Veda
TEMPEREDYield Vault · Ethereum · $100M+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
60
62
65
52
38
20
50
70
48
100
60
62
65
52
38
20
50
70
48
100
Audit History
Bug Bounty Program
Assessment
Very new yield optimization protocol (6 months). D6 extremely low (20) for minimal maturity. D5 low (38) for centralized governance. Yield vault model composes across strategies (D4=52). Lowest maturity tier alongside Royco.
Dimension Breakdown
How scores work →- Admin controls vault strategies
- User deposits permissionless
- Strategy allocation managed centrally
- Upgrade authority concentrated
- Yield vault optimization model
- Multiple strategy allocation under single vault
- Strategy failure can impact depositors
- Novel yield optimization approach
- Standard price feeds for asset valuation
- Internal accounting for vault share pricing
- Strategy yield reporting mechanisms
- Moderate oracle dependency
- Live since late 2024 (~6 months)
- Very new yield protocol
- Minimal production stress history
- Z-factor: 0.5
- Fully centralized governance
- No on-chain governance mechanism
- Team controls all strategy decisions
- Pre-decentralization stage
- Maximum resilience under independent adversarial testing
- Comprehensive security coverage across all attack surfaces
- Mature codebase with extensive battle testing
- No validated adversarial findings — score set to neutral baseline
- Small team operations
- Strategy management complexity
- Limited monitoring infrastructure
- No incident response track record
- Vault composes across multiple DeFi strategies
- Each strategy adds composition surface
- Strategy rebalancing interactions
- Novel composition patterns in yield space
- Member of 1 dependency cluster(s)
- No cross-protocol cascade exposure detected
- Score: 100/100 (higher = more isolated from systemic risk)
- Source: cross_protocol_composition.json dependency analysis
- Modern Solidity
- Standard dependencies
- Vault architecture dependencies
- Moderate supply chain complexity
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "veda"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("veda")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.