .

Bug Bounties
security@meld.com
Meld - CertiK Skynet Project Insight
CERTIK ERC-20 MELD TOKEN AUDIT
Logo
3MB
audit-dao.pdf
pdf
CERTIK MELD DAO AUDIT