Security Considerations for Auditors
The vectors below are specific to CCA's architecture. Some are documented by Uniswap itself, some emerge from the mechanism, and one was found by us during an audit of a protocol built on top of CCA.
33audits.hashnode.dev8 min read