Cryptoexchanges Rating Methodology
How the score is calculated?
Points system
We assess each aspect of the project’s security following a rating system
Server Security
SSL/TLS Certificate
A robust SSL/TLS certificate with strong encryption and proper server configuration ensures secure communications between servers and clients.
For detailed best practices, please review the SSL/TLS Deployment Best Practices document.
Example tool for checking SSL/TLS score: SSL Labs SSL Test.10
A+
9
A
8
A-
6
B
5
C
3
D
2
E
1
F
0
T or M
WAF and CDN presence
Web Application Firewall (WAF) combined with Content Delivery Network (CDN) services provides protection against web-based threats while optimizing global traffic distribution and website availability.
Providers like Cloudflare and AWS offer integrated WAF solutions.
Example tool for evaluation: Wappalyzer extension.10
Yes
0
No
SPF and DNSSEC Presence
These protocols protect email integrity and secure DNS lookups. SPF validates email sources to prevent spoofing, while DNSSEC secures DNS queries against tampering. Both implementations are scored independently.
Example tool for checking SPF & DNSSEC: MXToolbox SuperTool.5
SPF Record Found
5
DNSSEC Setup Found
0
Neither is found
HTTP Headers
HTTP response headers must be configured to enforce modern security policies that reduce exposure to web vulnerabilities.
For guidance on proper header configuration, please refer to the Security Headers documentation.
Example Tool for checking HTTP headers: Security Headers.10
A
8
B
6
C
4
D
2
E
0
F
Spam DB Presence
Helps in identifying and filtering out potentially malicious sources by referencing databases of known spam sources.
10
0 blacklists
5
1-3 blacklists
0
3+ blacklists
Cookie Flags
Cookie security is enhanced through three key flags: HTTP Only, Secure, and SameSite. These flags protect against cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks.
5
HTTP Only set
3
Secure set
2
SameSite set
0
Neither is found
User Security
2-factor Authentication
Two-factor authentication adds an essential second layer of verification beyond passwords.
10
Yes
0
No
Password Requirements
A strict password policy enforces complexity standards including minimum length, digits, uppercase letters, and special characters.
3
Length >= 8 characters
1
Length over 32 character
2
Digit
2
Uppercase
2
Special character
Device Management
Device management allows users to review and manage all devices connected to their accounts, including the option to terminate any unfamiliar and unwanted sessions.
5
List of current sessions
5
Terminate other session
Anti-phishing Code
A customizable anti-phishing identifier that helps users to verify the authenticity of communications during login, transactions, and in received emails.
10
Yes
0
No
Withdrawal Whitelist
Withdrawal whitelisting restricts transfers to pre-approved addresses, thereby limiting the risk of unauthorized transactions.
10
Yes
0
No
Captcha
CAPTCHA implementation on registration and other key forms prevents automated attacks and ensures only legitimate user interactions occur.
10
Yes
0
No
Certifications
ISO 27001
ISO 27001 certification demonstrates compliance with international information security management standards.
The actual certification documentation is required for validation.10
Yes
0
No
CCSS
Cryptocurrency Security Standard (CCSS) certification provides specific protection against cryptocurrency-related threats with the main focus on preventing Access Control attacks.
To validate the certificate, please provide the certification ID, which can be verified through the Crypto Consortium lookup tool.5
Level 1
10
Level 2
10
Level 3
0
No
Bug Bounty
Active Bug Bounty
A structured bug bounty initiative in collaboration with reputable third parties encourages independent white-hat hackers for vulnerability reporting.
Self-hosted bug bounty programs will receive half the score.10
3d party hosted
5
Self-hosted
0
No
Penetration Test
Pentest
Penetration testing evaluates system security through simulated cyber-attacks.
Conducting annual, comprehensive penetration tests across all application layers — including web, API, and mobile — is essential to identify and mitigate security weaknesses.
Please refer to our blogpost explaining the criteria we use to evaluate the penetration tests: Penetration Test Requirements.10
100%
9
90%
8
80%
7
70%
6
60%
5
50%
4
40%
3
30%
2
20%
1
10%
0
No
Incidents and response to them
Insurance Fund
A dedicated reserve or insurance fund provides protection against potential losses arising from security breaches or other unforeseen incidents.
For futures exchanges, an insurance fund feature is required; spot exchanges must maintain either a dedicated reserve or third-party insurance.10
Yes
0
No
Scoring weights
We multiply the received result with the scoring system
Server Security
12User Security
15Pentest
25Bug Bounty
25ISO 27001
10CCSS
10Insurance Fund
3
Score calculation
We convert the sum of scored points to the rating
90-100
AAA
85-89
AA
80-84
A
70-79
BBB
65-69
BB
60-64
B
50-59
CCC
45-49
CC
40-44
C
30-39
DDD
25-29
DD
1-24
D
0
E
Certification
CER certification is given to crypto exchanges that have been assessed by our specialists according to 3 main criteria: penetration test, proof of funds, and bug bounty.
Penetration Test
A crypto exchange with the maximum score for penetration test gets a certification. The highest score is given for penetration test with 100% scope coverage and with zero critical and high severity issues after the remediation.
Penetration test is valid for 1 year, and should be resubmitted annually.
Please refer to our blogpost explaining the criteria we use to evaluate the penetration tests: Penetration Test Requirements.Proof of Reserves Audit
A crypto exchange gets a certification if it verifies its solvency by submitting a Proof of Reserves audit performed by an established cybersecurity firm, verifying financial integrity and asset security.
Proof of Reserves audit is valid for 1 year, and should be resubmitted annually.Bug Bounty
A crypto exchange with the maximum score for bug bounty program gets a certification.
The highest point is given to the programs launched on third-party platforms. A structured bug bounty initiative in collaboration with reputable third parties encourages independent white-hat hackers for vulnerability reporting.
A self-hosted bug bounty program may be evaluated as third-party managed if the platform provides a review by a reputable third-party auditor.
Calculate a final rating
Impact on CoinGecko Trust Score
Coingecko
Trust Score