CK Finance
Security

Security

CK Finance security architecture, audit status, and best practices.

Security

Security is foundational to CK Finance. Every design decision prioritizes user fund safety.

Core Principles

PrincipleImplementation
Non-CustodialCK App never holds private keys or user funds. All transactions are signed locally in your wallet.
No BackendSwap and bridge operations are executed client-side via LI.FI SDK. No CK server touches your funds.
Open SourceAll CK App code is publicly available for review.
Battle-Tested DependenciesBuilt on OpenZeppelin contracts, LI.FI protocol, and wagmi — all widely audited.

Smart Contract Security

CK Token (ERC-20)

PropertyDetail
BaseOpenZeppelin v5 ERC20 + ERC20Burnable + ERC20Permit
SupplyFixed 21,000,000 — no mint function exists
AdminOwner can only transfer initial allocation, no privileged mint/pause
PermitEIP-2612 for gasless approvals

CK Presale

PropertyDetail
BaseOpenZeppelin v5 ReentrancyGuard + Pausable + SafeERC20
ReentrancyAll buy/claim functions protected by ReentrancyGuard
PauseOwner can pause in emergencies, cannot access user funds
Token SafetyUses SafeERC20 for all token transfers
ClaimTokens locked until owner enables claim (TGE)

Underlying Protocols

CK App routes all swaps and bridges through established protocols via LI.FI:

ProtocolAuditors
LI.FI DiamondMultiple audits, active bug bounty
UniswapTrail of Bits, ABDK Consulting
AaveCertora, SigmaPrime, Trail of Bits
CurveTrail of Bits
StargateQuantstamp, Zellic
LidoMultiple independent audits

Architecture Security

Frontend

  • No private key storage — Keys never leave your wallet
  • No server communication for transactions — Direct blockchain interaction
  • Content Security Policy — XSS protection headers
  • Subresource Integrity — Verifying loaded scripts
  • HTTPS only — All communication encrypted via TLS

Infrastructure

  • Vercel deployment — DDoS protection, edge caching, automatic HTTPS
  • No database — No user data to breach
  • Environment variables — Secrets never exposed to client
  • Dependency scanning — Regular npm audit for vulnerable packages

Audit Status

ComponentStatusDetails
CK Token ContractInternal review completeOpenZeppelin standard, minimal custom code
CK Presale ContractInternal review completeTested with Foundry (15/15 tests passing)
FrontendContinuousAutomated dependency scanning
Formal AuditPlannedBefore mainnet presale launch

We recommend an independent formal audit before any mainnet deployment involving user funds. CK Finance is committed to completing this before the presale goes live on mainnet.

Bug Bounty Program

CK Finance maintains a responsible disclosure program:

SeverityRewardExamples
CriticalUp to $10,000Fund theft, unauthorized minting, contract takeover
HighUp to $5,000Token approval exploits, presale logic bypass
MediumUp to $2,000Frontend manipulation, incorrect pricing display
LowUp to $500UI bugs, non-critical information disclosure

Rules

  • Report vulnerabilities privately before public disclosure
  • Do not exploit vulnerabilities on mainnet
  • Provide clear reproduction steps
  • Allow reasonable time for remediation
  • Contact: security@ck.finance

Best Practices for Users

Wallet Safety

  • Use a hardware wallet (Ledger, Trezor) for large holdings
  • Never share your recovery phrase or private keys with anyone
  • Create a separate wallet for testing/small transactions

Transaction Safety

  • Always verify you're on ck.app (check the URL)
  • Review transaction details in your wallet before confirming
  • Start with small amounts when using a new feature
  • Check gas estimates — unusually high gas may indicate a problem

Phishing Prevention

  • CK Finance will never DM you asking for funds or keys
  • Official domains: ck.app, ck.finance, docs.ck.app
  • Verify smart contract addresses on the official documentation
  • Be cautious of fake tokens with similar names

General

  • Keep your browser and wallet extensions updated
  • Use a dedicated browser profile for DeFi
  • Enable 2FA on accounts linked to your crypto activities

On this page