Resources
Deployed Programs
Each Exponent program has been thoroughly audited by multiple independent security firms.
Program Name | Description | Program ID |
---|---|---|
Exponent Core | Exponent’s Yield Stripping mechanism and Time-Dynamic AMM | ExponentnaRg3CQbW6dqQNZKXp7gtZ9DGMp1cwC4HAS7 |
Exponent marginfi Standard | Tokenizes marginfi positions. | XPMfipyhcbq3DBvgvxkbZY7GekwmGNJLMD3wdiCkBc7 |
Exponent Kamino Lend Standard | Tokenizes Kamino Lend positions. | XPK1ndTK1xrgRg99ifvdPP1exrx8D1mRXTuxBkkroCx |
Exponent Jito Restaking Standard | Wraps Jito Restaking’s VRT for compatibility with Exponent’s yield stripping and AMM | XPJitopeUEhMZVF72CvswnwrS2U2akQvk5s26aEfWv2 |
Upgrade Authority Owner
All the deployed programs are governed by the Exponent multisig, which is managed by multiple core contributors. Learn more here.