Yearn Finance
MITHRILYield Aggregator · Multi-chain · $400M+ TVL · 20 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
80
82
82
58
78
90
68
80
82
80
82
82
58
78
90
68
80
82
Audit History
Bug Bounty Program
Assessment
Pioneer of yield aggregation, 75+ months live with zero core vault exploits. Strategy-level dependencies create composition risk but core vault architecture is proven. veYFI governance and community-driven strategy approval provide oversight.
Dimension Breakdown
How scores work →- Vault management permissions
- Strategy approval process
- Guardian for emergency
- Multisig operations
- Yield aggregation model proven
- Performance fees transparent
- Multiple strategy diversification
- Withdrawal queue management
- Strategy-dependent oracle usage
- Share price calculation from underlying
- No direct oracle dependency in vault core
- Strategy-level oracle risks
- Live since February 2020 (75+ months)
- Pioneer of yield aggregation
- Survived multiple market events
- Zero core vault exploits
- YFI governance proven
- veYFI staking model
- Community-driven strategy approval
- Reasonably decentralized
- Strategy-level exploits historically
- Core vaults clean
- Active bounty program
- Multiple auditors across versions
- Professional strategist operations
- Monitoring infrastructure
- yMechs keeper network
- Incident response demonstrated
- Deep DeFi strategy dependencies
- Strategies interact with many protocols
- yVault composability across DeFi
- Strategy failure cascades to vault
- Standard Solidity
- Vyper for V2 vaults
- Verified contracts
- Strategy dependencies vary
Additional Dimensions
- Not assessed — excluded from BRI computation
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "yearn"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("yearn")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.