Wildcat Protocol Documentation
search
Ctrlk
  • The Wildcat Protocol
  • Overview
    • The Elevator Pitch
    • Whitepaper
    • FAQs
  • Using Wildcat
    • Terminology
    • Onboarding
    • Day-To-Day Usagechevron-right
    • Protocol Usage Fees
    • Delinquency
  • Technical Overview
    • Security/Developer Diveschevron-right
    • Function/Event Signatureschevron-right
      • /accesschevron-right
        • AccessControlHooks.sol
        • IRoleProvider.sol
        • MarketConstraintHooks.sol
      • /interfaceschevron-right
      • /marketchevron-right
      • /spherexchevron-right
      • HooksFactory.sol
      • IHooksFactory.sol
      • WildcatArchController.sol
      • WildcatSanctionsEscrow.sol
      • WildcatSanctionsSentinel.sol
    • Protocol Structs
    • Contract Deployments
  • Security Measures
    • Code Security Reviews
    • SphereX Protection
    • Bug Bounty Program
  • Legal
    • Wildcat Terms Of Use
    • Risk Disclosure Statement
    • Template MLA
    • Privacy Policy
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Technical Overviewchevron-right
  2. Function/Event Signatures

/access

AccessControlHooks.solchevron-rightIRoleProvider.solchevron-rightMarketConstraintHooks.solchevron-right
PreviousFunction/Event Signatureschevron-leftNextAccessControlHooks.solchevron-right