⚠️Risk Disclaimer

Last Updated: October 2025


1. Overview

Secured Finance (“SF”) is an open-source, decentralized, and self-custodial protocol that enables users to lend and borrow digital assets through autonomous smart contracts.

All transactions occur directly on-chain; users retain full control of their wallets and private keys.

A reference web interface provides a convenient access point to these contracts, but no centralized server or intermediary controls the protocol.

For details on governance, terms of service, and data practices, please refer to the

Terms of Use and Privacy Policy.


2. Non-Custodial and Self-Directed Use

SF never holds, manages, or transfers user assets.

Users interact directly with smart contracts using their own cryptographic keys and execute transactions solely on their own behalf.

The protocol has no ability to retrieve, freeze, or alter assets.

Accordingly, all actions taken through SF are performed at the sole discretion and responsibility of the user.


3. Data and Privacy

The protocol itself does not collect, store, or process any personal information.

The website interface may process limited technical data (such as IP address or cookies) solely for functionality, security, and analytics, as described in the Privacy Policy.

No personally identifiable information is required to interact with the smart contracts.


4. Compliance and Access Controls

The reference interface is hosted in a distributed manner on IPFS, ensuring there are no centralized servers controlling access.

To reduce potential misuse, the IPFS gateway provider applies geo-based access restrictions that block requests originating from comprehensively sanctioned jurisdictions.

These constitute reasonable technical controls aligned with international compliance standards, though no system can guarantee absolute exclusion.

Users are responsible for ensuring that their interaction with the protocol complies with the laws and regulations applicable in their own jurisdiction.


5. Risks and Limitations

Using decentralized protocols involves inherent risks.

By accessing or using SF, you acknowledge and accept the following non-exhaustive list:

  • Smart Contract Risk: The code may contain vulnerabilities or logic errors that could result in the loss of funds.

  • Market and Liquidation Risk: Asset prices are volatile; collateral may be liquidated automatically and irreversibly.

  • Oracle or Data Feed Risk: Incorrect or delayed price information may impact loan positions or settlements.

  • Liquidity Risk: Certain tokens — particularly tokenized real-world assets — may have limited liquidity or delayed liquidation.

  • Governance Risk: DAO proposals may change parameters or protocol features without advance notice.

  • Regulatory Risk: New or changing regulations may restrict access or impact usage of the protocol.

  • Operational Risk: External infrastructure such as gateways, RPC endpoints, or third-party services may become temporarily unavailable.

Blockchain transactions are final and irreversible.

SF cannot refund, reverse, or recover lost assets.


6. No Guarantee or Advice

SF is provided on an “as-is” and “as-available” basis, without any warranties — express or implied — of reliability, accuracy, or suitability for any purpose.

Nothing in this document constitutes financial, legal, or tax advice.

Users should conduct their own due diligence and seek independent professional advice before engaging in any transaction.


7. Jurisdiction and Updates

SF operates globally as open-source software and does not target or solicit users in any specific jurisdiction.

This disclaimer is informational and does not constitute a legal opinion or regulatory filing.

SF may update this page periodically to reflect evolving legal or technical circumstances; users are encouraged to review the latest version before using the protocol.


Summary

Secured Finance is a decentralized, self-custodial protocol.

You interact directly with smart contracts using your own wallet and keys.

No centralized servers or intermediaries hold your assets or data.

Reasonable geo-based access restrictions are applied at the gateway level to deter sanctioned access, but no system is perfect.

Use of the protocol is entirely at your own risk and responsibility.

Last updated

Was this helpful?