Due Diligence Framework

Blockchain Due Diligence

8 assessment areas for evaluating L1s, L2s, and sidechains before deploying capital on new infrastructure. Layer upon our General DD framework.

8 Areas
Assessment Scope
Chain-Specific
Focus Layer
Infrastructure Analysis
Evaluation Type

Decentralisation and Validator Set

🌐

Validator Distribution

Number and distribution of validators securing the network.

βš–οΈ

Stake Concentration

Stake concentration and Nakamoto coefficient analysis.

πŸ—ΊοΈ

Geographic Diversity

Geographic and jurisdictional diversity of node operators.

πŸ”„

Rotation Mechanism

Validator selection and rotation mechanisms over time.

Consensus Mechanism and Security Model

🀝

Consensus Algorithm

Core consensus algorithm and finality guarantees.

πŸ›‘οΈ

Economic Security

Attack cost calculations and overall economic security.

βš”οΈ

Slashing Conditions

Slashing conditions, fault attribution, and penalties.

πŸ”

Theoretical Vulnerabilities

Known theoretical vulnerabilities and network threat vectors.

Client Diversity and Implementation Risk

πŸ’»

Client Implementations

Number of distinct client implementations available.

πŸ“Š

Client Distribution

Client software distribution among network validators.

πŸ›‘οΈ

Security Coverage

Bug bounty programs and continuous security audit coverage.

βš™οΈ

Upgrade Coordination

Process and risk management for network upgrades.

Uptime and Reliability

⏱️

Historical Uptime

Historical uptime records and frequency of network outages.

🧱

Block Consistency

Block time consistency under varying network loads.

🚨

Incident Response

Track record of incident response by core development teams.

🩹

Recovery Procedures

Network halt recovery procedures and stress testing.

Maturity and Ecosystem Development

⏳

Mainnet Maturity

Time since mainnet launch and Lindy effect evaluation.

πŸ› οΈ

Developer Activity

Developer activity metrics and overall tooling quality.

🌊

DeFi Ecosystem

Depth, diversity, and liquidity of the native DeFi ecosystem. Evaluate protocols via Protocol DD.

πŸŒ‰

Interoperability

Bridge infrastructure and cross-chain interoperability options.

Validator Behaviour and Centralisation Risk

πŸ’Έ

MEV Practices

MEV extraction practices and structural advantages.

🚫

Censorship Capabilities

Documented censorship incidents or network capabilities.

🏦

Pool Concentration

Liquid staking token (LST) and staking pool concentration. Assess LSTs via Asset DD.

πŸ‘‘

Foundation Influence

Foundation or core team influence over validator sets.

Bridge Security and Cross-Chain Risk

πŸ—οΈ

Canonical Bridge Design

Canonical bridge architecture and trust assumptions.

πŸ“œ

Audit History

Bridge smart contract audits and historical incident logs.

πŸ”—

Third-Party Exposure

Ecosystem exposure to third-party messaging protocols.

πŸ’Ž

Asset Backing

Verification procedures for wrapped and synthetic assets. Check via asset mechanisms.

Regulatory and Jurisdictional Risk

πŸ›οΈ

Foundation Jurisdiction

Legal jurisdiction of the core foundation and team.

πŸ“

Validator Concentration

Regulatory exposure from validator jurisdiction concentration.

πŸ“‹

Regulatory Posture

Overall regulatory posture and proactive compliance measures.

πŸ›‘

Censorship Policies

Network-level censorship capabilities and formal policies. Review red flags for disqualifiers.

Due Diligence

Comprehensive Risk Analysis

Clearstar’s evaluation models cover Blockchain Infrastructure, DeFi Mechanisms, and Smart Contract Security.

View All DD Frameworks
Explore our full documentation