Data Sources and Storage

Our assessments combine on-chain, off-chain, and risk analysis data.

Data Sources

  • On-chain data

    • Contract events, calls, balances, transfers

    • Historical behaviour (e.g., exploits, depegs, slashing events)

  • Off-chain disclosures

    • Audit reports and security reviews

    • Whitepapers, docs, governance forums, legal disclosures

  • Proprietary heuristics

    • Signals, derived from on-chain events and enriched with off-chain classification and machine learning models

  • Direct protocol information

    • Where data is not publicly available, we may request additional information from protocol teams, if necessary under NDA

    • For compliance, we run KYB and sanctions checks via an external provider where relevant

Storage and Documentation

  • Each rating question is answered by the analyst and documented with sources, proof, and reasoning in an internal, secure data storage.

  • Where possible, sources and proofs are cited in the risk reports and fact sheets so that users can trace back the rationale.

Last updated