Notional
About
Notional is a DeFi fixed-income protocol that enables users to lend and borrow crypto assets at both fixed and variable interest rates on Ethereum and Arbitrum. Built around its Prime Money Market (variable-rate lending/borrowing) and fCash-based fixed-rate liquidity pools, Notional serves retail and institutional users seeking predictable yields, over-collateralized loans, or leveraged exposure through whitelisted vault strategies. The protocol is governed by NOTE token holders who set risk parameters, fees, and incentive emission rates.
Where Does Yield Come From?
Notional generates yield through five main ways.
1. Variable-rate lending (Prime Money Market). You deposit assets like USDC, DAI, or ETH into a pool and receive Prime Cash tokens (for example, Prime USDC). Their value grows over time as borrowers pay variable interest. The interest rate follows a curve with two "kink" points — as more of the pool is borrowed out, the rate rises, with two specific thresholds and rates set by the protocol's governance, up to a maximum. Lenders earn a share of the total interest paid by borrowers, spread across all supplied funds. There are no fees to enter or exit this type of lending.
2. Fixed-rate lending (fCash). You buy fCash — think of it as a tokenized bond with a fixed return — at an interest rate set by supply and demand in Notional's fixed-rate pools. The rate is locked until a specific maturity date (quarterly or semi-annual). When you enter, you pay an upfront fee equal to 8% of the total interest you expect to earn until maturity. If you exit early, you pay another 8% fee on the remaining interest at the current market rate. If you hold until maturity, there is no exit fee. The total fee amount grows or shrinks with the time left until maturity.
3. Providing liquidity (nTokens). Liquidity providers deposit into fixed-rate pools and receive nTokens. The nTokens hold their cash in Prime Cash (earning variable interest) and take the opposite side of every fixed-rate trade — when someone borrows at a fixed rate, the nToken effectively lends at that rate, and vice versa. Returns come from three sources:
- Interest earned on Prime Cash and on the net fCash positions.
- Transaction fees from every fixed-rate lend or borrow trade (currently 8% of the pre-fee interest, split between liquidity providers and the protocol).
- NOTE governance tokens distributed to nToken holders as incentives.
4. Leveraged Vaults. Approved external strategy contracts (for example on Curve, Balancer, or Uniswap) let you borrow from Notional at fixed rates and put that borrowed capital to work in external strategies, with up to roughly 10x leverage. Your return is calculated as: ((your capital + borrowed amount) × vault return − borrowed amount × interest rate) / your capital. You pay Notional's fixed interest on the borrowed amount plus any trading costs when converting between the borrowed asset and the vault's strategy asset. The vault assets act as over-collateralization — if the position drops below a minimum collateral ratio, it can be liquidated.
5. NOTE Staking (sNOTE). NOTE holders can stake by converting NOTE into 80/20 NOTE/WETH Balancer LP tokens, receiving sNOTE in return. sNOTE earns rewards from three sources:
- Protocol revenue reinvestments (transaction fees from lending/borrowing, plus COMP incentives from Notional's Compound integration).
- Balancer pool trading fees.
- Additional NOTE incentives allocated by the community (currently 30,000 NOTE per week).
sNOTE can be redeemed after a 15-day cooldown, within a 3-day redemption window. In a collateral shortfall, NOTE holders may vote to take up to 50% of sNOTE pool assets to help recapitalize the system.
Variable-rate borrowers also pay a borrow fee — a governance-set percentage of the pre-fee borrow rate (bounded by minimum and maximum fee rates). That fee goes to the protocol reserve and partly funds sNOTE rewards.
Persons
Teddy Woodward
Co-Founder and CEO
LinkedInJeff Wu
Co-Founder and CTO
Pierre-Yves Gendron
Quantitative analyst
Audits
| Audit / Date | Findings | Verdict |
|---|---|---|
OpenZeppelin22-12-2020 |
| The second audit found no critical or high-severity vulnerabilities, with the codebase in a significantly improved state compared to the first audit; the five medium-severity items primarily relate to upgradeability patterns, event emissions, and fee-encoding correctness rather than active exploits, and the Notional team addressed or acknowledged all findings. |
OpenZeppelin05-11-2021 |
| The audit identified 1 high-severity and 9 medium-severity issues in Notional's governance contracts, the most critical of which (incorrect vote tallying) was fixed; the remaining acknowledged items (e.g., front-running of approvals, untested SafeMath) represent accepted design trade-offs rather than active exploits, making the contracts safe to deploy with the understanding that the guardian retains proposal-cancellation powers during the initial bootstrapping phase. |
ABDK Consulting06-09-2021 |
| The audit identified 6 critical and 12 major issues across Notional V2's smart contracts, primarily related to allowance management, settlement-index integrity, governance voting mechanics, and general code quality, all of which were reported as open; the protocol should address these findings before mainnet deployment, particularly the critical flaws that could lead to incorrect settlement or locked allowances. |
Certora28-06-2021 - 19-09-2021 |
| The formal verification found one high-severity manipulation bug and several other design flaws, all of which were corrected and re-verified; the report confirms that the contracts satisfy their formal specifications after fixes, though it notes the usual scoping limitations of the Prover. |
ABDK Consulting03-11-2021 |
| Three major flaws were found concerning access control ambiguity, governance mutability of critical token decimals, and a conditional logic bug, all of which remain open and would need to be addressed before deployment; the single moderate finding on liquidation logic also warrants attention to avoid adverse liquidator outcomes. |
Code Arena25-08-2021 - 08-09-2021 |
| The audit revealed critical vulnerabilities in access control, token-handling, and governance contracts that, if unaddressed, could lead to loss of funds or protocol takeover; the sponsor confirmed most findings, mitigating the highest risks before launch. |
Code4rena27-01-2022 - 02-02-2022 |
| The audit identified several material risks — particularly around COMP token handling, the cooldown/redeem bypass, and treasury manager abuse vectors — all of which were confirmed and addressed by the Notional team. With fixes applied, the residual risks center on known design limitations (e.g., oracle usage and governance incentive alignment) rather than exploitable vulnerabilities. |
ConsenSys Diligence31-01-2022 - 04-03-2022 |
| No critical or high-severity vulnerabilities were identified; the single medium issue (incentive-claim stuck on migration) has an explicit fix and the two minor points are non-security best-practice recommendations, indicating that the reviewed changes were well-engineered. |
Code4rena07-06-2022 - 14-06-2022 |
| The audit identified one high-risk rounding flaw in the EIP-4626 implementation and ten medium-risk issues spanning re-entrancy, gas-bomb, allowance, and integration edge-cases; most were confirmed by the sponsors and several fixes were already implemented or planned, so the residual risk is moderate if all remediations are applied before mainnet use. |
Consensys Diligence04-07-2022 - 05-08-2022 |
| The audit found no critical or high-severity vulnerabilities; the two medium-severity issues were remediated, and the remaining findings are minor or informational, indicating a reasonable security posture for the vault system within the defined trust model and scope. |
Sherlock12-09-2022 - 10-10-2022 |
| The contest uncovered a significant number of high and medium severity issues — notably in trading/ETH handling, 0x adapter security, and settlement logic — that required fixes before the vaults could be considered safe for production use. Overall, the findings indicate material residual risk was identified and remediation was needed across critical paths. |
Sherlock02-01-2023 - 09-01-2023 |
| The contest uncovered critical accounting and oracle interaction flaws that would have broken core vault functions (deposit, redeem, reinvest, settlement) for Notional's Balancer leverage vaults; all High and Medium findings were acknowledged by the team for remediation, so the protocol should not be considered safe until those fixes are implemented and verified. |
Sherlock01-03-2023 - 08-03-2023 |
| The audit identified six high and five medium severity issues in Notional's Curve vault integration, all responsibly disclosed and judged; the contest format means findings were reported but not necessarily remediated in a single fixed commit, so downstream users should verify that the Notional team has patched these issues before relying on the updated vaults. |
Sherlock27-03-2023 - 15-05-2023 |
| The audit identified multiple high-severity vulnerabilities in vault accounting, settlement, and liquidation logic that pose material insolvency risks; these were triaged and addressed via PRs (e.g., PR #135 for settlement issues, PR #132 for liquidation edge cases) before or shortly after the contest concluded. |
Sherlock (contest-based audit)18-11-2023 - 25-11-2023 |
| The contest identified 9 High and 9 Medium severity issues across Notional's vault system, with major concerns around spot price oracles, emergency exits, and vault restoration logic that warrant remediation before production use. |
Sherlock08-01-2024 - 18-01-2024 |
| The contest revealed several High-severity issues involving lost funds (front-running, residual ETH not returned) and Medium-severity issues in lending, rebalancing, and oracle logic that the Notional team would need to remediate before deployment; the protocol carries meaningful risk until these findings are addressed. |
Sherlock26-06-2024 - 03-07-2024 |
| The Sherlock contest revealed 13 high and 6 medium severity vulnerabilities in Notional's leveraged vaults, predominantly in Pendle PT oracle pricing, slippage protection, and reward accounting — all of which required remediation before safe deployment. |
Backers
Notional Finance has disclosed two funding rounds via official blog posts:
-
Seed round (Oct 2020): Backed by 1confirmation, IDEO CoLab Ventures, ParaFi Capital, Nascent, Coinbase, Polychain Capital, and others. Announced alongside the protocol's beta launch on Ethereum (source: "Notional Brings Fixed Rates to Ethereum," Oct 26, 2020).
-
Series A ($10M) — April 2021: A $10M Series A round led by Pantera Capital, with participation from ParaFi Capital, 1Confirmation, Spartan Group, Nascent, Nima Capital, and others. Funds were earmarked for team expansion and strengthening Notional's position as a fixed-rate lending leader (source: "Notional Finance Closes $10M Funding Round Led by Pantera Capital," Apr 29, 2021).
Legal
Legal form
Corporation
Registration jurisdiction
United States — California (governing law specified as California; registered agent address in Emeryville, CA). Entity name: Swapnet Inc. The Terms of Service state they are "governed by and construed in accordance with the laws of the State of California" and arbitration venue is San Francisco, California. The notice address is PO Box 8081 Emeryville, CA 94662.
Status and notes
The operating entity is Swapnet Inc, doing business as Notional. Terms of Service (last updated December 5, 2020) are available at https://notional.finance/terms and a Privacy Policy is available at https://notional.finance/privacy. The Terms state Notional is "not a bank or financial institution" and "not registered or licensed by the CFTC, SEC, FinCEN or any financial regulatory authority." The Terms include mandatory arbitration (JAMS, San Francisco, CA) and governing law is California. The Privacy Policy states no PII is collected; only anonymized analytics. No imprint/disclosure page was found at /imprint or /legal (returned empty pages). No foundation or Swiss entity structure was disclosed.
