Usual Protocol
DAMASCUSRWA Stablecoin · Ethereum · $500M+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
60
72
95
100
82
60
50
75
55
60
72
95
100
82
60
50
75
55
Audit History
Bug Bounty Program
Assessment
RWA-backed stablecoin protocol (USD0/USD0++) backed by T-bills. Young protocol (18+ months) with rapidly growing TVL. Novel redemption and yield mechanism. Custodian trust assumptions and early governance are main risk vectors.
Dimension Breakdown
How scores work →- Admin controls
- Multisig operations
- Standard access patterns
- Treasury management
- RWA-backed stablecoin model
- USD0 and USD0++ design
- Yield from T-bills
- Novel redemption mechanism
- RWA price feeds
- T-bill rate oracle
- Limited on-chain verification
- Custodian trust assumption
- Live since mid-2024 (18+ months)
- Growing TVL rapidly
- No exploits
- Young protocol
- USUAL governance token
- Early governance
- Team controls operations
- Decentralization pending
- Audited
- Active bounty
- Limited battle-testing
- RWA custody is key risk
- No validated adversarial findings — score set to neutral baseline
- Professional team
- Treasury operations
- Custodian coordination
- Active development
- DeFi integration growing
- Curve/Pendle pools
- USD0++ composability
- Limited cross-chain
- Standard Solidity
- OpenZeppelin
- Verified
- Clean deps
Additional Dimensions
- Not assessed — excluded from BRI computation
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "usual"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("usual")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.