Snapshot System
The Problem: Distribution Bypass
Attack Scenario (Without Snapshots)
The Solution: Snapshot Holders
Fair Distribution (With Snapshots)
Implementation Architecture
Key Innovation: Holder List
Snapshot Lifecycle
1. Holder Tracking (Continuous)
2. Snapshot Trigger (At Maturity)
3. Distribution (Post-Snapshot)
Multi-Period Independence
Example: 3 Periods
Yield Calculation Formula
Formula
Example Calculation
Holder
Snapshot Balance
Share
Yield Received
Edge Cases Handled
1. Post-Snapshot Transfers
2. Pre-Snapshot Trading
3. Zero Balance Holders
4. Multiple Periods Same Holder
Gas Optimization
Efficient Holder Tracking
Batch Distribution
Security Considerations
Attack Vector: Front-Running Distribution
Attack Vector: Snapshot Manipulation
Comparison: With vs. Without Snapshot Holders
Scenario
Without Snapshot Holders
With Snapshot Holders
API Reference
Query Snapshot Data
Trigger Snapshot (Admin Only)
Related Documentation
Last updated
