Skip to main content
Outcome approaches security with transparency and defense in depth. Our contracts are open source, audited, and continuously monitored to protect user funds.

Code Review

Every change to the codebase goes through peer review. Reviews focus on correctness, security, and adherence to project standards before code is merged and deployed.

Monitoring

The protocol is watched by automated alerts and manual analysis. On‑chain activity and supporting infrastructure are continuously monitored so the team can respond quickly to any anomalies.

Disclosure Policy

We follow a responsible disclosure process. Please report vulnerabilities privately and give the team time to investigate and remediate before any public disclosure.

Bug Bounty Program

We encourage responsible disclosure from the security community. If you discover a potential vulnerability, please report it through our email.