Security

In the DeFi space, we acknowledge the constant challenges posed by security, both at the project and individual levels. At Ignite, our commitment lies in offering a safer and more transparent trading platform, while also providing educational resources for newcomers to the DeFi space.

  1. IGNT Contract. The IGNT contract has implemented hard-coded 1-way actions to provide investors with complete confidence that no malicious actions can be taken. Our long-term plan involves reducing taxes gradually to reach a zero-tax status. Moreover, the IGNT contract has undergone auditing by SolidProof, a reputable and industry-recognized auditing service. Ignite Token Audit: https://github.com/solidproof/projects/blob/main/2023/Ignite%20The%20Chain/SmartContract_Audit_Solidproof_IgniteTheChain.pdf

  2. IgniteDeployer (ERC20 Token deployer) The IgniteDeployer offers project owners the capability to generate pre-audited contracts compatible with the Ignite Eco System. By providing a token deployer with audited contracts, we encourage users to opt for this solution, creating a generally safer trading environment compared to other DEXs. Ignite Deployer Audit: https://github.com/solidproof/projects/blob/main/2023/Ignite%20The%20Chain/SmartContract_Audit_Solidproof_IgnitechainFactory.pdf

  3. Development & Testing Our development process involves several meticulous steps to ensure smooth public releases. Initially, our developers and product management collaborate closely to develop and test concepts. As progress is made, our core team also participates in testing, followed by wider team involvement. Community testing is extended to eligible holders, and if necessary, we consult external companies, such as auditors, for additional assessments. Rigorous testing ensures that our products are released smoothly and well-received.

  4. User Awareness As part of our commitment to security, we are actively working on creating educational guides and content to help users understand potential risks and safeguard themselves. This proactive approach ensures that users are informed and equipped to handle any potential threats.

Last updated