Fluid (Instadapp)
DAMASCUSLending / DEX · Ethereum · $1B+ TVL · 15 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
75
78
78
68
65
65
72
80
75
75
78
78
68
65
65
72
80
75
Audit History
Bug Bounty Program
Assessment
Novel lending/DEX hybrid from the Instadapp team. Combines proven team experience with innovative architecture. Young protocol but benefits from Instadapp's 5+ year track record. DEX-lending integration adds complexity.
Dimension Breakdown
How scores work →- Instadapp heritage with governance controls
- Smart account architecture
- Admin permissions for protocol parameters
- Multisig operations
- Lending/borrowing with DEX integration
- Liquidation mechanism
- Interest rate model
- Novel vault architecture
- Chainlink oracle integration
- Fallback mechanisms
- Price validation
- Standard oracle pattern
- Launched 2024 (relatively young)
- Instadapp team experience 5+ years
- Growing TVL
- Novel architecture
- Instadapp governance heritage
- Team controls parameters
- Governance evolving
- Foundation structure
- Audited by multiple firms
- Active bounty program
- Instadapp security track record
- Novel protocol needs more time
- Instadapp team operations
- Monitoring infrastructure
- Professional team
- Active development
- DEX + Lending combination
- Multiple DeFi integrations
- Smart account complexity
- Cross-protocol dependencies
- Standard Solidity
- OpenZeppelin
- Verified
- Clean dependencies
Additional Dimensions
- Not assessed — excluded from BRI computation
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "fluid"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("fluid")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.