Morpho
DAMASCUSLending / Borrowing · Ethereum + Base · $3B+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
85
82
80
72
68
65
54
90
78
55
85
82
80
72
68
65
54
90
78
55
Audit History
Bug Bounty Program
Assessment
Exceptionally clean design with formally verified immutable core. Strongest supply chain score (D8=90) in this batch. Maturity (D6=65) and governance (D5=68) are main drags due to youth. Should improve significantly with time.
Dimension Breakdown
How scores work →- Minimalist Morpho Blue core: ~650 lines, immutable, no admin keys
- Authorization model via callbacks (well-scoped)
- MetaMorpho vaults add curator layer with controlled permissions
- No emergency pause on base layer (by design)
- Isolated markets: no cross-collateralization contagion
- LLTV per market, clean liquidation math
- Interest rate model (IRM) is modular and well-designed
- Bad debt is isolated per market, not socialized across protocol
- Oracle-agnostic: each market specifies its own oracle
- Risk delegated to market creators/curators
- No protocol-level oracle validation (intentional design)
- Popular markets use Chainlink, Morpho oracles wrapper
- Morpho Blue live since Jan 2024 (~1.5 years)
- Original Morpho Optimizer (2022) provides org maturity
- Formally verified core contract
- Rapid TVL growth to $5B but limited stress-test history
- Z-factor: 0.731
- Base layer is immutable (strong governance by design)
- MetaMorpho curators have significant control over vault allocation
- No protocol-level token governance yet (MORPHO token governance minimal)
- Morpho Labs retains influence on ecosystem direction
- Score derived from continuous adversarial security research
- Active monitoring and alerting
- Responsive development team
- Bug bounty program on Immunefi ($100K+)
- Young operational history, untested under major incident
- MetaMorpho vaults compose over base markets (curator trust)
- Growing integration ecosystem (Steakhouse, Re7, Gauntlet curators)
- Callback-based authorization enables complex composition
- Vault reallocation can create cascading liquidity shifts
- Appears in 9 cross-protocol cascade chain(s)
- Member of 8 dependency cluster(s)
- Score: 55/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Extremely minimal dependency chain (by design)
- No proxy patterns on base layer
- Formal verification of core invariants
- Clean, well-audited codebase (Spearbit, Cantina)
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "morpho"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("morpho")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.