# General risk disclosure

### Smart Contract Risk

Despite efforts to mitigate risks through testing, audits, and bug bounties, the possibility of vulnerabilities in smart contract code always remains a concern.

Smart contract risk pertains to weaknesses within the code of a blockchain protocol, potentially resulting in unforeseen or adverse consequences like security breaches or financial losses. Engaging smart contract auditors with each protocol version release can substantially mitigate these risks. These auditors meticulously inspect the contract code to preemptively detect any potential issues before they can be exploited. This proactive strategy ensures the security and proper functionality of smart contracts, thereby protecting both the protocol and its users from potential vulnerabilities.

<br>

### Black Swan&#x20;

A crypto black swan event refers to an unforeseeable occurrence within the cryptocurrency market that leads to a significant decrease in prices.

How can Hakifi be affected by Black Swan:&#x20;

The Claim Pool is the resource for funding payouts, financed by the Hakifi pool. In the case of Black Swan events, given that the number of Bear positions is larger than the Bull positions, the Claim Pool can be depleted quickly. This can result in insufficient Claim Amount that users are entitled to.&#x20;

To safeguard the user’s core benefits, the Hakifi Pool - the finance of the Claim Pool, is designated to be always 20% greater than the Margin Pool.

<br>

### Exchange Risk

Pricing of Hakifi is derived from the leading volume exchange and system operations involve various elements regarding other exchanges. This means that if the exchange fails, Hakifi faces the challenges of that failure.

To minimize this risk, Hakifi is diversifying third-party options. Our strategy might integrate several trusted liquidity sources, eliminating the risks of single-point failure.

### Phishing

Phishing and scams are prevalent occurrences, regardless of their association with blockchains.

In blockchain-related phishing scams, users may be deceived into disclosing private keys, seed phrases, or other sensitive information, or into authorizing malicious transactions.

When engaging with unfamiliar websites and validating transactions in your wallet, it's crucial to verify both the contract being interacted with and the operation being authorized.

<br>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://whitepaper.vnst.io/hakifi-documents/general-risk-disclosure.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
