GMX V2
DAMASCUSPerps DEX · Arbitrum + Avalanche · $500M+ TVL · 20 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
75
72
78
70
55
75
60
82
78
87
75
72
78
70
55
75
60
82
78
87
Audit History
Bug Bounty Program
Assessment
Mature perps protocol with V2 design improvements from V1 lessons. Oracle hardening from V1 exploit is a strength. Governance centralization (D5=55) and perps economic complexity (D2=72) are main drags.
Dimension Breakdown
How scores work →- Complex order/position lifecycle with keeper execution
- Role-based access: controller, order keeper, liquidation keeper
- Config store with wide admin surface for market parameters
- Reentrancy protection on core paths
- GM pool model isolates risk per market (improvement over V1 GLP)
- Funding rates, borrowing fees, price impact model
- PnL settlement from pool reserves: large winning trades can stress pool
- Open interest caps provide some protection
- Chainlink Data Streams (low-latency, signed reports)
- Custom oracle module with validation and staleness checks
- V1 AVAX oracle manipulation led to significant hardening in V2
- Two-step execution (order creation + keeper execution) limits frontrunning
- V2 live since Aug 2023 (~2 years)
- V1 since Sep 2021 (org maturity 4+ years)
- V1 AVAX oracle manipulation incident (2022) handled and led to V2 hardening
- Audited by ABDK, Guardian, Sherlock contest
- Z-factor: 0.78
- Team multisig with no formal timelock on config changes
- GMX token governance is limited
- Market parameter changes can be immediate
- Some decentralization via Arbitrum governance
- Score derived from continuous adversarial security research
- Active keeper monitoring infrastructure
- V1 incident response was fast and effective
- Bug bounty program active on Immunefi
- Transparent deployment process on Arbitrum
- Arbitrum-native, limited cross-chain exposure
- GM pools integrate as yield sources in other protocols
- Chainlink dependency is critical path
- Keeper infrastructure centralization
- Appears in 2 cross-protocol cascade chain(s)
- Failure cascades to 2 downstream protocol(s)
- Member of 4 dependency cluster(s)
- Score: 87/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Standard libraries with custom oracle integration layer
- Reasonable dependency chain
- Modern Solidity versions
- Non-upgradeable core (markets are deployed fresh)
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "gmx-v2"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("gmx-v2")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.