Security
Loop Strategy Vaults are built with security as a core principle, using only audited, battle-tested components and a modular architecture that minimizes proprietary risk.
Key Security Features
Protocol-Native Integrations — Loop strategies are executed via flash loans and a universal DEX module, leveraging the security guarantees of these audited protocols.
ERC-4626 Standard Vaults — SuperLoop architecture follows the ERC-4626 Tokenized Vault Standard, ensuring predictable and transparent asset accounting.
Modular Design — Borrowing, looping, and un-looping operations are implemented as independent modules, reducing complexity and limiting the attack surface.
Minimal Custom Logic — The majority of the logic relies on well-tested lending and DEX infrastructure. Superlend adds only the automation and configuration necessary to enable looping and de-leveraging.
Collateral Safety — Risk parameters (LTV, liquidation thresholds, max leverage) are enforced at the smart contract level to help prevent unsafe positions.
Permissionless Withdrawals — Users can exit positions or unwind loops at any time, with the vault handling the deleverage process automatically.
No Custodial Control — Funds remain in non-custodial smart contracts; Superlend never takes direct custody of user assets.
Audits & Testing
Loop Strategy Vaults has undergone internal and third-party security reviews prior to mainnet launch. All modules are continuously monitored, and any protocol dependency updates are carefully reviewed before integration.
All core contracts and strategy logic have been fully audited by Sherlock to ensure robust security before deployment.
Last updated