Devnet

Protocol Address 6PnB...FtT2

Period Loading...Sale Loading...
Security center

Share Economy Protocol security model and resources

Protocol-focused security guidance for wallet safety, claim execution, verification surfaces, and support boundaries across the Share Economy Protocol.

Last updated: March 11, 2026Contact supportReport security issue

Protected by protocol design

  • Non-custodial wallet control for all participant actions.
  • Explicit on-chain state transitions for purchase, stake, and claim.
  • Public protocol accounts for configuration, vault balances, and claim paths.
  • Visible claim-readiness logic based on staked shares, funded assets, and period state.

Not guaranteed by protocol

  • Automatic guarantee of external project quality or token value.
  • Any profit, yield, or principal protection from buying shares.
  • Reversal of finalized blockchain transactions.
  • Protection from user wallet compromise or unsafe signing behavior.
  • Legal, tax, or jurisdiction-specific compliance outcomes for participants.
Legal boundaries

Transparent routing is not a return guarantee

  • Security content is informational and not legal, tax, investment, or financial advice.
  • Participation can involve loss of value and zero-distribution periods.
  • During Ponzi Time, buy flow is transparently redirected into revenue pools for shareholder claims.
  • Ponzi Time activates when total sold reaches 200,000 SHARE (200 x SHARE_TOKEN_WEEKLY_RELEASE_BASE_UNITS). This is 20% of total shares.
Responsible disclosure

Report a security concern

Send security concerns to:

contactus@currinfo.com

Target initial triage window: within 72 hours.

  • Include wallet address, cluster, transaction signature, and clear reproduction steps.
  • Do not send private keys, seed phrases, or wallet backups.
  • Use support channels for platform guidance and indexing issues, not transaction reversal requests.

For non-security product questions, use support.

Wallet safety

Signing checklist before every transaction

Check 1

Check the domain and route before connecting your wallet.

Check 2

Review every signature request carefully before approving it.

Check 3

Never share seed phrase, private keys, or recovery words with anyone.

Check 4

Use a hardware wallet for higher-value interactions when possible.

Check 5

Run a small-value test before larger share purchases or claims.

Resource set

Protocol security resources

Lifecycle rules, value-flow references, and public verification surfaces for protocol use.

Resource set

Operational security resources

Wallet safety, activity inspection, and practical guidance for daily usage.

Resource set

Policies and disclosures

Terms, privacy, and disclosure documents that define usage and support boundaries.