Beefy Finance
TEMPEREDYield Aggregator · Multi-chain · $300M+ TVL · 20 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
55
60
75
35
50
80
50
65
54
100
55
60
75
35
50
80
50
65
54
100
Audit History
Bug Bounty Program
Assessment
Beefy is architecturally simple per-vault (positive) but has critical third-party farm dependency that transfers all risk externally (negative). 67-month maturity and survival through one exploit provide solid track record. The D4 compositional risk score of 35 is the anchor -- each vault is only as safe as its underlying farm. No cross-vault contagion limits systemic risk. Comparable to Yearn V2 in architecture but with wider chain surface.
Dimension Breakdown
How scores work →- Immunefi bounty program active
- Multiple community audits but no top-tier formal audit of core vault
- Simple per-vault architecture limits blast radius
- Third-party farm dependency is the weakest adversarial link
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "beefy"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("beefy")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.