Security
Deployed Programs
Each Exponent program has been thoroughly audited by multiple independent security firms.
Program Name | Description | Program ID |
---|---|---|
Exponent Core | Exponent’s Yield Stripping mechanism and Time-Dynamic AMM | ExponentnaRg3CQbW6dqQNZKXp7gtZ9DGMp1cwC4HAS7 |
Exponent marginfi Standard | Tokenizes marginfi positions. | XPMfipyhcbq3DBvgvxkbZY7GekwmGNJLMD3wdiCkBc7 |
Exponent Kamino Lend Standard | Tokenizes Kamino Lend positions. | XPK1ndTK1xrgRg99ifvdPP1exrx8D1mRXTuxBkkroCx |
Exponent Jito Restaking Standard | Wraps Jito Restaking’s VRT for compatibility with Exponent’s yield stripping and AMM | XPJitopeUEhMZVF72CvswnwrS2U2akQvk5s26aEfWv2 |
Exponent Perena USD* Standard | Wraps Perena USD* for compatibility with Exponent’s yield stripping and AMM | XPerenaJPyvnjseLCn7rgzxFEum6zX1k89C13SPTyGZ |
Exponent Generic Standard | Wraps a variety of DeFi markets and yield-bearing tokens (e.g. LSTs) for compatibility with Exponent | XP1BRLn8eCYSygrd8er5P4GKdzqKbC3DLoSsS5UYVZy |
Upgrade Authority Owner
All the deployed programs are governed by the Exponent multisig, which is managed by multiple core contributors. Learn more here.