Wallets Rating Methodology
How do we calculate the score?
Points system
We assess each aspect of the project’s security following our Wallet Security Rating system
Is the token audited?
Penetration Testing
Penetration testing must be performed on an actual version of an infrastructure. If the infrastructure has a major update, it must be retested.
1. Penetration testing must be performed on all components of the infrastructure.
2. Penetration testing must be performed on production, not staging, or developers’ versions.
3. Penetration testing reports must include information about performed testing actions and must include all findings.
4. A company must demonstrate that all findings are fixed.
5. A company which performs penetration testing must not be affiliated a with wallet and must not have any personal interests in successful compliance.
10Full Scope
0Partial Scope
Pentest Relevance
Was it done in the last year?
10Yes
0No
Bug Bounty
Scope Coverage
10Full scope
5Half scope
0Else
Scope Clearness
10Testing must be performed on production versions, not staging or developer ones if there is a clear set of in- or out-of-scope vulnerabilities written in technical language
5If there is little information written vaguely
0No information
Acceptance
Less payment - fewer incentives for white-hat hackers to participate in a bug bounty program
2> $2.5K
4> $5K
6> $10K
8> $25K
10> $50K
Self/Third-Party Hosted
Third-party platforms significantly increase the efficiency of bug bounty programs, having white-hat hackers communities and ensuring that bug hunters receive the stated rewards.
5Self-hosted
10Third-party hosted
Language
0English is not present
10English is present
Disclosure Policy
10Yes
0No
Past Incidents
Severity
0Stolen funds
5Stolen user data
10No victims
Team Reaction
0A team did not react
5Team published incident post mortems
10A team made official statement with instruction for its users, incident post mortems and fixes
Is Problem Resolved?
10Yes
0No
Customer Security Features
Obligatory backup before usage
10Yes
0No
Detailed description of a transaction when signing
10Yes
0No
Restore methods (Self-Custody/Third Party Custody) a user takes
If self-hosted - user takes all the risks on his own.
If third-party services used for backup, the following 2/3 assets must be present:
- Something you know
- Something you have
- Something you are
10Self-hosted
102/3 (third-party custody)
01/3 (third-party custody)
Cold wallet compatibility (if it fits a wallet architecture).
10Yes if it doesn't fit the wallet architecture
0No
Scoring weights
We assess each aspect of the project’s security following a rating system
Penetration Tests
Pentest
0,5Pentest relevance
0,5
Bug bounty
Scope coverage
0,15Scope clearness
0,15Acceptance
0,4Self/third-party hosted
0,2Language
0,05Disclosure policy
0,05
Past Incidents
Severity
0,4Team reaction
0,2Is problem resolved?
0,4Actuality multiplier
Depending on time after incidentLess than 1 year ago
0>1 year ago
5>2 years ago
10
Customer Security Features
Obligatory backup before usage
0,1Detailed description of a transaction when signing
0,1Restore MethodsSelf-Custody/Third Party Custody
0,4Cold wallet compatibility (if it feets to the wallet architecture).
0,2
- OR
PIN and password to access a wallet
0,1Password requirements
0,1
Wallet Security Rating Calculation
We multiply the results received in the previous step and convert them into the rating score using the following weight
Penetration tests
0,25
Bug bounty
0,25
Past incidents
0,25
Customer security features
0,25