Aave V3
MITHRILLending / Borrowing · Multi-chain · $15B+ TVL · 30 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
90
91
85
78
92
95
96
90
55
55
90
91
85
78
92
95
96
90
55
55
Audit History
Bug Bounty Program
Assessment
Gold standard lending protocol. Zero validated findings, 38-month V3 track record, org since 2017. IRRATIONAL game equilibrium confirms no profitable deviation. 880 reflects massive structural surface area (991 nodes, 2601 edges) balanced by exceptional defense depth. Near-ADAMANTINE but Chainlink dependency and flash loan callback surface prevent top tier.
Dimension Breakdown
How scores work →- Score derived from continuous adversarial security research
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "aave-v3"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("aave-v3")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.