Risks & Mitigations

Transparency is a core value of the Agent Tresor protocol. Below is a structured analysis of the potential risks associated with holding our tokens, along with the technical mitigations implemented directly in the smart contracts.

Continuous Auditing: Automated technical security audits are executed before every deployment and continuously throughout the development process to detect and mitigate potential vulnerabilities.

Risks for $AGTR Holders

Governance & Revenue Share Token

Risk TypeDescriptionCode Mitigation
Exit TaxSelling $AGTR incurs a 3% tax (default), reducing the net value realized upon exit.
  • Hard Cap: The AgtrToken.sol contract enforces a MAX_TAX_BPS = 1000 (10%), preventing the admin from setting an abusive tax rate.
  • Exclusions: Specific addresses can be excluded from tax via setTaxExclusion.
Staking IlliquidityStaked tokens are locked. You cannot sell immediately in case of a market crash.
  • Cooldown Period: AgtrStaking.sol enforces a strict 10-day delay after an unstake request (COOLDOWN_PERIOD). This is an intentional friction to stabilize TVL.
VolatilityPrice is determined by market supply and demand. "Buyback & Burn" supports price but does not guarantee a floor.
  • Deflationary Mechanism: AgentTresor.sol automatically burns 20% of all $AGTR collected via fees in every cycle, permanently reducing the Total Supply.
Centralization (Admin)The protocol owner has the power to change critical parameters (contract addresses, taxes).
  • Timelocks: Sensitive functions like changing linked contracts (setCollectorPool, setStakingContract) have a mandatory 24-hour safety delay enforced by the smart contract (TIMELOCK_DURATION).

Risks for $agtrUSD Holders

Backed Stablecoin

Risk TypeDescriptionCode Mitigation
Depeg RiskThe token may trade below 1 USDC if Treasury reserves are insufficient or demand collapses.
  • 1:1 Backing: Minting and redeeming via the Treasury are strictly 1:1 with USDC.
  • Active Defense: The defendPeg function allows the Agent to use Treasury reserves to buy back and burn $agtrUSD if the price falls below $0.98.
Strategy RiskA portion of reserves (target 75%) is invested in third-party protocols (e.g., Aave). If the underlying protocol is hacked, funds are at risk.
  • Modularity: The architecture uses Adapters. The owner can switch strategies (setStrategy) to exit a risky protocol or adapt to market conditions.
Inflation RiskYield is distributed by increasing everyone's balance (rebase). A bug could theoretically allow "printing" money.
  • Backing Check: AgentTresor.sol only triggers yield distribution (harvestAndDistribute) if the strategy has realized a profit (currentBalance > totalInvested).
Smart Contract RiskBugs in the Treasury or Rebase logic could freeze funds.
  • Security Standards: Contracts utilize ReentrancyGuard to prevent reentrancy attacks and SafeERC20 for token transfers. The codebase follows OpenZeppelin standards.