DeepHigh
  • Welcome
  • Architecture
    • Compound
    • Venus
  • Threat Modeling
    • Identification of Function
    • Risk Library
    • Threat Enumeration
      • Enumeration
    • Risk Tree
  • Lending Invariant
    • Invariant
      • Aave V3
      • Venus
      • Euler V2
      • BIFI
      • Inverse Finance
      • Omni
      • BendDAO
      • Airpuff
      • Goldfinch
      • Wildcat
    • General Precautions
  • Edge Function
    • Flash Loan
    • BadDept
      • Auction
    • Mode
      • E-Mode
    • Leverage
    • Custom Pool
Powered by GitBook
On this page
  1. Threat Modeling

Risk Library

The Risk Library has been meticulously crafted based on comprehensive analyses of audit reports from existing lending protocols. By drawing on extensive documentation, security assessments, and risk evaluations presented in these audit reports, we’ve aimed to compile a detailed and reliable repository. This approach ensures that the Risk Library not only reflects best practices and industry standards but also captures insights into potential vulnerabilities and mitigation strategies as observed across established lending frameworks. This robust foundation underscores the thoroughness of our risk assessment methodology and highlights our commitment to providing a well-informed and secure resource for protocol safety and integrity.

DeepHigh AL Spreadsheets

PreviousIdentification of FunctionNextThreat Enumeration

Last updated 7 months ago