AsterVaults
SECURITY

Security First

AsterVaults is built with security as a foundation. Non-custodial architecture, audited contracts, and fully decentralized infrastructure.

NON-CUSTODIAL

Your Keys, Your Funds

Managers never have access to withdraw investor funds. All assets are held in smart contracts with strict access controls.

Smart Contract Custody

All deposits are held in audited vault contracts. No human can access funds outside of defined rules.

No Manager Withdrawals

Managers can only execute trades on Aster DEX. Withdrawals go directly to depositor wallets.

Direct Redemptions

Withdraw your funds anytime. Instant access up to liquidity reserve, queue for larger amounts.

AUDIT STATUS

Contract Audits

Audit In Progress

Our smart contracts are currently undergoing security audits. We take security seriously and will not launch on mainnet until audits are complete and all findings are addressed.

Vault Core Contracts
DEX Integration
Fee Distribution

Internal Security Review

Complete

External Audit

In Progress

Bug Bounty Program

Coming Soon

OPEN SOURCE

Transparent Code

All smart contracts are open source and verified on-chain. Anyone can review the code that secures your funds.

astervaults/contracts

View source code, deployment addresses, and contract documentation

100%

Test Coverage

Solidity

Language

MIT

License

Verified

On-Chain

INFRASTRUCTURE

Fully Decentralized

No central servers. No single point of failure. AsterVaults runs entirely on decentralized infrastructure.

IPFS Frontend

The web interface is hosted on IPFS (InterPlanetary File System). Content-addressed and distributed across thousands of nodes worldwide.

On-Chain Data

All vault data, positions, and transactions live on the blockchain. Indexed via The Graph for fast queries without centralized databases.

IPFS Metadata

Vault names, descriptions, and manager profiles stored on IPFS. Immutable and censorship-resistant content storage.

No Single Point of Failure

No company server can be taken down. The protocol continues to function as long as Aster Chain is running.

RESPONSIBLE DISCLOSURE

Found a Vulnerability?

We take security reports seriously. If you've discovered a potential vulnerability, please report it responsibly. Do not disclose publicly until we've had time to address it.

Email security issues to

security@astervaults.com

Response time

Within 48 hours

Please include detailed reproduction steps, affected components, and potential impact. We appreciate responsible security researchers helping keep AsterVaults safe.