Risk Disclosure Statement

Updated and effective: 16 January 2025

I. Introduction

Purpose: This Risk Disclosure document is designed to inform users of the products, (including the Wildcat Protocol), services and related information and materials offered by the Wildcat Foundation, which includes wildcat.finance, app.wildcat.finance and the interface and related services that facilitate interaction with the Wildcat Protocol (the "Protocol"), and including any markets created by third parties, and derivative and ancillary products related thereto (collectively known as the "Products"), of the potential risks associated with using the Wildcat Protocol (defined as the protocol launched by the Wildcat Foundation and expressly including any product, service or application built using or incorporating any aspects of the protocol, including using any code, software, application or function published by or enabled by the Wildcat Foundation, irrespective of the party or person who has deployed, designed, permitted access to, or in any way utilised it).

These disclosures aim to provide clarity on the inherent uncertainties and responsibilities involved in interacting with decentralised finance (DeFi) platforms.

Scope: The disclosures outlined herein apply to all interactions with the Wildcat Protocol, including the use of its smart contracts, participation in its development and/or governance, and engagement with its associated services, including services deployed, designed, permitted access to, utilised, modified, or deployed by any third party.

General: The Wildcat Protocol is a decentralised finance (DeFi) application designed to provide technology services. By engaging with the Wildcat Protocol, you acknowledge and accept that you are participating in a highly experimental and rapidly evolving space.

The risks associated with protocols and applications like the Wildcat Protocol are significant, and you should only use the Wildcat Protocol if you fully understand these risks and can bear full losses.

Under no circumstances will Wildcat be liable for any loss or damage resulting from your use of the Wildcat Protocol.

II. Experimental Nature

The Wildcat Protocol and all related software, including blockchain technology, smart contracts, markets, and digital asset wallets are experimental and in continuous development. The Wildcat Protocol is provided "As Is" "Where Is" and "As Available" without any warranties, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement. Users should be aware that the experimental nature of the Wildcat Protocol could lead to unexpected outcomes, including the total loss of assets that interact with the Wildcat Protocol.

III. General Risks

Volatility of Cryptocurrency Markets: The cryptocurrency markets are highly volatile, with prices fluctuating widely in short periods. This volatility can significantly affect the value of assets held within the Wildcat Protocol, and a given person's ability to access services, products, transactions, or assets facilitated by the operation of the Wildcat Protocol.

Regulatory Risks and Legal Uncertainty: The legal landscape for DeFi is evolving. Changes in regulations, positions of regulators, legislative enactments, or enforcement actions could impact your ability to use the Wildcat Protocol or result in adverse legal consequences. Users should stay informed about the legal environment that may affect their use of digital assets, cryptocurrencies, digital assets wallets, DeFi, smart contracts and the Wildcat Protocol and should comply with all applicable laws.

IV. Security Risks

Cyberattacks and Hacking: The Wildcat Protocol, like all DeFi platforms, is susceptible to cyberattacks, hacking, and other security breaches. While we implement rigorous security measures, no system is entirely immune to threats. Risks include, but are not limited to, phishing, malware, distributed denial-of-service (DDoS) attacks, "zero days," and other malicious activities.

Smart Contract Vulnerabilities: Despite rigorous testing and auditing, smart contracts may still contain vulnerabilities, such as reentrancy attacks, front-running, timestamp manipulation, inherited vulnerabilities from third party libraries, and other potential exploits. Users should be aware that exploiting these vulnerabilities could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Nation-State and Black Hat Attacks: The Wildcat Protocol, like other blockchain systems, may be targeted by highly sophisticated cyberattacks from nation-state actors or "black hat" i.e. malicious hackers. These attackers may exploit known or unknown vulnerabilities, resulting in severe disruptions or loss of assets.

Unknown Vulnerabilities: As technology evolves, new vulnerabilities may be discovered that could affect the security of the Wildcat protocol. These include potential risks from advances in cryptography, such as quantum computing, which could undermine current blockchain security measures. Although Wildcat has undertaken reasonable, market standard practices to identify vulnerabilities in the Wildcat Protocol, Wildcat does not guarantee that the Wildcat Protocol is free of any defect, flaw or vulnerability.

Risk of Theft: There is no assurance against the theft of digital assets due to sophisticated cyber-attacks or exploitation of vulnerabilities in the Wildcat Protocol, the underlying infrastructure relied upon by the Wildcat Protocol or users of the Wildcat Protocol including digital assets wallets, blockchain(s), or associated third-party services, service providers, or functions not within Wildcat's control. Such incidents could lead to the partial or complete loss of access to, control of or use of your assets.

Service Availability: The Wildcat Protocol may experience downtime or become inaccessible due to maintenance, third-party service disruptions, attacks or compromises of third-party services or products, or blockchain network congestion, attacks or related issues. Wildcat does not guarantee continuous availability or functionality of the Wildcat Protocol, and users should be prepared for potential interruptions to access, or to functionalities provided by the Wildcat Protocol.

V. Technical Risks

Software Bugs and Technical Failures: The Wildcat Protocol operates on complex software that may contain bugs or experience failures, potentially leading to loss of assets, access to assets, or interruption of services. These risks may be increased by the rapid pace of technological change, which may introduce new unforeseen vulnerabilities or attack vectors that may impact the function, availability, and security of the Protocol.

Impact of Advances in Technology: Emerging technologies, such as quantum computing, may pose future risks to the security of blockchain-based systems and systems built upon and that rely on encryption of underlying systems, including the Wildcat Protocol. Users should be aware that such advances could undermine the cryptographic security relied upon by the Wildcat protocol.

Flawed Logic and Design: The underlying logic and design of the Wildcat Protocol and related software may be flawed, defective, or impaired. This could result in the Protocol operating incorrectly or not as intended, leading to unintended transactions or losses of a loss of access to, control of, or use of assets, and significant financial losses.

VI. Protocol-Specific Risks

Smart Contract Risks: The Wildcat Protocol's smart contracts are designed to be secure but are not infallible. Vulnerabilities may exist, and their exploitation could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Counterparty/Default Risk: The Wildcat Protocol involves undercollateralised lending, and this comes with risk of the borrower defaulting or otherwise refusing to return collateral to a market deployed through the protocol when asked. Users are expected to have performed their desired level of due diligence and research on their counterparties in order to determine creditworthiness. In the event of a default, there may be substantial or total loss of assets for Users, depending on the reserve ratio of a given market and withdrawal queue ordering.

Malicious Parameter Adjustment: The ability to adjust parameters of a market is one that can only be invoked by the deployer of a market - the borrower. Regardless of any off-chain agreement that may be in place, the borrower has the power to change these at will, and while there are some lender-oriented safeguards in place (such as potentially requiring a temporarily increased reserve ratio when reducing the APR, as documented at https://docs.wildcat.finance), Wildcat itself cannot prevent or revert such adjustments.

Functionality and Performance: Wildcat does not guarantee continuous, uninterrupted, error-free, timely or expected operation of the Wildcat Protocol. Users should be aware of potential issues that may impact its functionality and performance.

User Interface: Certain user interface elements or design decisions within the Wildcat Protocol may be complex, confusing or unclear to some users, which may result in a User executing a different action or transaction than that user may have intended or desired. Users are advised to proceed with caution and verify their actions before finalising any transactions. Users may access documentation explaining the functions of the Wildcat Protocol at https://docs.wildcat.finance.

VII. Third-Party Risks

Reliance on Third-Party Services and Data: The Wildcat Protocol may rely on third-party services, including smart contracts, oracles, and data feeds. Failures, flaws, delays, compromises, attacks on, manipulations of, and defects or inaccuracies in these third-party services could negatively impact the Wildcat Protocol's operation or lead to incorrect or unexpected transaction executions and transaction execution outputs, and could lead to a loss of access to, control of, or use of assets, and significant financial losses.

Third Party-related Risks: Certain functions within the Wildcat Protocol or its underlying blockchain may depend on timely actions by third parties. Delays or failures of those Third Parties could result in inaccessibility of protocol functionality or loss of assets.

VIII. Open-Source and Experimental Technology

The Wildcat protocol relies on open-source and experimental technology, and there are inherent risks associated with using DeFi services, products, applications and protocols built on this technology. These risks include, but are not limited to, smart contract vulnerabilities, potential loss of digital assets, and unforeseen interactions with other blockchain protocols or events, lack of warranties or other performance guarantees, lack of maintenance obligations, cyberattack vulnerabilities, and potential intellectual property infringement claims.

IX. User Responsibility

Legal Compliance: Users are solely responsible to ensure that their use of the Wildcat Protocol complies with all applicable civil, criminal, and regulatory laws, regulations and duties, as may apply, including tax obligations, anti-money laundering (AML) regulations, and other relevant legal requirements applicable in their jurisdiction. Users must not use the Wildcat Protocol in a manner that violates any duties, laws or regulations, including those related to AML, counter-terrorist financing, and trade sanctions. Users should not use the Wildcat Protocol to avoid or circumvent compliance with any civil, criminal or regulatory law, duty, or obligation.

Self-Custody: Users are fully responsible for the security of their private keys and other credentials required to interact with their own assets and with the Wildcat Protocol, and any product, system or application using any part of the Wildcat Protocol. Any loss of access to private keys or other access credentials due to negligence or malicious activity is solely the user's responsibility, and Wildcat Foundation cannot recover lost keys or reverse transactions.

Transaction Accountability: All transactions performed using the Wildcat Protocol are final, irrevocable, and irreversible. Users must understand the implications of their transactions and should conduct thorough due diligence before interacting with the Wildcat Protocol.

Securing Digital Assets: Users are responsible for securing their digital assets, including the use of secure digital asset wallets and should conduct appropriate information security practices to protect against unauthorised access. Loss or compromise of private keys or other access credentials can result in irreversible and complete loss of access to, control of or use of assets.

Due Diligence and Professional Advice: Users should conduct thorough research and consider seeking professional financial, legal, tax, and technological advice before engaging with the Wildcat Protocol.

Impact of Legal Changes: The DeFi space is subject to potential legal changes that could affect the legality and functionality of the Wildcat Protocol. Users should be prepared for such changes and ensure compliance with all relevant civil, criminal and regulatory legal obligations related to the ownership and control of digital assets, and the use of the Wildcat Protocol.

Legal Risks and Compliance: Our activities are subject to various laws and regulations in the countries where we operate. Regulatory actions, orders, or inquiries may adversely affect the Wildcat Protocol and its availability. Additionally, changes in applicable laws or evolving interpretations of existing laws could increase compliance costs, impact the Wildcat Protocol's functionality, or necessitate the acquisition of specific licences.

XI. No Professional Advice or Fiduciary Duties

Information Disclaimer: All information provided by Wildcat Foundation and its affiliates, whether on its websites, platforms, or communications, is intended for informational purposes only. It does not constitute financial, legal, or professional advice, and should not be relied upon as such. Users are encouraged to seek independent professional advice tailored to their specific circumstances before making any financial decisions related to the use of the Wildcat Protocol.

No Fiduciary Relationship: Wildcat Foundation does not act as an advisor or fiduciary to any user. Neither Wildcat Foundation nor the Wildcat Protocol nor its governors owe any fiduciary duties to users, and by using the Wildcat Protocol, users agree that they alone are responsible for their financial decisions and actions.

XII. Assumption of Risks and Limitation of Liability

User Assumption of Risk: By using the Wildcat Protocol, users acknowledge and accept all associated risks, including those related to the security, functionality, and regulatory environment of the Wildcat Protocol. Users acknowledge that participating in DeFi involves significant risks, and they should only engage with the Wildcat Protocol if they are fully aware of and willing to accept these risks.

Limitation of Liability: To the fullest extent permitted by law, Wildcat Foundation and its representatives are not liable for any losses, damages, or claims arising from the use of the Wildcat Protocol. This includes, but is not limited to, losses resulting from defaults, security breaches, regulatory actions, service interruptions, or any other risks described in this risk disclosure. Users agree to hold Wildcat harmless from any claims or liabilities related to their use of the Wildcat Protocol.

XIII. Incident Reporting and Transparency

Incident Disclosures: Wildcat is committed to transparency. Any significant incidents, such as security breaches, manipulation attempts, or major protocol failures, will be disclosed to the community promptly. However, Wildcat cannot guarantee the prevention of such incidents and disclaims all liability for any losses arising from them.

XIV. Mitigation Strategies

Audits and Security Measures: The Wildcat Protocol has undergone multiple security audits by third parties. Additionally, Wildcat Foundation operates a bug bounty program to encourage the identification and reporting of vulnerabilities. While these measures are in place to enhance security, they do not eliminate all risks, and it's imperative that users remain vigilant.

Acknowledgment of Risks

By using the Wildcat Protocol, you acknowledge that you have read, understood, and agree to this risk disclosure policy. You accept all risks associated with using the protocol and agree that Wildcat is not liable for any losses or damages, whether direct or indirect, arising from your use of the protocol.

Updated and effective: 16 January 2025

Last updated