Shadow Exchange
CtrlK
  • INTRODUCTION TO SHADOW
    • ๐Ÿฆ”What is SHADOW?
      • ๐Ÿ‘ปWhy Fantom?
    • ๐Ÿซ‚Our Partners
    • โ˜ฏ๏ธx(3,3) Fundamentals
    • ๐Ÿ”ฎAMM DEX Functionalities
      • Swaps
      • Voting
      • Incentives
      • LP Staking
  • Concentrated Liquidity Core
    • ๐Ÿค”Concentrated Liquidity
      • ๐Ÿ”ขFee Tiers
      • ๐ŸฆญConcentrated Liquidity Pair Fee Distribution
      • ๐Ÿ…Concentrated Liquidity Advantage
    • ๐Ÿ†Concentrated Liquidity (CL) Gauges
    • ๐Ÿ“œBUSL-1.1 License
    • ๐ŸCompetitive Farming
  • SHADOW Tokenomics
    • ๐Ÿ“ŠSHADOW Initial Distribution
    • ๐Ÿ“ˆEmissions Schedule
      • ๐ŸชœBreakdown
    • ๐Ÿช‚Airdrop
    • โŒxSHADOW
      • How is xSHADOW obtained?
      • How is xSHADOW used?
      • ๐ŸŒ€PVP Rebase
      • ๐Ÿ”„Redeeming
      • ๐Ÿ’ฐxSHADOW Revenue Distribution
  • Resources
    • ๐Ÿ“„Deployed Contract Addresses
    • ๐Ÿ“ฑdApp and Socials
    • ๐Ÿ“ธSHADOW Media Kit
    • ๐ŸŒ‰Bridging To Sonic
  • Security and Legal Considerations
    • ๐Ÿ›Fixed Solidly Vulnerabilities
    • ๐Ÿ› ๏ธWhy Proxy Contracts?
    • ๐Ÿ”Contract Timelock
    • ๐Ÿ˜ŽInherited Security
    • ๐Ÿ–‹๏ธFormal Audits
    • โš–๏ธRisks and Legal Disclosures
Powered by GitBook
On this page
  • Please visit docs.shadow.so these are depreciated.
  • Web app is available at shadow.so
  1. Resources

๐ŸŒ‰Bridging To Sonic

How you can bridge over to Sonic

Please visit docs.shadow.so these are depreciated.

Web app is available at shadow.so

PreviousSHADOW Media KitNextFixed Solidly Vulnerabilities

Last updated 6 months ago