triangle decor
ball decor

Cryptoexchanges Rating Methodology

How the score is calculated?

Step 1

Points system

We assess each aspect of the project’s security following a rating system

  • Server Security

    chevron icon
    • SSL/TLS Certificate

      A robust SSL/TLS certificate with strong encryption and proper server configuration ensures secure communications between servers and clients.

      For detailed best practices, please review the SSL/TLS Deployment Best Practices document.

      Example tool for checking SSL/TLS score: SSL Labs SSL Test.

      • 10

        A+

      • 9

        A

      • 8

        A-

      • 6

        B

      • 5

        C

      • 3

        D

      • 2

        E

      • 1

        F

      • 0

        T or M

    • WAF and CDN presence

      Web Application Firewall (WAF) combined with Content Delivery Network (CDN) services provides protection against web-based threats while optimizing global traffic distribution and website availability.

      Providers like Cloudflare and AWS offer integrated WAF solutions.

      Example tool for evaluation: Wappalyzer extension.

      • 10

        Yes

      • 0

        No

    • SPF and DNSSEC Presence

      These protocols protect email integrity and secure DNS lookups. SPF validates email sources to prevent spoofing, while DNSSEC secures DNS queries against tampering. Both implementations are scored independently.

      Example tool for checking SPF & DNSSEC: MXToolbox SuperTool.

      • 5

        SPF Record Found

      • 5

        DNSSEC Setup Found

      • 0

        Neither is found

    • HTTP Headers

      HTTP response headers must be configured to enforce modern security policies that reduce exposure to web vulnerabilities.

      For guidance on proper header configuration, please refer to the Security Headers documentation.

      Example Tool for checking HTTP headers: Security Headers.

      • 10

        A

      • 8

        B

      • 6

        C

      • 4

        D

      • 2

        E

      • 0

        F

    • Spam DB Presence

      Helps in identifying and filtering out potentially malicious sources by referencing databases of known spam sources.

      • 10

        0 blacklists

      • 5

        1-3 blacklists

      • 0

        3+ blacklists

    • Cookie Flags

      Cookie security is enhanced through three key flags: HTTP Only, Secure, and SameSite. These flags protect against cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks.

      • 5

        HTTP Only set

      • 3

        Secure set

      • 2

        SameSite set

      • 0

        Neither is found

  • User Security

    chevron icon
    • 2-factor Authentication

      Two-factor authentication adds an essential second layer of verification beyond passwords.

      • 10

        Yes

      • 0

        No

    • Password Requirements

      A strict password policy enforces complexity standards including minimum length, digits, uppercase letters, and special characters.

      • 3

        Length >= 8 characters

      • 1

        Length over 32 character

      • 2

        Digit

      • 2

        Uppercase

      • 2

        Special character

    • Device Management

      Device management allows users to review and manage all devices connected to their accounts, including the option to terminate any unfamiliar and unwanted sessions.

      • 5

        List of current sessions

      • 5

        Terminate other session

    • Anti-phishing Code

      A customizable anti-phishing identifier that helps users to verify the authenticity of communications during login, transactions, and in received emails.

      • 10

        Yes

      • 0

        No

    • Withdrawal Whitelist

      Withdrawal whitelisting restricts transfers to pre-approved addresses, thereby limiting the risk of unauthorized transactions.

      • 10

        Yes

      • 0

        No

    • Captcha

      CAPTCHA implementation on registration and other key forms prevents automated attacks and ensures only legitimate user interactions occur.

      • 10

        Yes

      • 0

        No

  • Certifications

    chevron icon
    • ISO 27001

      ISO 27001 certification demonstrates compliance with international information security management standards.

      The actual certification documentation is required for validation.

      • 10

        Yes

      • 0

        No

    • CCSS

      Cryptocurrency Security Standard (CCSS) certification provides specific protection against cryptocurrency-related threats with the main focus on preventing Access Control attacks.

      To validate the certificate, please provide the certification ID, which can be verified through the Crypto Consortium lookup tool.

      • 5

        Level 1

      • 10

        Level 2

      • 10

        Level 3

      • 0

        No

  • Bug Bounty

    chevron icon
    • Active Bug Bounty

      A structured bug bounty initiative in collaboration with reputable third parties encourages independent white-hat hackers for vulnerability reporting.

      Self-hosted bug bounty programs will receive half the score.

      • 10

        3d party hosted

      • 5

        Self-hosted

      • 0

        No

  • Penetration Test

    chevron icon
    • Pentest

      Penetration testing evaluates system security through simulated cyber-attacks.

      Conducting annual, comprehensive penetration tests across all application layers — including web, API, and mobile — is essential to identify and mitigate security weaknesses.

      Please refer to our blogpost explaining the criteria we use to evaluate the penetration tests: Penetration Test Requirements.

      • 10

        100%

      • 9

        90%

      • 8

        80%

      • 7

        70%

      • 6

        60%

      • 5

        50%

      • 4

        40%

      • 3

        30%

      • 2

        20%

      • 1

        10%

      • 0

        No

  • Incidents and response to them

    chevron icon
    • Insurance Fund

      A dedicated reserve or insurance fund provides protection against potential losses arising from security breaches or other unforeseen incidents.

      For futures exchanges, an insurance fund feature is required; spot exchanges must maintain either a dedicated reserve or third-party insurance.

      • 10

        Yes

      • 0

        No

Step 2

Scoring weights

We multiply the received result with the scoring system

  • Server Security

    12
  • User Security

    15
  • Pentest

    25
  • Bug Bounty

    25
  • ISO 27001

    10
  • CCSS

    10
  • Insurance Fund

    3
Step 3

Score calculation

We convert the sum of scored points to the rating

  • 90-100

    AAA

  • 85-89

    AA

  • 80-84

    A

  • 70-79

    BBB

  • 65-69

    BB

  • 60-64

    B

  • 50-59

    CCC

  • 45-49

    CC

  • 40-44

    C

  • 30-39

    DDD

  • 25-29

    DD

  • 1-24

    D

  • 0

    E

Certification

CER certification is given to crypto exchanges that have been assessed by our specialists according to 3 main criteria: penetration test, proof of funds, and bug bounty.

  • penetration test icon

    Penetration Test

    A crypto exchange with the maximum score for penetration test gets a certification. The highest score is given for penetration test with 100% scope coverage and with zero critical and high severity issues after the remediation.

    Penetration test is valid for 1 year, and should be resubmitted annually.

    Please refer to our blogpost explaining the criteria we use to evaluate the penetration tests: Penetration Test Requirements.

  • proof funds icon

    Proof of Reserves Audit

    A crypto exchange gets a certification if it verifies its solvency by submitting a Proof of Reserves audit performed by an established cybersecurity firm, verifying financial integrity and asset security.

    Proof of Reserves audit is valid for 1 year, and should be resubmitted annually.

  • bug bounty icon

    Bug Bounty

    A crypto exchange with the maximum score for bug bounty program gets a certification.

    The highest point is given to the programs launched on third-party platforms. A structured bug bounty initiative in collaboration with reputable third parties encourages independent white-hat hackers for vulnerability reporting.

    A self-hosted bug bounty program may be evaluated as third-party managed if the platform provides a review by a reputable third-party auditor.

Calculate a final rating

  • Uncertified

    active stars

    0 of 3 criterias (pentest, bug bounty, proof of reserves audit) meet requirements

  • cer logo
    active stars

    1 of 3 criterias (pentest, bug bounty, proof of reserves audit) meet requirements

  • cer logo
    active stars

    2 of 3 criterias (pentest, bug bounty, proof of reserves audit) meet requirements

  • cer logo
    active stars

    3 of 3 criterias (pentest, bug bounty, proof of reserves audit) meet requirements

Impact on CoinGecko Trust Score

10

Coingecko
Trust Score

coingecko score chart coingecko score chart
Go to the exchanges rating