Layer 1 Protocol Eligibility
Operational risk
1. Audit
One essential factor in security assessment is the functionality of programming instructions because malfunctioned programming instructions can cause colossal damage. Therefore, it is necessary that the programming instructions have to be audited and verified by the programming experts.
In general, after the auditing process has been completed, the auditor will list out some critical issues found in the programming instructions. If the developer has fixed these issues, the auditor will report the results to the investors and the public. Unfortunately, in some very rare cases, the developer does not fix the problems correctly. This usually makes the protocol less reliable.
The ability and reputation of auditors are also critical. Being audited by trusted auditors can reduce security risks. We prepare the auditor credibility assessment by comparing the number of audited protocols and selecting only the top 5 auditors. To ensure audit quality without considering only the number, we select only protocols with the top 40 total locked values.
This table shows the number of audited protocols by each auditor.
1
CertiK
17
2
Trail of Bits
10
3
PeckShield Inc
7
4
ConsenSys Diligence
6
5
OpenZeppelin
4
6
Slowmist
4
7
MixBytes
4
8
Hacken
3
9
Quantstamp
3
10
Chain security
2
11
VÃðarr the Auditor
2
12
Osorio
1
13
Haechi
1
14
ZeroPool
1
15
ADBK
1
16
Least Authority
0
17
Runtime Verification
0
18
Quantstamp
0
19
Solidified
0
20
Solidity Finance
0
21
QuillAudits
0
We have the top 5 ranking auditors from the table as CertiK, Trail of Bits, PeckShield Inc, ConsenSys Diligence, and OpenZeppelin.
Additionally, some auditors also offer online monitoring services to ensure the reliability of the system.
This factor will be assessed by the number of unfixed issues and the credibility of the auditors, as shown below.
5
Being audited by a credible auditor and monitored at all times with less than two unfixed issues
4
Being audited by a credible auditor with less than two unfixed issues
3
Being audited by a credible auditor with more than two unfixed issues
2
Being audited by other auditors with less than two fixed issues
1
Being audited by other auditors with more than two unfixed issues
0
No auditing
2. Maturity Eligibility
Usage period assessment allows us to evaluate the robustness of protocol design and structure to the market conditions and real users. For example, if the protocol has been used for an extended period, this protocol will likely have greater reliability than the protocol with a shorter usage period.
Therefore, this factor will be assessed by counting the number of months from the launch date to the assessment date according to the table below.
5
More than or equal to 12 months
4
More than or equal to 6 months
3
More than or equal to 3 months
2
More than or equal to 2 months
1
More than or equal to 1 month
0
Less than 1 month
3. Governance Eligibility
The authority to control the system is one of the most important factors we need to consider. In general, blockchain transactions are very secure with immutability property. However, the programming instructions in the protocol can be updated. This can make the protocol vulnerable to fraud even though some credible auditors have audited the protocol.
System control authorization can be separated into two forms: centralized form and decentralized form. The decentralized structure is the most secure because the programming instruction has to be voted by the community before getting updated. In contrast, the developer can update the centralized form without having to be voted by the community. However, some protocols can raise the investors’ confidence by setting up some measures, such as setting a time lock before updating, announcing before updating, and decentralizing control over some critical parts.
We can rate this factor based on system control authorization and its additional measures, as shown below.
5
Decentralize in every part
4
Decentralize in some parts
3
Centralize with time lock longer than 24 hrs
2
Centralize with time lock shorter than 24 hrs
1
Centralize with an updating announcement in advance
0
Centralize without any updating announcement in advance
Financial Risk
1. Total Value Locked
In general, to obtain some returns from DeFi, such as liquidity providing or yield farming, the investors have to stake or lock their own capital/assets with the protocol. The total value locked can allow us to assess the security and suitability aspects of the investment. The greater the real value is locked, the less chance market manipulation can occur. It can also support more fund flow in the system.
We can rate this factor based on the total value locked in US dollars, as shown below.
5
Greater than or equal to 10.0 Billion USD
4
Greater than or equal to 5.0 Billion USD
3
Greater than or equal to 2.0 Billion USD
2
Greater than or equal to 1.0 Billion USD
1
Greater than or equal to 500 Million USD
0
Less than 500 Million USD
2. Incidents of Attack
Fraud and theft risk is another common risk in the DeFi system. These kinds of attacks can come in different forms and are unpredictable. However, we can look at the attacks in 2 different aspects: points of the attack and the vulnerability pattern.
Currently, many DeFi protocols are working with other protocols, which can be in the form of clear terms and conditions between the developers (collaborative) or the form of aggregate. These processes can make the protocol functions more complicated and very hard to be analyzed by experts. In some cases, an attack on the protocol can cause enormous damage and also affect other protocols. Therefore, the point of attack can be categorized into a direct attack and an indirect attack through the relevant protocol.
Vulnerabilities can be broken down into three categories based on the level of the damage, vulnerability from system design, programming vulnerability, data breach vulnerability. The vulnerability from system design can come from unconcise economy structure design in the protocol. The attacker can perform an economic attack that causes damage to the asset holders. The programming vulnerability can come from bugs in the system which the attacker can perform a vulnerability attack. The data breach vulnerability comes from unsecured data protection. The attackers can have access to unauthorized data and use this data for attacks later.
As shown below, we can rate this factor based on the attack points and vulnerabilities in the past three months.
5
Never been attacked
4
Economic attack on relevant protocols
3
Being attacked through bugs or data breaches on relevant protocols
2
Economic attack on the protocol
1
Being attacked through bugs on the protocol
0
Being attacked through data breaches on the protocol
Adoption
1. Transaction Number
Protocol transaction number assessment allows us to evaluate the level of the adoption. High transaction numbers can indicate more financial services being used.
As shown in the table below, we can rate this factor by calculating the average daily transactions in the past one month and three months.
5
Greater than/equal to 1 Million transactions
Greater than/equal to 1 Million transactions
4
Greater than/equal to 500,000 transactions
Greater than/equal to 500,000 transactions
3
Greater than/equal to 100,000 transactions
Greater than/equal to 100,000 transactions
2
Greater than/equal to 50,000 transactions
Greater than/equal to 50,000 transactions
1
Greater than/equal to 10,000 transactions
Greater than/equal to 10,000 transactions
0
Less than 1 Million transactions
Less than 1 Million transactions
2. Transaction value
Transaction value assessment allows us to analyze market participation from big investors and institutions. Therefore, a high average transaction value can imply industry acceptance and may increase the adoption.
As shown below, we can rate this factor by calculating the average daily transactions value for the past one month and three months.
5
Greater than 1 Million USD
Greater than 1 Million USD
4
Greater than 500,000 USD
Greater than 500,000 USD
3
Greater than 100,000 USD
Greater than 100,000 USD
2
Greater than 50,000 USD
Greater than 50,000 USD
1
Greater than 10,000 USD
Greater than 10,000 USD
0
Less than 1 Million USD
Less than 1 Million USD
3. Stakers
Assessing the number of stakers allow us to evaluate the credibility. A high number of stakers can imply customer confidence and can lead to more adoption.
As shown below, we can rate this factor based on the number of stakers in the blockchain ecosystem (the same protocol can be in different blockchain ecosystems),
5
Greater than or equal to 100,000 accounts
4
Greater than or equal to 50,000 accounts
3
Greater than or equal to 10,000 accounts
2
Greater than or equal to 5,000 accounts
1
Greater than or equal to 1,000 accounts
0
Less than 1,000 accounts
We summarize all factors and sub-factors for asset selection and risk assessment below.
Last updated
Was this helpful?