Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.monolith.market/llms.txt

Use this file to discover all available pages before exploring further.

Security at Monolith

Security is treated as a foundational design constraint rather than an afterthought. Monolith’s contract architecture is intentionally minimal and its immutability model is designed to reduce the ongoing attack surface over time — once a deployed instance reaches its immutability deadline, its core monetary policy parameters lock permanently, eliminating a broad class of governance and upgrade risk. Monolith’s core protocol contracts have been reviewed across four independent security engagements: a private audit by Electisec, an initial private assessment by ChainSecurity, a public audit contest on Sherlock, and a re-audit by ChainSecurity covering all subsequent protocol changes. The ChainSecurity re-audit final report is pending publication. A live bug bounty program is hosted on Sherlock.

Security Documentation

Security Audits

Review third-party security audits and code reviews conducted on Monolith smart contracts.

Bug Bounty Program

Learn about our live bug bounty program on Sherlock and how to report vulnerabilities.

Risk Disclosures

Understand the risks associated with using Monolith stablecoins and the protocol.