Due Diligence Framework

Clearstar Standard

General Due Diligence

6 assessment areas that apply to every opportunity we evaluate - assets, protocols, and blockchains alike.

6
Areas
Universal
Coverage
Foundation
Framework

Governance and Access Control

Understanding who truly controls the protocol and under what conditions they can act. We assess the decentralization of power and the safeguards against malicious upgrades or internal attacks. Any unclear admin rights trigger immediate disqualification.

๐Ÿ”‘

Contract Ownership

Analysis of contract ownership and admin key structure.

โœ๏ธ

Multisig Configuration

Verification of multisig signers and thresholds.

โณ

Timelock Duration

Evaluating the duration for protocol upgrades to pass.

๐Ÿšจ

Emergency Powers

Assessment of emergency powers and their triggers.

๐Ÿ›๏ธ

Governance Model

Comparing on-chain vs. off-chain governance dynamics.

Smart Contract Security

The foundation of protocol safety. We look beyond basic audits to evaluate true code maturity, complexity risks, and external dependencies that could introduce vulnerabilities. These checks also apply to asset-specific smart contracts.

๐Ÿ“

Audit History

Review of audit history and the firm's reputation.

๐Ÿ› ๏ธ

Critical Findings

Status of critical findings and their remediation.

โฑ๏ธ

Production Time

Measuring time in production without incidents.

๐Ÿงฉ

Code Complexity

Evaluating code complexity and attack surfaces.

๐Ÿ”—

External Dependencies

Analysis of external dependencies and composability risks.

Oracle Security

Price feeds are a common vector for manipulation. We analyze how protocols source external data and their resilience against oracle manipulation attacks. Protocol dependency chains often reveal hidden oracle risks.

๐Ÿ“ก

Price Feed Source

Evaluation of price feed sources and methodology.

โš–๏ธ

Oracle Setup

Comparing single oracle vs. multi-oracle setups.

๐Ÿ•’

Staleness Thresholds

Review of staleness thresholds and fallback logic.

๐Ÿ›ก๏ธ

Manipulation Resistance

Assessing manipulation resistance mechanisms.

๐Ÿ›‘

Circuit Breakers

Implementation of circuit breakers and deviation limits.

On-Chain Financial Audit

Verifying the real financial health of the protocol by confirming assets on-chain, ensuring adequate backing, and checking the segregation of funds. Commingled assets or untraceable fund flows are automatic disqualifiers.

๐Ÿ”

TVL Verification

Verification of Total Value Locked against on-chain data.

๐Ÿ’Ž

Reserve Backing

Analysis of reserve backing and collateral ratios.

๐Ÿ”€

Fund Flow Analysis

Tracing fund flows and checking wallet separation.

๐Ÿฆ

Fund Segregation

Segregation between treasury and user funds.

๐Ÿ“ˆ

Historical Solvency

Verification of the protocol's historical solvency.

Team Reputation and Transparency

Technology is built by humans. We assess the background, track record, and structural setup of the core team to gauge their reliability and competence during stress. Evasive communication from teams is a critical red flag.

๐Ÿ‘ฅ

Team Background

Reviewing founder and core team backgrounds.

๐Ÿ†

Track Record

Assessing the team's track record in previous projects.

๐Ÿš‘

Incident Response

Review of historical incident response handling.

๐Ÿ’ฌ

Communication

Evaluating communication quality during stress periods.

๐Ÿ›๏ธ

Legal Structure

Analysis of legal entity structure and jurisdiction.

Economic Design

A protocol must be economically sustainable. We evaluate whether yields are driven by real revenue, how incentives are structured, and the mechanics for handling bad debt. See our fee structure analysis for protocol-specific economics.

๐Ÿ’ฐ

Yield Source

Differentiating between real revenue and mere emissions.

๐ŸŒฑ

Incentive Sustainability

Evaluating token incentive sustainability over time.

๐Ÿงพ

Fee Structure

Analysis of fee structure and protocol revenue generation.

๐Ÿ“‰

Liquidation Mechanics

Assessing liquidation mechanics and bad debt handling.

๐ŸŽฏ

Economic Attack Vectors

Thorough analysis of potential economic attack vectors.

Clearstar Due Diligence

Back to Main Due Diligence

Return to the central hub to see how these 6 areas form the foundation of our entire assessment framework.

View Main DD Framework