Security model
This page is a public, engineering-style summary of SWT security decisions: what is enforced by immutable code, what is constrained by locks, and what risks still exist. It is not a formal third-party audit.
Security claims should be backed by evidence: contract source, on-chain locks, and verifiable on-chain activity.
Threat model
A concise threat model: common token failure modes and SWT mitigations.
Some risks are systemic (DEX liquidity, MEV, user mistakes) and cannot be fully eliminated.
LP positions are locked using locker contracts (NFT-based positions).
There is no mint function and no upgradeable proxy.
The fee is fixed by immutable contract rules and cannot be increased.
No privileged function can withdraw user SWT. Charity admin can only release USDT already swapped and held on-contract.
Like any DEX asset, SWT price can be moved in low-liquidity conditions.
Threat model is intentionally explicit: it reduces vague “security marketing” and makes assumptions reviewable.
Security assumptions
Some safety properties depend on user behaviour and external infrastructure. These assumptions define the boundaries of SWT security guarantees.
- Users verify the official contract address before interacting
- DEX trading risks (price impact, MEV, liquidity) are inherent to on-chain markets
- Wallet and private key security remains the user's responsibility
- Smart contract risk can be reduced but never fully eliminated
These assumptions are standard for public blockchain systems.
What is enforced (guarantees)
SWT is intended to behave as infrastructure: fixed parameters and no hidden admin levers.
- No proxy / no upgradeability
- No mint function (fixed supply)
- Fee cap cannot increase
- No privileged “drain user funds” function
Constraints that reduce common trust failures: liquidity removal and early-wallet surprises.
- LP NFTs locked until 2027-01-01
- Owner & reserve wallets time-locked until 2027-01-01
- Some operational wallets have enforced transfer limits
- Lock status is verifiable on-chain and in /api/stats
Known risks & limitations
These are not “bugs”. They are normal market properties of on-chain trading.
- Low liquidity can amplify price impact
- Primary/secondary pools may diverge temporarily
- MEV / sandwiching is possible on public mempools
Mitigation: trade small, verify pool depth, avoid rushing large market orders.
The most common losses are operational: wrong network, fake tokens, wrong approvals.
- Wrong token address / phishing links
- Wrong network (non-Polygon)
- Over-approving allowances to unknown contracts
See How to buy for a safety checklist.
Transparency log
A minimal list of verifiable security facts and disclosures..
| Event | Proof |
|---|---|
| LP positions locked | LP locker contract |
| Public self-audit & security disclosure | AUDIT-SELF.md |
| LP NFT lockers security note | LP-LOCKERS-SECURITY.md |
Frequently asked questions
This FAQ focuses on upgradeability, fee immutability, and residual risk. For general project design and governance structure, see About and Policy.
References & verification
Primary sources for verification and review.
SWT is built for humanitarian transparency — not investment speculation. If you see an issue, use the disclosure process in SECURITY.md.