Security
Security is not an afterthought—it's the foundation of everything we build
Our Security Approach
Threeium handles execution and liquidity for protocols and users, making security paramount. We take a defense-in-depth approach with multiple layers of protection:
Security Audits
Professional security audits are a critical part of our launch process. We're committed to working with reputable security firms to thoroughly review all smart contract code before mainnet deployment.
When audit reports become available, they will be linked here. We encourage the community to review them and provide feedback.
Responsible Disclosure
We welcome security researchers to help us identify and fix vulnerabilities. If you discover a security issue, please report it responsibly.
Email: security@threeium.com
Response time: We aim to acknowledge reports within 48 hours and provide updates on remediation timelines.
What to Include
- Detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity assessment
- Your contact information for follow-up
Our Commitment
- We will not pursue legal action against good-faith security researchers
- We will work with you to understand and address the issue promptly
- We will publicly acknowledge your contribution (unless you prefer to remain anonymous)
Bug Bounty Program
A formal bug bounty program with rewards for discovered vulnerabilities is planned for post-launch. Details including scope, rewards, and rules will be announced closer to mainnet deployment.
Coming Soon: Structured bug bounty program with tiered rewards based on severity. Follow @ThreeiumLabs for announcements.
Best Practices for Users
While we work to ensure system security, users should also take precautions:
- Verify contract addresses: Only interact with addresses published on this official website and our verified X account
- Check social media: Be aware of impersonators. Our only official account is @ThreeiumLabs
- Start small: When first interacting with the system, test with small amounts
- Review parameters: Understand risk parameters and constraints before integrating
- Stay informed: Follow official channels for security updates and announcements