Risk Disclosure

I. Introduction

If you have any questions or concerns regarding these Terms or the Products, please contact us at: Twyne Protocol Email: [email protected]

Purpose: This Risk Disclosure document is designed to inform users of the products, (including the Twyne Protocol, the EVC and the EVK), services and related information and materials offered by the Twyne Foundation, which includes twyne.xyz, app.twyne.xyz and the interface and related services that facilitate interaction with the Twyne Protocol (the "Protocol"), and including any vaults created by third parties using any the EVC or EVK, and derivative and ancillary products related thereto (collectively known as the "Products"),of the potential risks associated with using the Twyne Protocol (defined as including any product, service or application built using or incorporating any aspects of the protocol, including using any code, software, application or function published by or enabled by the Twyne, irrespective of the party or person who has deployed, designed, permitted access to, or in any way utilised it).

These disclosures aim to provide clarity on the inherent uncertainties and responsibilities involved in interacting with decentralised finance (DeFi) platforms.

Scope: The disclosures outlined herein apply to all interactions with the Twyne Protocol, including the use of its smart contracts, participation in its governance, and engagement with its associated services, including services deployed, designed, permitted access to, utilised, modified, or deployed by any third party.

General: The Twyne Protocol is a decentralised finance (DeFi) application designed to provide technology services. By engaging with the Twyne Protocol, you acknowledge and accept that you are participating in a highly experimental and rapidly evolving space.

The risks associated with protocols and applications like the Twyne Protocol are significant, and you should only use the Twyne Protocol if you fully understand these risks and can bear full losses.

Under no circumstances will Twyne be liable for any loss or damage resulting from your use of the Twyne Protocol.

II. Experimental Nature

Under no circumstances will Twyne be liable for any loss or damage resulting from your use of the Twyne Protocol.

III. General Risks

Volatility of Cryptocurrency Markets: The cryptocurrency markets are highly volatile, with prices fluctuating widely in short periods. This volatility can significantly affect the value of assets held within the Twyne Protocol, and a given person's ability to access services, products, transactions, or assets facilitated by the operation of the Twyne Protocol.

Regulatory Risks and Legal Uncertainty: The legal landscape for DeFi is evolving. Changes in regulations, positions of regulators, legislative enactments, or enforcement actions could impact your ability to use the Twyne Protocol or result in adverse legal consequences. Users should stay informed about the legal environment that may affect their use of digital assets, cryptocurrencies, digital assets wallets, DeFi, smart contracts and the Twyne Protocol and should comply with all applicable laws.

IV. Security Risks

Cyberattacks and Hacking: The Twyne Protocol, like all DeFi platforms, is susceptible to cyberattacks, hacking, and other security breaches. While we implement rigorous security measures, no system is entirely immune to threats. Risks include, but are not limited to, phishing, malware, distributed denial-of-service (DDoS) attacks, "zero days," and other malicious activities.

Smart Contract Vulnerabilities: Despite rigorous testing and auditing, smart contracts may still contain vulnerabilities, such as reentrancy attacks, front-running, timestamp manipulation, inherited vulnerabilities from third party libraries, and other potential exploits. Users should be aware that exploiting these vulnerabilities could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Nation-State and Black Hat Attacks: The Twyne protocol, like other blockchain systems, may be targeted by highly sophisticated cyberattacks from nation-state actors or "black hat" i.e. malicious hackers. These attackers may exploit known or unknown vulnerabilities, resulting in severe disruptions or loss of assets.

Unknown Vulnerabilities: As technology evolves, new vulnerabilities may be discovered that could affect the security of the Twyne protocol. These include potential risks from advances in cryptography, such as quantum computing, which could undermine current blockchain security measures. Although Twyne has undertaken reasonable, market standard practices to identify vulnerabilities in the Twyne Protocol, Twyne does not guarantee that the Twyne Protocol is free of any defect, flaw or vulnerability.

Risk of Theft: There is no assurance against the theft of digital assets due to sophisticated cyber-attacks or exploitation of vulnerabilities in the Twyne Protocol, the underlying infrastructure relied upon by the Twyne Protocol or users of the Twyne Protocol including digital assets wallets, blockchain(s), or associated third-party services, service providers, or functions not within Twyne's control. Such incidents could lead to the partial or complete loss of access to, control of or use of your assets.

Service Availability: The Twyne Protocol may experience downtime or become inaccessible due to maintenance, third-party service disruptions, attacks or compromises of third-party services or products, or blockchain network congestion, attacks or related issues. Twyne does not guarantee continuous availability or functionality of the Twyne Protocol, and users should be prepared for potential interruptions to access, or to functionalities provided by the Twyne Protocol.

V. Technical Risks

Software Bugs and Technical Failures: The Twyne Protocol operates on complex software that may contain bugs or experience failures, potentially leading to loss of assets, access to assets, or interruption of services. These risks may be increased by the rapid pace of technological change, which may introduce new unforeseen vulnerabilities or attack vectors that may impact the function, availability, and security of the Protocol.

Impact of Advances in Technology: Emerging technologies, such as quantum computing, may pose future risks to the security of blockchain-based systems and systems built upon and that rely on encryption of underlying systems, including the Twyne Protocol. Users should be aware that such advances could undermine the cryptographic security relied upon by the Twyne protocol.

Flawed Logic and Design: The underlying logic and design of the Twyne Protocol and related software may be flawed, defective, or impaired. This could result in the Protocol operating incorrectly or not as intended, leading to unintended transactions or losses of a loss of access to, control of, or use of assets, and significant financial losses.

VI. Protocol-Specific Risks

Smart Contract Risks: The Twyne Protocol's smart contracts are designed to be secure but are not infallible. Vulnerabilities may exist, and their exploitation could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Liquidation Risks: Similar to other collateralized systems, the Twyne Protocol is designed with user asset liquidation as part of its core functionalities. Such properties are likely to also exist in other products and services created by users of the Products. Users are expected to monitor the health of their positions, including accounts for collateral and borrowed assets, and their values. Failure to do so may result in liquidation by third parties which may be initiated programmatically or by third parties which may include the Company. Such liquidations are irreversible.

Functionality and Performance: Twyne does not guarantee continuous, uninterrupted, error-free, timely or expected operation of the Twyne Protocol. Users should be aware of potential issues that may impact its functionality and performance.

User Interface: Certain user interface elements or design decisions within the Twyne Protocol may be complex, confusing or unclear to some users, which may result in a User executing a different action or transaction than that user may have intended or desired. Users are advised to proceed with caution and verify their actions before finalising any transactions. Users may access documentation explaining the functions of the Twyne Protocol at https://docs.twyne.xyz/.

Governance Risks: Certain aspects of the Twyne Protocol may be governed by a decentralised community. Proposals made and accepted through documented governance processes (more info here: https://twyne.xyz/) could alter the protocol in ways that may affect users of the Twyne Protocol, its features, products, services, functionalities, and the transactions which may or may not be conducted using various aspects of the Twyne Protocol. These changes are outside the control of Twyne, and Twyne expressly disclaims any and all liability for any negative impacts resulting from governance decisions.

VII. Third-Party Risks

Reliance on Third-Party Services and Data: The Twyne Protocol may rely on third-party services, including smart contracts, oracles, and data feeds. Failures, flaws, delays, compromises, attacks on, manipulations of, and defects or inaccuracies in these third-party services could negatively impact the Twyne Protocol's operation or lead to incorrect or unexpected transaction executions and transaction execution outputs, and could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Third Party- related Risks: Certain functions within the Twyne Protocol or its underlying blockchain may depend on timely actions by third parties. Delays or failures of those Third Parties could result in inaccessibility of protocol functionality or loss of assets.

VIII. Open-Source and Experimental Technology

The Twyne protocol relies on open-source and experimental technology, and there are inherent risks associated with using DeFi services, products, applications and protocols built on this technology. These risks include, but are not limited to, smart contract vulnerabilities, potential loss of digital assets, and unforeseen interactions with other blockchain protocols or events, lack of warranties or other performance guarantees, lack of maintenance obligations, cyberattack vulnerabilities, and potential intellectual property infringement claims.

IX. User Responsibility

Legal Compliance: Users are solely responsible to ensure that their use of the Twyne Protocol complies with all applicable civil, criminal, and regulatory laws, regulations and duties, as may apply, including tax obligations, anti-money laundering (AML) regulations, and other relevant legal requirements applicable in their jurisdiction. Users must not use the Twyne Protocol in a manner that violates any duties, laws or regulations, including those related to AML, counter-terrorist financing, and trade sanctions. Users should not use the Twyne Protocol to avoid or circumvent compliance with any civil, criminal or regulatory law, duty, or obligation.

Self-Custody: Users are fully responsible for the security of their private keys and other credentials required to interact with their own assets and with the Twyne Protocol, and any product, system or application using any part of the Twyne Protocol. Any loss of access to private keys or other access credentials due to negligence or malicious activity is solely the user's responsibility, and Twyne Foundation cannot recover lost keys or reverse transactions.

Transaction Accountability: All transactions performed using the Twyne Protocol are final, irrevocable, and irreversible. Users must understand the implications of their transactions and should conduct thorough due diligence before interacting with the Twyne Protocol.

Securing Digital Assets: Users are responsible for securing their digital assets, including the use of secure digital asset wallets and should conduct appropriate information security practices to protect against unauthorised access. Loss or compromise of private keys or other access credentials can result in irreversible and complete loss of access to, control of or use of assets.

Due Diligence and Professional Advice: Users should conduct thorough research and consider seeking professional financial, legal, tax, and technological advice before engaging with the Twyne Protocol.

X. Legal Uncertainty

Impact of Legal Changes: The DeFi space is subject to potential legal changes that could affect the legality and functionality of the Twyne Protocol. Users should be prepared for such changes and ensure compliance with all relevant civil, criminal and regulatory legal obligations related to the ownership and control of digital assets, and the use of the Twyne Protocol.

Legal Risks and Compliance: Our activities are subject to various laws and regulations in the countries where we operate. Regulatory actions, orders, or inquiries may adversely affect the Twyne Protocol and its availability. Additionally, changes in applicable laws or evolving interpretations of existing laws could increase compliance costs, impact the Twyne Protocol's functionality, or necessitate the acquisition of specific licences.

XI. No Professional Advice or Fiduciary Duties

Information Disclaimer: All information provided by Twyne Foundation and its affiliates, whether on its websites, platforms, or communications, is intended for informational purposes only. It does not constitute financial, legal, or professional advice, and should not be relied upon as such. Users are encouraged to seek independent professional advice tailored to their specific circumstances before making any financial decisions related to the use of the Twyne Protocol.

No Fiduciary Relationship: Twyne Foundation does not act as an advisor or fiduciary to any user. Neither the Twyne Foundation nor the Twyne Protocol nor its governors owe any fiduciary duties to users, and by using the Twyne Protocol, users agree that they alone are responsible for their financial decisions and actions.

XII. Assumption of Risks and Limitation of Liability

User Assumption of Risk: By using the Twyne Protocol, users acknowledge and accept all associated risks, including those related to the security, functionality, and regulatory environment of the Twyne Protocol. Users acknowledge that participating in DeFi involves significant risks, and they should only engage with the Twyne Protocol if they are fully aware of and willing to accept these risks.

Limitation of Liability: To the fullest extent permitted by law, Twyne Foundation and its representatives are not liable for any losses, damages, or claims arising from the use of the Twyne Protocol. This includes, but is not limited to, losses resulting from security breaches, regulatory actions, service interruptions, or any other risks described in this risk disclosure. Users agree to hold Twyne harmless from any claims or liabilities related to their use of the Twyne Protocol.

XIII. Incident Reporting and Transparency

Incident Disclosures: Twyne is committed to transparency. Any significant incidents, such as security breaches, manipulation attempts, or major protocol failures, will be disclosed to the community promptly. However, Twyne cannot guarantee the prevention of such incidents and disclaims all liability for any losses arising from them.

XIV. Mitigation Strategies

Audits and Security Measures: The Twyne Protocol has undergone extensive security audits by third-party firms. Additionally, Twyne Foundation operates a bug bounty program to encourage the identification and reporting of vulnerabilities. While these measures are in place to enhance security, they do not eliminate all risks, and it's imperative that users remain vigilant.

Acknowledgment of Risks

By using the Twyne Protocol, you acknowledge that you have read, understood, and agree to this risk disclosure policy. You accept all risks associated with using the protocol and agree that Twyne is not liable for any losses or damages, whether direct or indirect, arising from your use of the protocol.

Last updated: January 16, 2025