### Who's Adopted Safe Harbor
> Safe Harbor is already protecting $16B+ in assets across leading DeFi protocols. Current adopters include Uniswap,
> Pendle, PancakeSwap, Balancer, Silo Finance, Zksync, and more. See the
> [full up-to-date list](https://safeharbor.securityalliance.org/).
|
|
|
|
|
| :-----------------------------------------------------------------------------------------------------------------------------------: | :---------------------------------------------------------------------------------------------------------------------------------: | :-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :-------------------------------------------------------------------------------------------------------------------------------------: |
| [Gov Proposal](https://www.tally.xyz/gov/uniswap/proposal/79) | Non-DAO Adoption | [Gov Proposal](https://www.tally.xyz/gov/zksync/proposal/35395412545014978447594654620386134175315194219985614464693911512436668500487?govId=eip155:324:0x496869a7575A1f907D1C5B1eca28e4e9E382afAb) | [Gov Proposal](https://snapshot.box/#/s\:balancer.eth/proposal/0x8c3fd2550184ec28653c46e959782f1a3127ca8aa6a5652494a9c29ad77d9b55) |
### How Does Safe Harbor Work?
* **Protocols pre-authorize rescues:** You clearly define when and how whitehats are allowed to step in - covering what
assets are protected, where to return funds, and what bounty terms apply, etc
* **Whitehats act only during active exploits:** Safe Harbor **only** applies when an exploit is already in progress or
imminent - e.g., in the mempool, or after initial funds have been drained. It's *not* for bug bounty reports, and it
does not protect blackhats. Only whitehats who rescue funds without initiating the exploit are covered.
* **Funds are returned, bounty is automatic:** Whitehats must send rescued funds to your official recovery addresses
within 72 hours. Bounties are enforceable and pre-defined - no negotiation, no chaos.
**Other key protections:**
* You can choose to allow anonymous whitehats or require KYC.
* Whitehats must follow established guidelines for responsible intervention
* You define exactly which contracts, and chains are protected.
* The agreement is only valid if funds are returned and the protocol's rules are followed
### How to adopt?
Adopting Safe Harbor is fast, simple, and works whether you're a DAO or a centralized team. You can complete the whole
process in under an hour.
Here are a few options:
#### 1. Get Help from SEAL
For protocols that want white-glove support, SEAL offers guided onboarding at no cost. We'll walk you through scoping,
governance language, on-chain registration, etc.
→ [Apply for the SEAL Onboarding Waitlist](https://form.typeform.com/to/QF3YjWno)
> Space is limited - we prioritize high-impact protocols and critical infrastructure
#### 2. Self-Adopt Using Our Guide
For teams that want to do it themselves, we provide a clear step-by-step guide, including templates for scope
definitions, template DAO proposals, and on-chain registration instructions.
→ [View the Self-Adoption Guide](/safe-harbor/self-adoption-guide)
#### 3. Adopt Through a Third-Party Provider
Safe Harbor is also supported by select ecosystem partners who offer adoption workflows as part of their existing
services.
→ [Adopt via Immunefi](https://docs.google.com/forms/d/e/1FAIpQLSehHw_KyNfSr9YbnO1AB3OZ4cvVS2oInIxdveCPguR9GSxZFQ/viewform)
Safe Harbor doesn't require a legal entity, legal counsel, or new infrastructure. Just define your terms, publish your
scope, and your protocol is protected.
> Whether you're a DAO or not, adopting Safe Harbor is a low-lift way to enable real-time defense and recover funds
> during live exploits.
### Whitehats Work
> 💡 SEAL911 and the broader whitehat community have already helped protocols recover over $150M from live attacks -
> proving that fast, responsible intervention is possible.
### FAQ
Eternal Safe network selection screen: choose your network and enter an RPC URL
A message sent by a North Korean hacker impersonating an investor
A fake error shown by the North Korean website
An example of a North Korean hacker attempting to share a link to malware
An older example of a North Korean phishing email
ELUSIVE COMET account reaching out to a potential victim
ELUSIVE COMET hackers on the Zoom call. Note the presence of a user named “Zoom”
Prompt shown by Zoom when ELUSIVE COMET requests remote control
A message sent from an account belonging to a victim of ELUSIVE COMET