Napier
WebsiteNapier InterfaceContributor Blog
  • Home
  • Introduction
  • Frequently Asked Question (FAQ)
  • Napier Protocol
    • Napier V1
    • Napier V2
      • Glossary - Napier v2
      • Yield Tokenization
        • Principal Token and Yield Token
        • Napier Factory
        • Market-Based Economics
        • Market-Based Governance
      • Trading Systems
      • Calculation
  • Points
    • Napier Point
    • Point Integration
    • Referral System
  • The NPR Token
  • Governance
    • Napier DAO
    • Napier Foundation
    • Napier Labs
    • Multisigs & Addresses
  • User Guide
    • User Dashboard
    • Mint and Redeem
    • Trade
    • Pool
    • Point
    • DeFi - Coming Soon
    • Calculator - Coming Soon
  • Curator Guide
    • Verify Your Account
    • Create a New Market
      • How to Choose a Resolver
    • Collect Curator Fee
    • Delegate Roles
    • Renounce All Roles
    • Transfer Full Ownership of a Market
    • Create a Pool Gauge
    • Integrate Your Market with a Point Program
    • Set up Reward Proxy
    • Add a Point Incentive
    • Monitor a Market
    • Emergency Pause a Market
    • Register DeFi Integrations - Coming Soon
    • Add a Token Incentive - Coming Soon
    • Educate Users - Coming Soon
    • Deploy a Lending System - Coming Soon
    • Deploy a Vault System - Coming Soon
  • Developer Guide
    • API
    • Deployment
  • Securing Napier
    • Technical Partners
      • How to Use HyperNative for Your Market Management
    • Bug Bounty
    • Risk Documentation
  • Education
    • User Education
    • Curator Education
  • Whitepaper
  • The Supreme Law of Napier
  • Marketing Policy
  • Napier Brand Guidelines
Powered by GitBook
On this page

Securing Napier

Work In Progress

PreviousDeploymentNextTechnical Partners

Security came first in every step of building Napier v2.

The vision for transitioning Napier into a modular protocol dates back to early 2024. Since then, various code designs have been explored as proof of concepts even before the official launch of Napier v1.

While it is common to develop a protocol and later bring in auditors to consider its security after it has been developed, but in the development of Napier v2, these processes were considered from various aspects.

  • : Industry-leading talented developers have contributed to building this codebase as technical partners

  • : Coming Soon

  • : An explanation of the potential risks when using Napier Protocol and its interface

Technical Partners
Bug Bounty
Risk Documentation