Disclaimer
General Disclaimer
This technical documentation is provided for informational purposes only and describes the technical architecture and functionality of the Octant protocol. Nothing contained herein constitutes investment, legal, tax, or financial advice. The information presented is not a recommendation to participate in any protocol, strategy, or transaction. Users should consult their own legal, financial, and tax advisors before engaging with any DeFi protocol.
Third-Party Protocol Risks
Octant does not provide yield-generating services. The Octant protocol serves as infrastructure that connects users to third-party DeFi protocols and strategies. All yield generation occurs through external protocols (such as Ethereum staking services, lending protocols, DEXs, etc.) that carry their own inherent risks including but not limited to:
- Smart contract vulnerabilities and exploits
- Protocol insolvency or failure
- Governance attacks or malicious proposals
- Oracle manipulation and price feed failures
- Liquidity crises and impermanent loss
- Changes to third-party protocol parameters or functionality
Octant makes no representations about the safety, suitability, or performance of any integrated third-party protocol. Users bear full responsibility for evaluating and monitoring the risks of any external protocols they interact with through Funding Vaults.
General DeFi and Smart Contract Risks
Participation in DeFi protocols involves substantial risk, including:
- Smart contract risk: Code may contain bugs, vulnerabilities, or unintended behavior
- Composability risk: Interactions between protocols may produce unexpected outcomes
- Network risk: Blockchain congestion, reorganizations, or consensus failures
- Regulatory risk: Changing regulations may affect protocol availability or legality
- Economic risk: Token volatility, systemic cascades, and market manipulation
- Upgrade risk: Protocol changes may alter functionality or economics
The Octant protocol, while audited, may contain undiscovered vulnerabilities. No audit can guarantee complete security.
Wallet and Private Key Risks
Users maintain sole responsibility for securing their wallets and private keys. Consider that:
- Lost or compromised private keys result in permanent loss of funds with no possibility of recovery
- Octant cannot recover, reset, or retrieve lost keys or funds
- Wallet software may contain vulnerabilities
- Phishing, malware, and social engineering attacks are common
- Hardware wallet failure can result in loss of access
- Multi-signature configurations require careful coordination and backup procedures
Users should implement appropriate operational security measures including but not limited to: secure key storage, backup procedures, multi-signature setups where appropriate, and regular security audits.
Jurisdictional and Regulatory Notice
The Octant protocol may not be available or appropriate for use in all jurisdictions. Users are responsible for determining whether their participation is lawful in their jurisdiction. This documentation and the Octant protocol are not intended for use by residents of sanctioned jurisdictions.
Technical Documentation Accuracy
While we strive for accuracy, this documentation may contain errors, become outdated, or not reflect the current state of deployed smart contracts. Users should verify all critical information independently and review the actual smart contract code before interaction.
Assumption of Risk
By interacting with the Octant protocol, users acknowledge they understand and voluntarily assume all associated risks. Users confirm they have the necessary technical knowledge to evaluate DeFi protocols and understand that they may lose some or all of their funds.