🔹2. Security & Smart Contract Audit
✅ Exchanges require secure tokens to prevent hacking risks. Most CEXs demand a third-party security audit (CertiK, Hacken, Solidproof).
✅ Avoid common vulnerabilities like reentrancy attacks, centralized control issues, or hidden minting functions.
✅ Bug bounty programs can increase credibility and help find security issues before listing.
💡 Tip: Many exchanges reject tokens with unaudited or unsafe smart contracts.