Security
The security endpoints can be used to retrieve details of vulnerability and security statistics of certain smart contracts of the protocols our system supports.
Note: The sample request below shows security data for aave
protocol.
curl https://api.alterscope.org/data/security/aave/vulnerabilities -H "Authorization: Bearer <your_access_token>"
Note: For a comprehensive list of protocols whose security vulnerability data can be requested please refer to supported protocols page.
The sample response below will display security vulnerability data of corresponding protocol for the past 7 days.
{
"status":true,
"data":[
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-11-02T01:00:28.045588377Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-11-01T01:00:32.121854132Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-10-31T01:00:33.904022906Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-10-30T01:00:34.351041721Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-10-29T01:00:33.599495637Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-10-28T01:00:28.690077933Z"
},
{
"protocol":"aave",
"vulnerability_statistics":{
"high":3,
"low":84,
"medium":3,
"none":0
},
"timestamp":"2023-10-27T01:00:41.726485931Z"
}
]
}
protocol: Name of the protocol. For supported list of protocols check here. vulnerability_statistics: The severity of vulnerabilities is often categorized into three levels: High, Medium, Low and their numbers are specified.
High-severity vulnerabilities are critical weaknesses that pose a significant threat to the security of a system.
Medium-severity vulnerabilities are less critical than high-severity ones but still pose a notable risk to the security of a system.
Low-severity vulnerabilities are the least critical, representing weaknesses that have a relatively minor impact on security.
timestamp: Date and Time associated with the protocol data.
Note: The sample request below shows security static data for aave
protocol.
curl https://api.alterscope.org/data/security/aave/static -H "Authorization: Bearer <your_access_token>"
Note: For a comprehensive list of protocols whose data can be requested please refer to supported protocols page.
{
"status":true,
"data":[
{
"protocol":"aave",
"contract_creation_date":"Jun-08-2022 12:30:46 PM +UTC",
"last_contract_update_date":"Jun-08-2022 12:30:46 PM +UTC",
"num_hacks":0,
"most_active_contract":"0x301F221bc732907E2da2dbBFaA8F8F6847c170c3",
"active_contract_num_transactions":748,
"team_visibility":true,
"bounty_amount":250000
}
]
}
Bounty Amount: The highest permissible reward offered for identifying and reporting a critical vulnerability within the protocol's smart contracts
Active Contract Transactions: This factor involves monitoring the number of transactions conducted on the project's smart contracts.
Most Active Contract: This parameter identifies the most active contract within the DeFi project that is experiencing the highest number of transactions.
Hacks: Hacks refers to the total count of unauthorized modifications, breaches, or exploits recorded within a specific protocol version.
Team Data Public: A boolean parameter that indicates whether data about the DeFi project's development team is publicly available.
Protocol: Refers to the specific decentralized finance (DeFi) protocol whose security static data is requested.
Contract Creation Date: This heading indicates the date and time when the smart contract associated with the specific protocol was created.
Last Contract Update Date: This heading denotes the date and time of the most recent update made to the smart contract governing the specific protocol.
Note: The sample request below shows security score for the specified chain and its protocol.
curl https://api.alterscope.org/score/security/ethereum/aave -H "Authorization: Bearer <your_access_token>"
Note: For a comprehensive list of protocols and chains whose data can be requested please refer to supported protocols and chains page.
The sample response below will display security score data of corresponding protocol for the past 7 days.
{
"status":true,
"data":[
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463088808193,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308725872129,
"version":2,
"timestamp":"15-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463088808193,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308725872129,
"version":2,
"timestamp":"15-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463088808193,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308725872129,
"version":2,
"timestamp":"15-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463088808193,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308725872129,
"version":2,
"timestamp":"14-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463100955889,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308733970594,
"version":2,
"timestamp":"13-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463100955889,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308733970594,
"version":2,
"timestamp":"12-01-2024"
},
{
"chain":"ethereum",
"protocol":"aave",
"creation_score":87.39463100955889,
"monitoring_score":0,
"support_score":0.75,
"ux_score":0,
"score":0.5851308733970594,
"version":2,
"timestamp":"11-01-2024"
}
]
}
Chain: Refers to the blockchain network where the protocol operates. For supported list of chains check here.
Protocol: Specifies the protocol being used. For supported list of protocols check here.
Creation Score: A numerical score representing the protocol's creation process. It likely considers factors such as development progress, community engagement, and technology used.
Monitoring Score: Indicates the level of monitoring applied to the protocol.
Support Score: Reflects level of support from development ecosystem, various support forums or backing the protocol has received, possibly from investors, developers, or other stakeholders.
UX Score: Stands for User Experience Score, which evaluates how user-friendly the protocol's interface is.
Score: An overall assessment score that combines various metrics to provide a comprehensive evaluation of the protocol's performance or quality.
Version: Indicates the version number of the protocol being referenced.
Timestamp: Specifies the date and time when this data was recorded.
Last updated