# Security

The security of the protocol is our highest priority, dForce development team works closely with third-party auditors and formal verification teams to ensure that the protocols match the highest security standards.

### Audits

{% hint style="success" %}
[**ConsenSys Deligence&#x20;*****Audit*****&#x20;- April 2021**](https://consensys.net/diligence/audits/2021/03/dforce-lending-protocol-review/)
{% endhint %}

{% hint style="success" %}
[**Trail of Bits&#x20;*****Audit*****&#x20;- March 2021**](https://github.com/dforce-network/documents/blob/master/audit_report/Lending/dForceLending-Audit-Report-TrailofBits-Mar-2021.pdf)
{% endhint %}

{% hint style="success" %}
[**Certora&#x20;*****Formal Verification*****&#x20;- March 2021**](https://www.certora.com/pubs/dForceFeb2021.pdf)
{% endhint %}

{% hint style="success" %}
[**Certik&#x20;*****Audit*****&#x20;- February 2021**](https://www.certik.org/projects/dforce)
{% endhint %}

### Bug Bounty

We encourage the hunting of bugs and potential exploits in our protocols, Refer to our [bug bounty program](https://docs.dforce.network/devs/bug-bounty) for details.
