Wormhole
DAMASCUSBridge / Messaging · Multi-chain · $1B+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
75
80
85
70
72
68
50
78
62
66
96
75
80
85
70
72
68
50
78
62
66
96
Audit History
Bug Bounty Program
Assessment
Dominant cross-chain bridge, connects 30+ chains. $320M exploit (2022) is the defining event - rebuilt with improved security but historical scar permanently impacts D6/D7/D10. Post-exploit improvements are real.
Dimension Breakdown
How scores work →- No validated findings in BlackHart tracker
- D7 = 100 (clean protocol per tracker reconciliation)
- No validated adversarial findings — score set to neutral baseline
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "wormhole"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("wormhole")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.