Technical documentation for developers and advanced users who want to understand Give Protocol’s blockchain infrastructure, integrate with our APIs, or learn about our security model.
Technical Guides
### Smart Contracts
Learn about Give Protocol's smart contract architecture, including donation contracts, verification contracts, and how funds are managed on-chain.
[Smart Contracts](/docs/technical/smart-contracts/){: .btn-primary}
### API Documentation
Integrate with Give Protocol using our REST API. Access donation data, organization information, and more programmatically.
[API Documentation](/docs/technical/api-docs/){: .btn-secondary}
### Security Model
Understand the security measures protecting Give Protocol, including smart contract audits, data encryption, and access controls.
[Security Model](/docs/technical/security-model/){: .btn-secondary}
### Supported Tokens
View the complete list of cryptocurrencies supported for donations on Give Protocol, including token addresses and network details.
[Supported Tokens](/docs/technical/supported-tokens/){: .btn-secondary}
Platform Architecture
Give Protocol is built on the Moonbeam network, an Ethereum-compatible parachain on Polkadot. This provides:
- EVM Compatibility - Use standard Ethereum tooling and wallets
- Cross-Chain Potential - Future support for cross-chain donations
- Low Fees - Significantly lower transaction costs than Ethereum mainnet
- Fast Finality - Quick transaction confirmation times
Smart Contract Overview
Our platform uses several key smart contracts:
- Donation Contract - Handles donation transactions and fee distribution
- Organization Registry - Stores verified organization information on-chain
- Volunteer Contract - Records volunteer hours and credentials
- CEF Contract - Manages Charitable Endowment Fund operations
All contracts are audited by leading security firms and are open source.
API Access
Give Protocol provides a REST API for:
- Querying organization information
- Retrieving donation history
- Accessing impact metrics
- Integrating with external applications
Security Practices
- Smart Contract Audits - Regular third-party security audits
- Bug Bounty Program - Rewards for responsible vulnerability disclosure
- No Private Key Storage - We never have access to user funds
- Encryption - End-to-end encryption for sensitive data
For Developers
Interested in building on Give Protocol? Check out:
Need Help?
Technical questions? Check our troubleshooting guide or contact support.