ZetariumDocs

Audit Reports

Smart contract security audits

Audit Reports

Document Version: 1.0
Last Updated: January 2026


Overview

Security is Zetarium's top priority. All smart contracts undergo rigorous third-party security audits before mainnet deployment. This page provides transparency into our security practices and audit history.


Audit Partners

Zetarium works with leading blockchain security firms:

AuditorExpertiseWebsite
CertikSmart contract security, formal verificationcertik.com
CoinsultDeFi protocol auditscoinsult.net

Completed Audits

Zet Swap (ZetExecutor)

ParameterDetails
AuditorCoinsult
DateQ3 2025
ScopeSwap execution, token handling, fee mechanism
FindingsAll critical issues resolved
StatusPassed

Staking Platform

ParameterDetails
AuditorCoinsult
DateQ3 2025
ScopePool creation, reward distribution, emergency functions
FindingsAll critical issues resolved
StatusPassed

Bond System

ParameterDetails
AuditorCoinsult
DateQ3 2025
ScopeToken sales, vesting logic, claim mechanism
FindingsAll critical issues resolved
StatusPassed

Prediction Market

ParameterDetails
AuditorIn Progress
DateQ1 2026
ScopeMarket creation, oracle system, settlement logic
StatusIn Progress

Security Measures

Smart Contract Security

MeasureImplementation
Reentrancy GuardsOpenZeppelin ReentrancyGuard on all state-changing functions
Access ControlRole-based permissions with Ownable2Step
Safe MathSolidity 0.8+ native overflow protection
Safe TransfersSafeERC20 for all token operations

Operational Security

MeasureImplementation
Multi-SignatureTreasury and admin functions require multiple signatures
TimelockCritical parameter changes have mandatory delay
Emergency PauseAbility to pause contracts in case of emergency
Rate LimitingProtection against flash loan attacks

Bug Bounty Program

Zetarium operates an active bug bounty program to incentivize responsible disclosure.

Reward Tiers

SeverityReward Range
CriticalUp to $50,000
HighUp to $20,000
MediumUp to $5,000
LowUp to $1,000

Scope

In ScopeOut of Scope
Smart contractsFrontend issues
Core protocol logicThird-party integrations
Oracle mechanismsSocial engineering
Access controlDoS attacks

Submission Process

  1. Discover vulnerability
  2. Document with proof of concept
  3. Submit via official security contact
  4. Allow 48 hours for initial response
  5. Coordinate disclosure timeline
  6. Receive bounty after fix deployment

Incident Response

In case of a security incident:

  1. Detection: Automated monitoring alerts team
  2. Assessment: Severity evaluation within 1 hour
  3. Containment: Emergency pause if necessary
  4. Communication: User notification within 24 hours
  5. Resolution: Fix deployment and verification
  6. Post-Mortem: Public report on incident and response

Contact

For security-related inquiries:

ChannelContact
Security Emailsecurity@zetarium.world
Bug ReportsReport Form

Zetarium is committed to maintaining the highest security standards. We continuously improve our security practices based on industry developments and community feedback.

On this page