Security Considerations for Auditors
Mar 4 · 8 min read · The vectors below are specific to CCA's architecture. Some are documented by Uniswap itself, some emerge from the mechanism, and one was found by us during an audit of a protocol built on top of CCA.