Technical risks
Here, we focus on risks related to the protocol's technology stack and its potential vulnerabilities. The key pillars of defense against these risks are infrastructure redundancy and a rigorous approach to cybersecurity. Let’s explore how Enjoyoors prepares to address these challenges.
Risk
Description
Risk mitigation strategy
Oracle risk
Inconsistent or corrupt pricing information could lead to unintended synthetic supply shock or the insolvency of specific markets.
Enjoyoors integrates three oracle providers (Pyth, Chainlink, and Redstone) and organizes direct market feeds from a number of CEXes and DEXes.
All of these price feeds are then medianized and monitored in real time for outlier price detection. The failure of any single one or several of them simultaneously will not materially affect the Enjoyoors protocol.
Protocol Risk
Enjoyoors deploys gigaAssets to different protocols and should be aware of risks inherent to those protocols - both technical and non-technical.
Introduce a scoring model to assess protocol quality and security based on (but not limited to) the following factors:
Profitability — how much yield does the protocol earn.
Strategy - how is yield generated, and what are inherent risks to the strategy
Technology — how secure the protocol, its architecture, and codebase are.
Competition — SWOT analysis. Team — Core team and advisors.
Community — Sentiment and engagement analysis.
Business Model — Structural and legal analysis.
Technology risk
Potential for financial or operational loss due to flaws, vulnerabilities, or malicious actions within any part of the Enjoyoors technology (smart contracts, appchain, relayers)
Perform multiple audits and engage in public bug bounty programs plus white hack competitions. Integrate real-time monitoring and alert services with filters and thresholds catering to Enjoyoors use case.
Last updated