Beefy Finance
TEMPEREDYield Aggregator · Multi-chain · $300M+ TVL · 20 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
55
60
75
35
50
80
50
65
60
100
55
60
75
35
50
80
50
65
60
100
Audit History
Bug Bounty Program
Assessment
Beefy is architecturally simple per-vault (positive) but has critical third-party farm dependency that transfers all risk externally (negative). 67-month maturity and survival through one exploit provide solid track record. The D4 compositional risk score of 35 is the anchor -- each vault is only as safe as its underlying farm. No cross-vault contagion limits systemic risk. Comparable to Yearn V2 in architecture but with wider chain surface.
Dimension Breakdown
How scores work →- Owner-based ACL (no role separation: owner controls strategy migration, token rescue, fee config)
- Strategy has separate keeper/strategist/manager roles but all controlled by same Beefy team
- No on-chain timelock for most admin functions (only strategy migration has approvalDelay)
- Vault owner can call inCaseTokensGetStuck (rescue) but cannot touch want token
- earn() is fully permissionless with no rate limiting
- Simple share/asset model (deposit/withdraw). getPricePerFullShare should be monotonic.
- No flash loan surface in vault itself
- First-depositor inflation attack possible on fresh vaults without dead shares
- Performance fee capped but fee config is external contract (modifiable)
- harvest() swap creates MEV sandwich opportunity on every compound
- Vault does not use price oracles directly (no liquidation, no collateral)
- Strategy swap routing relies on DEX spot prices (no TWAP protection in base)
- getPricePerFullShare is an implicit oracle used by external integrators
- Some strategies use Chainlink for swap path optimization (varies per strategy)
- Higher score because oracle dependency is indirect, not core to safety
- Beefy live since October 2020 (67+ months)
- Vault V7 is latest iteration, evolved from V1-V6
- ~$350M TVL across 20+ chains, hundreds of vaults
- One significant exploit in 2022 (Fantom strategy vulnerability, ~$11M)
- Post-exploit: improved security reviews, strategy safeguards added
- Z-factor: 0.788 (strong maturity signal)
- Beefy operates as a DAO with BIFI token governance
- Core team controls strategy deployments and vault parameters
- Strategy migration has timelock (approvalDelay) but owner controls
- No formal on-chain governance for parameter changes
- Community can propose strategies but deployment is permissioned
- Immunefi bounty program active
- Multiple community audits but no top-tier formal audit of core vault
- Simple per-vault architecture limits blast radius
- Third-party farm dependency is the weakest adversarial link
- Harvest sandwich attacks are a known, accepted MEV cost
- No validated adversarial findings — score set to neutral baseline
- Active monitoring of vaults and strategy health
- Keeper infrastructure for automated harvests
- panic() mechanism for emergency farm withdrawal
- Multi-chain operational complexity increases surface area
- Incident response demonstrated in 2022 exploit (funds partially recovered)
- CRITICAL DIMENSION: Each vault depends entirely on its underlying farm protocol
- Strategy calls external farm.deposit/withdraw/getReward -- any farm exploit = total loss
- Swap via unirouter: external DEX dependency for every harvest
- Multi-chain deployment means different farms, routers, bridges per chain
- No isolation between farm failure and vault loss (1:1 coupling)
- Saving grace: each vault is independent, no cross-vault contagion
- Appears in 1 cross-protocol cascade chain(s)
- Member of 2 dependency cluster(s)
- Score: 100/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Uses OpenZeppelin for ERC20, Ownable, ReentrancyGuard
- Solidity 0.8.x (overflow protection built-in)
- Strategy code is templated but each farm integration is custom
- Hundreds of strategy contracts, each a potential supply chain entry point
- Verified on block explorers across chains
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "beefy"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("beefy")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.