# Security

<figure><img src="https://2437159720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FN6q1bVEIwJ69YdzhGzDS%2Fuploads%2FSOKbBHSj00ZM1Ov9K5Uz%2F16.png?alt=media&#x26;token=f9ef3d15-49e6-4ac2-a88b-f56abd37156a" alt=""><figcaption></figcaption></figure>

Clip Finance is dedicated to ensuring the security of its users. Our preventative strategies include multiple third-party code audits, protocol insurance funds, and a bug bounty program. We've also implemented risk mitigation techniques to proactively monitor safety and security as the Clip ecosystem expands.

## Audits

The Clip Finance code is audited by Three Sigma. The audit report is uploaded as a PDF.&#x20;

{% file src="<https://2437159720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FN6q1bVEIwJ69YdzhGzDS%2Fuploads%2FJNhFanoUHNuvFnEdpV5P%2FClip%20Finance%20Core.pdf?alt=media&token=e7e405dd-de25-4555-8469-c87c9587b375>" %}

Automated liquidity management component

{% file src="<https://2437159720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FN6q1bVEIwJ69YdzhGzDS%2Fuploads%2FCQfxLUe9oMF5gMCZCHDS%2FClip%20Finance%20PCLBaseSwapInside.pdf?alt=media&token=f1c28f30-03d0-49a2-88e7-aeaf5c148be9>" %}

{% hint style="info" %}
Public references of audits <https://github.com/threesigmaxyz/publications>
{% endhint %}

## Protocol Insurance

Clip will have an insurance and recovery fund to protect users in the case of an exploit. As our TVL increases, we will also be implementing third-party insurance to further protect investors.

Our insurance fund is funded by the protocol revenues. If any of the risks realize and Clip's protocol or any of the external protocols are exploited, the insurance fund is used to cover the losses of our users. If the insurance fund can't cover the losses, we'll deploy the recovery fund. The recovery fund (also funded by the protocol revenues) will distribute payments to the affected users on a pro-rata basis for up to three years or until the loss has been reimbursed. The size of the payments depends on the protocol revenue, as a fixed percentage of the revenue is directed to the recovery fund.

## Risk Scoring Matrix

All strategies are assessed by our comprehensive risk-scoring matrix. The resulting score heavily influences the strategies we choose to deploy. More details on this matrix can be[ read here. ](https://docs.clip.finance/clip-finance-yield-strategies/risk-scoring-matrix)

## Bug Bounty

Clip believes its preventative measures and risk mitigation strategies will be effective. That said, when it comes to protocol security - you can never be too careful.&#x20;

Our code is 100% open-source, enabling the community to identify concerns and provide feedback on our contracts. On top of this, we will have a bug bounty program which will be announced before the launch. This will financially incentivize white hat hackers to search for imperfections in our protocol.&#x20;


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.clip.finance/about-us/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
