MORE
  • Introduction
  • MORE Vaults
    • Vaults Framework
      • Diamond Standard (EIP-2535)
      • Component Interactions
      • Upgrade & Governance Flow
    • Core Protocol Components
      • Factory
      • Core Facets
      • Registries
      • Internal Libraries
      • Accounting
    • Connectors
      • AMMs & DEXes
      • Staking
      • Lending
      • Leverage
      • Oracles
      • External Interfaces
      • Multicall
    • Security & Governance
      • Roles & Access Control
      • Upgrade Flow & Timelock
      • Configuration Guard Rails
      • Registries as Boundaries
      • Error & Event Catalogue
    • Developer Workflows
      • Deploying a New Vault
      • Extend with New Facets
      • Indexer Integration
    • Reference & Glossary
      • Event Index
      • Capabilities
      • Terms & Abbreviations
      • Contracts
  • MORE Markets
    • Markets Framework
      • Liquidity Protocol
      • Supply
      • Borrow
      • Repay
      • Withdraw
      • Liquidations
      • Flash Loans
      • Risks
    • Markets
      • Liquidity Pool
      • Reserve
      • Incentives
      • Oracles
    • Contracts
    • Build
  • Resources
    • Code, Licenses & Audits
    • Brand Assets
  • Privacy Policy
  • Terms of Use
Powered by GitBook
On this page
  1. MORE Vaults
  2. Core Protocol Components

Factory

The Vaults Factory is the on-chain assembly line that guarantees every vault starts life with the same security envelope.

  • Deterministic deployment: The factory deploys a Diamond proxy, wires in the caller-supplied facet bundle, and emits VaultDeployed, making provenance trivial to track.

  • Upgrade governor: It stores the address of the canonical DiamondCutFacet. Protocol governance can rotate that address, instantly propagating hardened upgrade logic to future vaults.

  • Discovery helpers: Read-only getters like isFactoryVault, deployedVaults(i), and getVaultsCount() let dashboards enumerate official vaults without hard-coded lists.

Because vaults are born through a single factory, audits focus on one deployment path, and integrators can whitelist by provenance instead of by ever-growing address lists.

PreviousCore Protocol ComponentsNextCore Facets

Last updated 16 days ago