Pendle V2
TEMPEREDYield Trading · Multi-chain · $3B+ TVL · 15 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
73
68
62
65
60
78
44
80
47
77
73
68
62
65
60
78
44
80
47
77
Audit History
Bug Bounty Program
Assessment
Novel yield tokenization with complex economic model (D2=68) and heavy oracle dependency (D3=62, OR-001 known). High compositional risk from 30+ SY adapters (D4=65). Governance centralization (D5=60) is a drag. Good maturity and adversarial resilience (zero exploitable findings) lift the score within TEMPERED range.
Dimension Breakdown
How scores work →- Score derived from continuous adversarial security research
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "pendle-v2"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("pendle-v2")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.