Area 1: Technical Security
Evaluates how robust the code is and how well the protocol is designed to withstand external attacks.| Evaluation Item | Checklist / Points to Verify | Importance |
|---|---|---|
| Audit |
| Highest |
| Bug Bounty Program |
| High |
| Track Record |
| High |
| Admin Key Structure |
| High |
| Dependencies |
| Medium |
| Code Disclosure & Documentation |
| Medium |
Area 2: Economic Security
Evaluates whether the protocol’s yield sources, tokenomics, and risk mechanisms are sustainable and resilient even under extreme market conditions.| Evaluation Item | Checklist / Points to Verify | Importance |
|---|---|---|
| Liquidity |
| Highest |
| Yield Source Consistency |
| High |
| TVL and Volatility |
| High |
| Liquidation / Deleveraging Mechanisms |
| High |
| Insurance / Safety Fund |
| Medium |
Area 3: Operational & Governance Trust
Evaluates how trustworthy and transparent the operating team or DAO is.| Evaluation Item | Checklist / Points to Verify | Importance |
|---|---|---|
| Team Structure & Reputation |
| High |
| Off-chain Operational Risk |
| High |
| Governance Transparency |
| Medium |
| VCs and Partners |
| Low |