Synapse Protocol
DAMASCUSBridge · Multi-chain · $100M+ TVL · 10 contracts
Public risk assessment — scores are produced with the same methodology as monitored protocols
Security Profile
68
72
68
58
62
78
62
72
68
68
72
68
58
62
78
62
72
68
Audit History
Bug Bounty Program
Assessment
Major cross-chain bridge with 57+ months live. Bridge sector has inherently high risk profile. Multiple bridge mechanisms and multi-chain deployments add operational complexity. Clean exploit history despite sector-wide vulnerability trends.
Dimension Breakdown
How scores work →- Bridge admin controls
- Guardian for emergency pause
- Relayer permissions
- Multisig operations
- Bridge fee model
- SYN token staking
- Liquidity pool model for bridging
- nUSD stableswap
- Cross-chain message verification
- Relayer-based oracle model
- Optimistic verification with fraud proofs
- Trust assumptions in relayers
- Live since August 2021 (57+ months)
- Major cross-chain bridge
- Survived bridge exploit era
- Protocol improvements over time
- SYN governance
- Community governance
- Bridge governance challenges
- Decentralization growing
- Bridge sector has high exploit rate
- Multiple audits
- Active bounty
- Cross-chain security inherently complex
- Relayer operations
- Multi-chain monitoring
- Incident response
- Growing infrastructure
- Multi-chain bridge surface
- Deep cross-chain dependencies
- Multiple bridge mechanisms
- Integration with many chains
- Standard Solidity
- Multi-chain deployments
- Verified contracts
- Complex dependency graph
Additional Dimensions
- Not assessed — excluded from BRI computation
Risk Drivers
Primary risk factors driving this score, ordered by severity.
Adversarial Risk Signals
Observable security posture indicators. These signals reflect publicly verifiable information and responsible disclosure outcomes. No specific vulnerability details are exposed.
Score History & Verification
Score provenance tracking begins with the next reassessment.
On-Chain Data
- Protocol Slug
- "synapse"
- Oracle
- BRORegistry (Base)
- Evidence
- IPFS (pinned)
- Staleness Threshold
- 24 hours
registry.getScore("synapse")Reduce exploitable risk
BlackHart Monitoring provides continuous adversarial analysis, vulnerability detection, remediation support, and verified reassessment when your risk posture improves.