Shadow Exchange
CtrlK
  • INTRODUCTION TO SHADOW
    • ๐Ÿฆ”What is SHADOW?
      • ๐Ÿ‘ปWhy Fantom?
    • ๐Ÿซ‚Our Partners
    • โ˜ฏ๏ธx(3,3) Fundamentals
    • ๐Ÿ”ฎAMM DEX Functionalities
      • Swaps
      • Voting
      • Incentives
      • LP Staking
  • Concentrated Liquidity Core
    • ๐Ÿค”Concentrated Liquidity
      • ๐Ÿ”ขFee Tiers
      • ๐ŸฆญConcentrated Liquidity Pair Fee Distribution
      • ๐Ÿ…Concentrated Liquidity Advantage
    • ๐Ÿ†Concentrated Liquidity (CL) Gauges
    • ๐Ÿ“œBUSL-1.1 License
    • ๐ŸCompetitive Farming
  • SHADOW Tokenomics
    • ๐Ÿ“ŠSHADOW Initial Distribution
    • ๐Ÿ“ˆEmissions Schedule
      • ๐ŸชœBreakdown
    • ๐Ÿช‚Airdrop
    • โŒxSHADOW
      • How is xSHADOW obtained?
      • How is xSHADOW used?
      • ๐ŸŒ€PVP Rebase
      • ๐Ÿ”„Redeeming
      • ๐Ÿ’ฐxSHADOW Revenue Distribution
  • Resources
    • ๐Ÿ“„Deployed Contract Addresses
    • ๐Ÿ“ฑdApp and Socials
    • ๐Ÿ“ธSHADOW Media Kit
    • ๐ŸŒ‰Bridging To Sonic
  • Security and Legal Considerations
    • ๐Ÿ›Fixed Solidly Vulnerabilities
    • ๐Ÿ› ๏ธWhy Proxy Contracts?
    • ๐Ÿ”Contract Timelock
    • ๐Ÿ˜ŽInherited Security
    • ๐Ÿ–‹๏ธFormal Audits
    • โš–๏ธRisks and Legal Disclosures
Powered by GitBook
On this page
  • Please visit docs.shadow.so these are depreciated.
  • Web app is available at shadow.so
  1. Security and Legal Considerations

๐Ÿ› ๏ธWhy Proxy Contracts?

Please visit docs.shadow.so these are depreciated.

Web app is available at shadow.so

PreviousFixed Solidly VulnerabilitiesNextContract Timelock

Last updated 6 months ago