Data Sources and Storage
Our assessments combine on-chain, off-chain, and risk analysis data.
Data Sources
On-chain data
Contract events, calls, balances, transfers
Historical behaviour (e.g., exploits, depegs, slashing events)
Off-chain disclosures
Audit reports and security reviews
Whitepapers, docs, governance forums, legal disclosures
Proprietary heuristics
Signals, derived from on-chain events and enriched with off-chain classification and machine learning models
Direct protocol information
Where data is not publicly available, we may request additional information from protocol teams, if necessary under NDA
For compliance, we run KYB and sanctions checks via an external provider where relevant
Storage and Documentation
Each rating question is answered by the analyst and documented with sources, proof, and reasoning in an internal, secure data storage.
Where possible, sources and proofs are cited in the risk reports and fact sheets so that users can trace back the rationale.
Last updated