Security
Security Audit Links
For us, security is not a checklist item. It’s the foundation every feature is built upon.
Protocol security is broken down into two primary sections, security frameworks and processes, alongside security by design. Both are at the core of every action we take.
We utilize external security audit experts, such as Hacken, SoftStack, and HackenProof's Dual Defense program to ensure any potential issues are resolved before they have a chance to manifest. Combined with internal systems such as supply caps, decentralized price feeds, software logic, rigorous testing, and adherence to web security best practices, Strobe is committed to security as an ongoing effort, not a milestone to reach and be left behind.
In addition to this, Strobe has many built-in user security features to help ensure the protocol protects you by design. Overcollateralization to ensure solvency of the protocol, real-time health factor monitoring, liquidations, strict collateral asset requirements, and dynamic demand-driven interest rates. Together these ensure responsible use of the protocol isn't hidden behind invisible values or complex personal calculations. All the information you need to utilize your assets responsibly is presented clearly upfront. August 2025
July 2025
Last updated