Files
dodo-contractV2/README.md

47 lines
2.6 KiB
Markdown
Raw Normal View History

2020-06-26 00:31:25 +08:00
# DODO10x better liquidity than uniswap
2020-07-13 13:35:35 +08:00
## What is DODO?
2020-06-26 00:31:25 +08:00
✍️[Introducing DODO](https://medium.com/@dodo.in.the.zoo/introducing-dodo-10x-better-liquidity-than-uniswap-852ce2137c57)
- DODO is based on a brand new market maker algorithm with an essential idea of risk neutrality to keep liquidity providers portfolio stable.
- Compared with AMMs, DODO will perform 10x better in liquidity.
2020-07-13 13:35:35 +08:00
## Who audit DODO?
[PeckShield Inc.](https://peckshield.cn/en) is a leading blockchain security company with the goal of elevating the security, privacy, and usability of current blockchain ecosystems by offering top-notch, industry-leading services and products.
2020-08-04 21:50:46 +08:00
You could find the audit report [here](https://raw.githubusercontent.com/DODOEX/dodo-smart-contract/master/audit/dodo_audit_report_2020_16_en_1.0.pdf)
2020-07-13 13:35:35 +08:00
## More details and deployment info
2020-08-04 21:50:46 +08:00
You could find all documents and info about DODO [here](https://dodoex.github.io/docs/docs)
2020-07-13 13:35:35 +08:00
2020-08-05 17:17:26 +08:00
## Bug Bounty 💰
### Rewards
Severity of bugs will be assessed under the [CVSS Risk Rating](https://www.first.org/cvss/calculator/3.0) scale, as follows:
- Critical (9.0-10.0): Up to $50,000
- High (7.0-8.9): Up to $10,000
- Medium (4.0-6.9): Up to $2,000
- Low (0.1-3.9): Up to $1,000
In addition to assessing severity, rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability.
### Disclosure
Any vulnerability or bug discovered must be reported only to the following email: contact@dodoex.io; must not be disclosed publicly; must not be disclosed to any other person, entity or email address prior to disclosure to the contact@dodoex.io email; and must not be disclosed in any way other than to the contact@dodoex.io email. In addition, disclosure to contact@dodoex.io must be made promptly following discovery of the vulnerability. Please include as much information about the vulnerability as possible, including:
- The conditions on which reproducing the bug is contingent.
- The steps needed to reproduce the bug or, preferably, a proof of concept.
- The potential implications of the vulnerability being abused.
A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount.
Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution, if agreed.
2020-07-13 13:35:35 +08:00
## Contact Us
2020-08-04 21:50:46 +08:00
Send E-mail to contact@dodoex.io