BlackHartBlackHart
Scores/Methodology/Dimensions
10 Active2 Conditional

The 12 Dimensions

Each dimension captures an independent axis of protocol risk. Weights reflect empirical correlation with exploit outcomes across 200+ historical DeFi incidents. 11 of 12 dimensions are fully open — formulas, weights, and data sources are published. D7 (Adversarial Resilience) uses proprietary methodology.

Active Dimensions

D1
Access Control18% weightopen

Permission models, admin surface, reentrancy protection, and authorization boundaries. #1 exploit vector by dollar loss in DeFi history.

View full details →
D2
Economic Soundness13% weightopen

Robustness of economic model against flash loans, MEV, liquidation cascades, and incentive misalignment under stress.

View full details →
D3
Oracle Integrity13% weightopen

Oracle architecture, manipulation resistance, staleness protection, fallback mechanisms, and feed redundancy.

View full details →
D6

Actuarial credibility model: Z-weighted deployment history, TVL-days, audit depth, bounty coverage, and incident history.

View full details →
D5

Admin key concentration, timelock coverage, upgrade mechanisms, and Maximum Extractable Value by Admin (MEVA).

View full details →
D7
Adversarial Resilience10% weightproprietary methodology

Measures protocol resilience under independent adversarial security research. Higher scores reflect stronger resistance to sophisticated attack methodologies.

View full details →
D11
Operational Security10% weightopen

Incident response speed, deployment hygiene, key management, monitoring infrastructure, and emergency history.

View full details →
D4
Compositional Risk5% weightopen

Protocol-intrinsic composition: external dependencies, cross-contract interactions, and integration surface area.

View full details →
D12
Cascade Exposure5% weightopen

Extrinsic systemic risk: upstream dependency failures that propagate into this protocol, and downstream blast radius if this protocol fails.

View full details →
D8
Supply Chain4% weightopen

Compiler version CVEs, library dependencies, build reproducibility, and proxy pattern risk.

View full details →

Conditional Dimensions

These dimensions activate only when relevant to a protocol's architecture. When active, their weight is redistributed from the base allocation.

D9

Conditional: liquidation cascades, holder concentration (Gini), exit queue analysis. Active for protocols with tradeable positions.

View full details →
D10

Conditional: bridge trust model, sequencer risk, fraud proof maturity, cross-chain replay risk.

View full details →

Weight Distribution

Access Control
18%
Economic Soundness
13%
Oracle Integrity
13%
Battle-Tested Maturity
12%
Governance & Upgradeability
10%
Adversarial Resilience
10%
Operational Security
10%
Compositional Risk
5%
Cascade Exposure
5%
Supply Chain
4%

Active weights sum to 100%