CertiK Security Score
Under Evaluation
0
100
In Circle Info
more info
In-Circle is a Web3 technology-driven protocol for individual asset identity, tailored for personal brand and social asset management. It empowers users to create, enhance, and monetize their social influence. In-Circle strives to unlock the social power of each individual, crafting a unique asset identity for every user.
Audits
1 Available
Contracts
Not Available
Socials
Code Audit
KYC
Bug Bounty
Go Vote!
Code Audit History
In Circle logo
In Circle audit is in progress·Project Reviewing
Project Scheduled
Final Report Delivered
Remediating Findings · 85%
Our security experts are working closely with the project team to review any updates made to the implementation based on recommendations provided in the preliminary report.
audit stage 2
KYC Status
CertiK KYC
No
3rd Party KYC
No
User Votes
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
Go Vote!
Project Owner?
Project Maturity Metrics
Maturity Indicator
LowMinimally Developed
Project Age
1 yr11 mos
Token Launch Date
Not Available
Market Cap Not Available
Maturity Timeline
Project 24 mos
Median 33 mos
Funding History
Bug Bounty Program
CertiK Bounty
No
3rd Party Bounty
No
User Votes
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
Go Vote!
Project Owner?
Incident History
Twitter Monitoring
@incircle_tech
Twitter Activity Indicator
LowLess
Active
Twitter Followers (24h)
38,645-43
Twitter Account Age
1 yr11 mos
0
Tweets yesterday
Total Tweets (24h)
182+0
Follower Growth
active monitor
Skynet Active MonitorReal-time monitoring of key project assets for enhanced security awareness.
Website
N/A
website monitor
Code Repository
N/A
code repository monitor
Smart Contract
N/A
smart contract monitor
Social Media
N/A
code repository monitor
Vote for CertiK Services!
-0123456789
-0123456789
-0123456789
-0123456789
-0123456789
logo indicator
  1. KYC
    25%
  2. KYC
    Free
  3. Bug Bounty
    Free
  4. Contract
    25%
  5. Contract
    50%
  6. Contract
    Free
Disclaimer:
CertiK conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.