Announcement

DeFiScan: Verifiable insights into the maturity and risks of DeFi infrastructure

DeFiScan: Verifiable insights into the maturity and risks of DeFi infrastructure

🚨The DeFiScan framework presented here has been updated on 2024-12-13 based on the discussion here.

DeFiScan is a new framework formalizing the decentralization stages of DeFi protocols. It allows, for the first time, to assess and monitor the maturity and risks of DeFi technology in a verifiable manner. DeFiScan will foster transparency and make DeFi more secure for everyone.

These stages can be summarized as follows:

  • Stage 0 - Full Training Wheels: This is the first stage where a DeFi protocol is effectively controlled by an operator. External dependencies are not secured with fallbacks and access can be restricted (censored) both on the chain and user interface level. Yet, its logic and performance can be inspected, monitored and validated by anyone giving it a foundation for the gradual decentralization.

  • Stage 1 - Limited Training Wheels: In the second stage, critical permissions and dependencies are either revoked or replaced with more secure mechanisms such as a Security Council, an exit window of at least 7 days for users or appropriate fallbacks. Furthermore, the underlying chain cannot censor users’ transactions and a backup user interface exists guaranteeing access to user funds.

  • Stage 2 - No Training Wheels: The final stage is reached when permissions have been fully revoked or delegated to a transparent, on-chain governance system with ample time for users to exit in case of an unwanted protocol update. Remaining risks from external dependencies, the underlying chain and user interfaces have been eliminated. The protocol now operates fully autonomous.

  • Review - Stage Unclear: The review of a protocol cannot be completed due to missing information or a change in conditions. As a result, the analysis is incomplete or inaccurate and the Stage unclear.

Background

DeFi technology goes through a number of stages characterized by different degrees of decentralization. Upon deployment, DeFi protocols often expose critical risks from centralized permissions and dependencies. As the protocol matures, these risks are eliminated through the introduction of fallbacks, exit windows and other mechanisms. To date, however, these stages of progressing maturity have not been formalized resulting in a lack of transparency both for users and developers.

The framework presented here, DeFiScan, is inspired by three main streams of previous work:

First, our analysis is based on the characterization of DeFi systems in terms of different technological layers and the centralization risks found on those layers as discussed e.g. in Buterin, Halpin, and Schuler et al.

Second, the formalization of centralization risk events is inspired by the risk classification systems found across the auditing industry. In particular, our Centralization Risk Scoring is informed by Immunefi’s Vulnerability Severity Classification System.

Finally, L2Beat’s work on L2 Rollup maturity and the Stages Framework which emphasizes the evolving nature of decentralization in maturing L2 technologies. Today, L2Beat is the accepted standard for measuring the maturity of L2s and monitoring the related risks. The framework presented here is heavily inspired by L2Beat’s Stages Framework. In particular, we adopt the three decentralization stages and propose five dimensions of centralization risks which reflect the nuances of all types of DeFi protocols.

DeFi Centralization Risks

A broad range of DeFi technologies exists covering all major financial verticals including exchanges, lending & borrowing and derivatives. All these technologies can be characterized by the same layers and the respective centralization risks. We classify these centralization risks in five fundamental dimensions and assign each a risk score on the scale of “High”, “Medium” and “Low” risk. These risk scores then ultimately imply the stage of decentralization and the maturity of a DeFi protocol.

Chain

This concerns the chain (L1, L2) on which a DeFi protocol is deployed. The rationale for starting the analysis with the chain is that the related centralization risks directly propagate to the DeFi protocol and its users. For instance, the ability to censor users’ transactions on a given chain translates to all DeFi protocols deployed on the chain and their users. DeFi protocols have no means to mitigate this risk apart from carefully identifying a chain with the desired maturity before deployment.

The risk score for the Chain dimension is assigned as follows:

HighMediumLow
L2Beat Stage 0L2Beat Stage 1Ethereum mainnet or a comparable L1, or

L2Beat Stage 2

Upgradability

Upgradability refers to the ability of a permission owner to make changes to a DeFi protocol. Thereby, the permissioned updates are not limited to the strict notion of smart contract upgrades but cover all sorts of changes to the contracts and their parameters. Hence, more generally we speak of permissioned (update) functions that exist in a DeFi protocol and the respective permission owners who are in control of these functions.

As seen from various incidents in the past, the ability to update a DeFi protocol introduces critical risks including that of exploits, unintended side-effects or censorship. As is general practice in auditing firms, these risks can be classified based on their severity: “Critical”, if it can result in the direct theft or loss (aka permanent freezing) of user funds. “High”, if it can result in the theft or loss of unclaimed yield. “Medium” and “Low” if it can cause interruptions but does not materially change the expected performance of the DeFi protocol. The risks associated with permissioned functions across all sorts of DeFi protocols can be classified in this same way.

Over the lifecycle of DeFi protocols, the control over such permissioned functions is revoked in stages in order to mitigate the associated risks. In the final stage, control over critical permissions is either fully revoked or transferred to an on-chain governance system and coupled with an exit window. As a result, the expected performance of the DeFi system cannot be altered anymore eliminating the associated risks and giving users maximal predictability.

The risk score for the Upgradability dimension is assigned as follows:

HighMediumLow
Possible updates may result in the theft or loss of user fundsPossible updates may result in the theft or loss of unclaimed yield or may otherwise materially change the system (but user funds remain unaffected)Possible updates do not materially change the system (or result in the theft or loss of user funds and unclaimed yield)

Autonomy

This addresses possible risks from external dependencies in a DeFi protocol and failures thereof. Prominent examples include stablecoins backed by fiat assets, which are held in custody by third parties, lending protocols making use of external price feeds, aka oracles, and aggregators integrating with external yield sources. The risk of failures of a DeFi protocol typically arise from missing sanity checks and fallback mechanisms.

The risk assessment thus focuses on the identification of external dependencies and the existence of mechanisms to prevent a DeFi protocols to fail in case of a dependency failure. Similar to the Upgradeability dimension, the classification of risks arising from dependencies can be based on the same severity assessment. While the nuances of different DeFi technologies play into the severity assessment, this risk classification system can again be applied across all sorts of technologies.

The risk score for the Autonomy dimension is assigned as follows:

HighMediumLow
Failure of a dependency may result in the theft or loss of user fundsFailure of a dependency may result in the theft or loss of unclaimed yield or may otherwise materially change the performance of the system (but user funds remain unaffected)Failure of a dependency does not materially change the performance of the system (or result in the theft or loss of user funds and unclaimed yield)

Exit Window

An exit window allows users to withdraw assets before an unwanted update is implemented in a DeFi protocol. Exit windows are often implemented through timelock contracts which enforce a certain time period between the queuing and execution of an update. During this period, users are able to withdraw their funds or otherwise adjust their position in a DeFi protocol prior to the execution of the update.

Exit windows thus are an important element of a robust governance process in a DeFi protocol. In particular, exit windows are an effective mechanism to mitigate the risks associated with permissioned functions often found in the early stages of a DeFi technology. Moreover, in the early stages these update functions are often coupled with less robust permission ownership setups, such as low threshold multisigs. In this setup, exit windows can significantly reduce the risks for users while allowing a DeFi team to implement a more robust governance process.

Thereby, the additional guarantees an Exit Window can give of course depends on the potential impact of the underlying permissions it protects. The analysis of the Exit Window and its risk scores is thus coupled with the scores achieved in the Upgradeability dimension by a protocol.

The risk score for the Exit Window dimension is assigned as follows:

HighMediumLow
Upgradeability score is "High" AND permissions are NOT protected with an exit window or the exit window is less than 7 daysUpgradeability score is "Medium" OR permissions are protected with an exit window of at least 7 daysUpgradeability score is "Low" OR permissions are transferred to an on-chain governance process AND protected with an exit window of at least 30 days

Accessibility

User interfaces facilitate users’ interactions with a DeFi protocol and are thus an important element of the DeFi stack. The inability to access the DeFi protocol or targeted access restrictions can result in the loss of user funds, e.g. through liquidations in a volatile market environment, or add cost to recover inaccessible funds. Hence, availability and diversity in user interfaces significantly reduces these risks. Similar to the other dimensions these risks are often accepted in the early stages of a DeFi technology and only mitigated as it matures. It is thus equally important to capture this element when assessing and monitoring the maturity of a DeFi protocol.

The risk score for the Accessibility dimension is assigned as follows:

HighMediumLow
A single user interface exists without a backup solutionA single user interface exists with public access to a backup solution such as a self-hosting appMultiple independent user interfaces exist, e.g. websites, in-wallet access, etc., guaranteeing access to user funds even if one interface is shutdown

DeFi Stages

The maturity of DeFi systems typically progresses in stages. Along these stages, control over permissioned functions is gradually revoked with the goal to eliminate the associated risks. Our DeFi Stages framework thus directly relates to the risk scores discussed above.

Stage 0 - Full training wheels

This is the first stage of a DeFi protocol where basic requirements give the technology a decentralized foundation. Critical permissions are still controlled by centralized operators and external dependencies may expose critical risks to users. Yet, its logic and performance can be inspected, monitored and validated by anyone giving it a foundation for the gradual decentralization.

The following requirements qualify a DeFi protocol to enter Stage 0:

  • âś… Blockchain-based, financial technology
  • âś… Assets are not in custody by centralized entity
  • âś… Public documentation exists that outlines the protocol and its expected performance
  • âś… Source-available codebase
  • âś… Verified contracts

Stage 1 - Limited training wheels

In the second stage, risks from critical permissions and dependencies are significantly reduced by: either revoking critical permissions, or establishing a Security Council (see qualifying criteria below) to control such permissions, or enforcing an exit window of at least 7 days so users can withdraw funds in case of an unwanted protocol update. Critical risks from external dependencies are mitigated by the implementation of appropriate fallback mechanisms. Furthermore, the underlying chain cannot censor users’ transactions and a backup user interface exists guaranteeing access to user funds.

The requirements to enter Stage 1 can be summarized as follows:

  • âś… At least “Medium” risk score for Chain, Autonomy, Accessibility
  • âś… IF Exit Window receives “High” risk, THEN control over permissions MUST be transferred to a Security Council

Stage 2 - No training wheels

The final stage is reached when critical permissions have either been revoked or delegated to an on-chain governance system with ample time for users to exit in case of an unwanted protocol update. Risks from external dependencies have been further reduced such that users’ funds and unclaimed yield remain unaffected by a failure. In addition, different independent user interfaces and a fully decentralized underlying chain guarantee access to users’ funds at any time.

To enter Stage 2, a DeFi protocol has to satisfy the following requirements:

  • âś… At least “Low” risk score for Chain, Autonomy, Exit Window, Accessibility

Review - Stage unclear

The review of a protocol cannot be completed due to missing information or a change in conditions. As a result, the analysis is incomplete or inaccurate and the Stage unclear.

Acceptable reason for the use of this stage are:

  • Public documentation is missing or incomplete but the team is working on a fix
  • Source code, or parts thereof, are not publicly available but the team is working on a fix
  • Peripheral smart contracts, but not the core contracts, are not verified on a public block explorer but the team is working on a fix

Security Council

Delegating control over permissioned functions from the initial Operators to a Security Council, or on-chain governance system, is a critical step for a maturing DeFi system. The objective of this step is to eliminate the possibility of a group of insiders to abuse, willingly or forcibly, their control and introduce a more robust governance process around the use of permissioned functions. It is thus important to define the requirements for a setup to qualify as a Security Council.

Specifically, we propose an acceptable Security Council setup to consist of a multisig account with the following requirements on its signers:

  • At least 7 signers
  • At least 50% threshold
  • At least 51% non-team signers
  • Signers are publicly announced (with name or pseudonym)

While the requirements defined here are opinionated, they have proven meaningful and practical. Similar setups are found across a number of matured DeFi systems and are, in fact, used by L2beat’s requirement for Stage 1 rollups.

What’s Next

We have presented a framework, DeFiScan, for the formalization of the decentralization stages generally observed in DeFi technology. For the first time, we are able to assess and monitor the maturity and related risks in DeFi protocols in a verifiable manner. In the coming days, we will launch https://defiscan.info, a website providing information on the decentralization stage and risks for DeFi protocols. In the weeks to follow, we will launch different programs to boost coverage to 99% of the DeFi market and thereby foster more transparent and secure DeFi infrastructure.

Related Posts

The DeFi Collective - June 2024 Report
Monthly report
The DeFi Collective - June 2024 Report

Welcome to the Collective’s June impact and treasury report. As expected, the Collective’s overall revenues continued to move lock-step with the market and contracted compared to May. However, with expenses also down, the surplus is preserved, which leaves the Collective in a comfortable position moving into July. The impact was also steady, with a renewed focus on mission-critical protocols established across all chains.

  • Avatar of Luude Luude
Read More
Release of the DeFi Protocol Guidelines
Policy
Release of the DeFi Protocol Guidelines

The DeFi Collective is committed to fostering the decentralization of financial infrastructure.

  • Avatar of Nils Bundi Nils Bundi
Read More
The DeFi Collective - September 2024 Report
Monthly report
The DeFi Collective - September 2024 Report

Welcome to the Collectives’ September impact and treasury report. After August’s stellar performance, September revenues trended back towards the baseline of recent months with the spike of L1 revenues, driven by KEROSENE’s performance reversing however, L2 revenues picked back up to be on par with previous months.

  • Avatar of Luude Luude
Read More