Midas
TEMPEREDRWA / Tokenization · Ethereum · $100M+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
60
68
55
72
40
25
54
70
55
100
60
68
55
72
40
25
54
70
55
100
Audit History
Bug Bounty Program
Assessment
Very new tokenized treasury protocol (14 months). D6 extremely low (25) for minimal maturity. D5 low (40) for fully centralized governance. D3 low (55) due to off-chain oracle dependency. Simple contracts but high centralization risk.
Dimension Breakdown
How scores work →- Admin controls minting/burning of tokenized treasury tokens
- KYC/AML gating on token access
- Centralized redemption process
- Whitelist-based access model
- 1:1 backing by US Treasuries (custodied off-chain)
- Redemption mechanism depends on off-chain process
- Low DeFi economic complexity
- Peg risk if custody arrangement fails
- NAV depends on off-chain treasury valuations
- Limited on-chain price verification
- Trust assumption in custodian reporting
- No real-time on-chain oracle for backing verification
- Live since early 2024 (~14 months)
- Very new tokenized treasury protocol
- No significant stress events
- Z-factor: 0.7
- Centralized company governance
- No on-chain governance mechanism
- Team controls all protocol parameters
- Regulatory compliance drives governance model
- Score derived from continuous adversarial security research
- Small operational team
- Off-chain treasury management complexity
- Custodian operational dependency
- Limited public operational documentation
- Limited DeFi composability (restricted tokens)
- Whitelist model limits composition surface
- Some DeFi integration for yield access
- Lower composition risk than open DeFi
- Member of 2 dependency cluster(s)
- No cross-protocol cascade exposure detected
- Score: 100/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Standard ERC-20 token contracts
- Simple smart contract architecture
- Low dependency complexity
- Centralized backend dependencies
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "midas"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("midas")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.