Shadow Exchange
  • INTRODUCTION TO SHADOW
    • 🦔What is SHADOW?
      • 👻Why Fantom?
    • 🫂Our Partners
    • ☯️x(3,3) Fundamentals
    • 🔮AMM DEX Functionalities
      • Swaps
      • Voting
      • Incentives
      • LP Staking
  • Concentrated Liquidity Core
    • 🤔Concentrated Liquidity
      • 🔢Fee Tiers
      • 🦭Concentrated Liquidity Pair Fee Distribution
      • 🏅Concentrated Liquidity Advantage
    • 🏆Concentrated Liquidity (CL) Gauges
    • 📜BUSL-1.1 License
    • 🏁Competitive Farming
  • SHADOW Tokenomics
    • 📊SHADOW Initial Distribution
    • 📈Emissions Schedule
      • 🪜Breakdown
    • 🪂Airdrop
    • ❌xSHADOW
      • How is xSHADOW obtained?
      • How is xSHADOW used?
      • 🌀PVP Rebase
      • 🔄Redeeming
      • 💰xSHADOW Revenue Distribution
  • Resources
    • 📄Deployed Contract Addresses
    • 📱dApp and Socials
    • 📸SHADOW Media Kit
    • 🌉Bridging To Sonic
  • Security and Legal Considerations
    • 🐛Fixed Solidly Vulnerabilities
    • 🛠️Why Proxy Contracts?
    • 🔐Contract Timelock
    • 😎Inherited Security
    • 🖋️Formal Audits
    • ⚖️Risks and Legal Disclosures
Powered by GitBook
On this page
  • Please visit docs.shadow.so these are depreciated.
  • Web app is available at shadow.so
  1. Security and Legal Considerations

🔐Contract Timelock

Please visit docs.shadow.so these are depreciated.

Web app is available at shadow.so

PreviousWhy Proxy Contracts?NextInherited Security

Last updated 4 months ago