Access Control
Permission models, admin surface, reentrancy protection, and authorization boundaries. #1 exploit vector by dollar loss in DeFi history.
How This Score Is Built
Permission models, admin surface, reentrancy protection, and authorization boundaries. #1 exploit vector by dollar loss in DeFi history.
Score Composition
Kernel-Module architecture with permissioned modifier on all Module functions
Kernel.modulePermissions cross-contract AC lookup gates every value-affecting function
Emergency policy has 8 distinct bypass guards (all cost=1.0): onlyKernel, permissioned, onlyExecutor, onlyGovernor, onlyGuardian, onlyPermitted, onlyVault, onlyRole
TRSRY authority_tau_star=0.75, MINTR/Staking/Clearinghouse/Emergency all tau_star=1.0
Kernel.executeAction blast_radius=0.613 (highest) but onlyExecutor-gated
Graph analysis: 7 contracts, 1633 functions, only 50 genuinely restricted at graph level (rest gated by cross-contract Kernel check)