Gnosis Safe
MITHRILSmart Wallet · Multi-chain · $100B+ TVL · 15 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
95
90
95
82
88
95
50
88
90
95
95
90
95
82
88
95
50
88
90
95
Audit History
Bug Bounty Program
Assessment
Most trusted smart wallet in DeFi. 96+ months live, $100B+ secured, zero core exploits, formal verification. D4 penalized for module system extensibility risk. Near-ADAMANTINE, the security primitive benchmark.
Dimension Breakdown
How scores work →- THE access control primitive for DeFi (threshold multisig)
- Owner management with add/remove/swap/threshold change
- Delegate call guard for module execution
- EIP-1271 signature validation standard
- Minimal economic attack surface (wallet, not DeFi protocol)
- No token swaps, no flash loans, no yield in core
- Transaction execution fee model is simple
- Economic risk comes from what Safe holds, not Safe itself
- Zero oracle dependency in core wallet contracts
- No price feeds, no TWAP, no external data
- Safe is infrastructure, not a price consumer
- Module-level oracle deps are sandboxed
- Live since 2018 (96+ months), oldest active smart wallet
- Secures $100B+ in aggregate TVL across all Safes
- Zero core contract exploits across any version
- Formal verification of core contracts
- Z-factor: 0.976
- SafeDAO governance with SAFE token
- Professional management by Safe Ecosystem Foundation
- Treasury governance for ecosystem grants
- Contract upgrades require new proxy deployment
- Maximum resilience under independent adversarial testing
- Comprehensive security coverage across all attack surfaces
- Formally verified core contracts strengthen resilience
- Mature codebase with extensive battle testing
- No validated adversarial findings — score set to neutral baseline
- Transaction Service for relay and indexing
- Safe{Wallet} frontend with professional ops
- Multi-chain deployment infrastructure
- Active security response team
- Module system allows arbitrary contract extensions
- Guard contracts can add pre/post-execution checks
- Fallback handler introduces external code execution
- Module risk is user-configured, not protocol-default
- No cross-protocol cascade exposure detected
- Score: 95/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Minimal external dependencies in core
- Standard Solidity with clean architecture
- EIP-1271, EIP-4337 standards compliance
- Verified on all deployment chains
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "gnosis"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("gnosis")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.