Page cover

FAQs

Can I withdraw my funds at any time?

Yes. CypherFund now allows withdrawals at any time, based on real-time Net Asset Value (NAV), directly via the dApp. This upgrade enhances liquidity and accessibility for participants, ensuring users maintain full control of their funds at all times.

All deposits and withdrawals are handled entirely on-chain, ensuring transparent valuation and equitable redemption. Smart contracts enforce all fund rules automatically — no intermediaries, no manual processing, and no custodial risk.


How does the AI handle market crashes or extreme volatility?

CypherFund’s AI integrates regime detection and risk containment layers specifically designed to manage high-stress environments. When crash-like behavior is detected — such as volatility spikes, liquidity drains, or correlated downturns — the system can automatically:

  • Reduce exposure to high-risk assets

  • Reallocate into defensive or stable positions

  • Pause new entries during extreme uncertainty

These safeguards enable CypherFund to act instantly, objectively, and without emotion, unlike traditional managers who often overreact or delay critical decisions during market stress.


Does the AI learn from my personal data?

No. CypherFund does not collect, store, or process any personal user data. Its intelligence is derived entirely from public, permissionless market data, including:

  • Token prices

  • Liquidity and on-chain flow patterns

  • Market sentiment

  • Ecosystem-level analytics

All AI refinements occur using anonymized and aggregated data, preserving user privacy and aligning with DeFi’s open and permissionless ethos.


Is the codebase open source?

No. CypherFund’s smart contracts and AI systems are proprietary. While all on-chain executions are fully transparent and verifiable on BNB Chain, the underlying models, logic, and codebase remain closed-source to protect against exploitation and strategy manipulation.

However, independent audits and public reports will confirm contract integrity, ensuring security and trust without revealing proprietary mechanisms.

Last updated