# Technical Partners

Napier v2 runs on purpose-built contracts. We treat security as a product feature and brought in top builders and reviewers to protect user funds.

### Commitment to Security

* We consulted Erik Arfvidson and Kasper Pawlowski — key operators behind Euler’s daily security opeerations. They oversaw a \~$4M security budget for Euler v2 and coordinated external partners across audits and response workflows.
* Architecture & gas efficiency: We engaged vectorized.eth (creator of Solady) to harden core architecture and improve gas efficiency.

### Code Audit and Review

We commissioned multiple rounds of code reviews, security audits, formal verification, and code competitions with industry leaders including Cantina, Spearbit (Cmichel, Kurt), Sherlock, Pashov Audit Group, Winney and yAudit.

For an in-depth look at these audits, please see below.

<table><thead><tr><th width="117.59375">Date</th><th width="166.421875">Findings</th><th width="165.69921875">Scope</th><th>Security firm</th><th>URL</th></tr></thead><tbody><tr><td>Nov 2024</td><td><p>Critical: 0</p><p>High: Non</p><p>Medium: None</p><p>Low: 12</p></td><td><code>Code reviews</code>, <code>Security audits</code></td><td>yAudit<br>(panda, adriro)</td><td><a href="https://reports.electisec.com/2024-11-napier">Electisec Napier V2 Review</a></td></tr><tr><td>Dec 2024</td><td><p>Critical: 0</p><p>High: 3</p><p>Medium: None</p><p>Low: 3</p></td><td><code>Code reviews</code>, <code>Security audits</code></td><td>Winnie</td><td><a href="https://xuwinnie.review/reports/napier-v2-audit-report">Napier v2 Audit Report</a></td></tr><tr><td>Jan 2025</td><td>-</td><td><code>Code reviews</code><br> , <code>Gas optimization</code></td><td>Vectorized.eth</td><td><div><figure><img src="https://4277771176-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGPkrMXT982thgzhBdzF8%2Fuploads%2FflYixfT06NLswd1kFkJr%2Fimage.png?alt=media&#x26;token=62bbcb05-760a-49ab-9d38-f3587b0384fa" alt=""><figcaption></figcaption></figure></div></td></tr><tr><td>Feb 2025</td><td><p>Critical: 0</p><p>High: 1</p><p>Medium: 2</p><p>Low: 4</p></td><td><code>Security audits</code></td><td>Spearbit (Cmichel, Kurt)</td><td><a href="https://drive.google.com/file/d/1t6UNLrFcLetNA20Eh_8UfmynilpgjPwh/view?usp=drive_link">Sperabit Napier Protocol</a></td></tr><tr><td>Feb 2025</td><td><p>Critical: 0</p><p>High: 1</p><p>Medium: 2</p><p>Low: 4</p></td><td><code>Security audits</code></td><td>Cantina</td><td><a href="https://cantina.xyz/competitions/58cd719b-9004-4eca-a113-41d1691c0711">napier-v2 competitions</a></td></tr><tr><td>Sep 2025</td><td><p>Critical: 0</p><p>High: 0</p><p>Medium: 0</p><p>Low: 11</p></td><td><code>Security audits</code></td><td>Sherlock</td><td><a href="https://drive.google.com/file/d/1FSwhX1lA4uN0pRZ5ADPwGjpzClnKm7Xn/view?usp=sharing">Sherlock Napier v2 Napier AMM</a></td></tr><tr><td>Oct 2025</td><td><p>Critical: 0</p><p>High: 0</p><p>Medium: 1</p><p>Low: 18</p></td><td><code>Security audits</code></td><td>Pashov Audit Group</td><td><a href="https://github.com/pashov/audits/blob/master/team/pdf/Napier-security-review_2025-09-30.pdf">Pashov Napier v2 Napier AMM</a></td></tr><tr><td>Feb 2026</td><td><p>Critical: 0</p><p>High: 0</p><p>Medium: 0</p><p>Low: 5</p></td><td><code>Security audits</code></td><td>Pashov Audit Group</td><td><a href="https://drive.google.com/file/d/1SnKP90WT-NpV4pmj_dqjl-1L5spmFcsN/view?usp=drive_link">Pashov Napier v2 Napier AMM</a></td></tr></tbody></table>

### Incident Readiness & Runtime Controls

We partner with specialized security vendors to prepare for edge cases—e.g., third-party asset depegs or malicious-transaction scenarios:

* **Tenderly:** Transaction simulation, debugging, and monitoring for rapid incident triage.
* **HyperNative:** Real-time risk signals and policy actions for market management (see: *How to Use HyperNative for Your Market Management*).
