Each Exponent program has been thoroughly audited by multiple independent security firms.

Program NameDescriptionProgram ID
Exponent CoreExponent’s Yield Stripping mechanism and Time-Dynamic AMMExponentnaRg3CQbW6dqQNZKXp7gtZ9DGMp1cwC4HAS7
Exponent marginfi StandardTokenizes marginfi positions.XPMfipyhcbq3DBvgvxkbZY7GekwmGNJLMD3wdiCkBc7
Exponent Kamino Lend StandardTokenizes Kamino Lend positions.XPK1ndTK1xrgRg99ifvdPP1exrx8D1mRXTuxBkkroCx
Exponent Jito Restaking StandardWraps Jito Restaking’s VRT for compatibility with Exponent’s yield stripping and AMMXPJitopeUEhMZVF72CvswnwrS2U2akQvk5s26aEfWv2

Upgrade Authority Owner

All the deployed programs are governed by the Exponent multisig, which is managed by multiple core contributors. Learn more here.