Page 1 of 2

Zenith Audit Setup

Name of your protocol:


Please list all chains that you plan to deploy the protocol on (now and in the future)


If you are integrating tokens, are you allowing only whitelisted tokens to work with the codebase or any complying with the standard? Are they assumed to have certain properties, e.g. be non-reentrant? Are there any types of weird tokens you want to integrate?


Are there any limitations on values set by admins (or other roles) in protocols you integrate with, including restrictions on array lengths?


Are there any off-chain mechanisms involved in the protocol (e.g., keeper bots, arbitrage bots, etc.)? We assume these mechanisms will not misbehave, delay, or go offline unless otherwise specified.


What properties/invariants do you want to hold even if breaking them has a low/unknown impact?


Please discuss any design choices you made.


Please provide links to previous audits (if any).


Please list any relevant protocol resources.


Additional audit information.