Recognition: unknown
Toward a Risk Assessment Framework for Institutional DeFi: A Nine-Dimension Approach
Pith reviewed 2026-05-08 16:38 UTC · model grok-4.3
The pith
DeFi risk assessment needs nine dimensions because five of twelve major incidents, including the largest systemic events, cannot be fully explained without the three new ones.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that a nine-dimension framework, formed by adding composability risk, comprehension debt, and temporal risk dynamics to the existing six-dimension taxonomy while introducing a transparency confidence modifier, provides complete root-cause characterization for DeFi incidents where prior approaches fall short. Retrospective application to twelve 2024-2026 events shows that five cases, including the two highest-systemic-impact ones, demand at least one novel dimension.
What carries the argument
The nine-dimension risk assessment framework, which augments prior taxonomies through structural dependency analysis of protocol interactions.
Load-bearing premise
The underlying protocol dependency map derived from the ontology infrastructure is accurate and complete enough to reveal when existing dimensions are insufficient.
What would settle it
Independent re-analysis of the same twelve incidents using only the original six dimensions that still fully accounts for root causes in all cases, including the two highest-impact events.
read the original abstract
Decentralized finance (DeFi) protocols now intermediate over USD 100 billion in value, including regulated stablecoins and tokenized assets deployed as collateral, yet no widely adopted framework operationalizes risk assessment at the rigor institutional adoption demands. Existing approaches emphasize protocol-specific parameter optimization or conceptual taxonomies without providing explainable, composability-aware, and structurally independent assessment methodologies. We propose a nine-dimension DeFi risk assessment framework extending the six-dimension taxonomy introduced by Moody's Analytics and Gauntlet with three novel dimensions: composability risk, comprehension debt, and temporal risk dynamics. We additionally introduce a transparency confidence modifier separating assessment reliability from risk severity. The framework is grounded in structural analysis of protocol dependencies conducted through an ontology-based protocol intelligence infrastructure covering more than 8,000 DeFi protocols. We retrospectively analyze 12 major DeFi-related incidents from 2024-2026 representing approximately USD 2.5 billion in direct losses. Five of the 12 incidents require at least one novel dimension for complete root-cause characterization, including the two highest-systemic-impact events in the dataset.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a nine-dimension DeFi risk assessment framework that extends the six-dimension taxonomy from Moody's Analytics and Gauntlet by adding three novel dimensions—composability risk, comprehension debt, and temporal risk dynamics—plus a transparency confidence modifier. It grounds the framework in structural dependency analysis via an ontology-based protocol intelligence infrastructure covering more than 8,000 DeFi protocols and validates the extensions through retrospective analysis of 12 major incidents (2024-2026, ~USD 2.5B losses), claiming that five incidents (including the two highest-systemic-impact events) require at least one novel dimension for complete root-cause characterization.
Significance. If the supporting methodology is supplied and shown to be reproducible, the work could strengthen institutional DeFi risk practices by offering a composability-aware, structurally independent alternative to parameter-optimization or purely conceptual approaches. The scale of the 8,000-protocol ontology infrastructure is a concrete strength that could enable falsifiable, dependency-mapped assessments; the identification of specific high-impact incidents where prior dimensions fall short provides a direct, testable rationale for the proposed extensions.
major comments (2)
- [Abstract and incident-analysis section] Abstract and incident-analysis section: the central claim that 'Five of the 12 incidents require at least one novel dimension for complete root-cause characterization' is load-bearing for the justification of the three new dimensions, yet no ontology-derived dependency graphs, failure-mode assignments to the original Moody's/Gauntlet dimensions, or explicit decision criteria for declaring an existing dimension insufficient are supplied. Without these mappings the determination cannot be checked against the claimed structural map of >8,000 protocols.
- [Ontology infrastructure description] Ontology infrastructure description: the grounding claim rests on 'structural analysis of protocol dependencies conducted through an ontology-based protocol intelligence infrastructure,' but the manuscript supplies neither the construction/validation methodology for the ontology nor per-incident examples of how it was applied to attribute root causes. This directly affects verifiability of the five-incident result.
minor comments (1)
- [Framework definition] The three novel dimensions are introduced without concise formal definitions or integration rules with the existing six dimensions; adding a short table or paragraph defining each and stating how they interact would improve clarity.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback. The comments accurately identify gaps in methodological transparency that are necessary to support the reproducibility of our claims regarding the ontology infrastructure and the incident analysis. We address each major comment below and describe the revisions we will make.
read point-by-point responses
-
Referee: [Abstract and incident-analysis section] Abstract and incident-analysis section: the central claim that 'Five of the 12 incidents require at least one novel dimension for complete root-cause characterization' is load-bearing for the justification of the three new dimensions, yet no ontology-derived dependency graphs, failure-mode assignments to the original Moody's/Gauntlet dimensions, or explicit decision criteria for declaring an existing dimension insufficient are supplied. Without these mappings the determination cannot be checked against the claimed structural map of >8,000 protocols.
Authors: We agree that the current manuscript lacks the explicit mappings, graphs, and decision criteria needed to verify the central claim. In the revised version we will add a dedicated subsection (and supporting appendix) that: (i) presents simplified ontology-derived dependency graphs for the five incidents, (ii) assigns each incident's failure modes to the original six Moody's/Gauntlet dimensions, and (iii) states the explicit criteria used to determine when an existing dimension is insufficient. These additions will be tied directly to the >8,000-protocol structural map. revision: yes
-
Referee: [Ontology infrastructure description] Ontology infrastructure description: the grounding claim rests on 'structural analysis of protocol dependencies conducted through an ontology-based protocol intelligence infrastructure,' but the manuscript supplies neither the construction/validation methodology for the ontology nor per-incident examples of how it was applied to attribute root causes. This directly affects verifiability of the five-incident result.
Authors: The referee correctly notes that the manuscript provides only a high-level description. We will expand the 'Ontology Infrastructure' section to include: the data sources and crawling methodology used to cover the 8,000+ protocols, the ontology schema and its validation procedures against known incidents, the dependency extraction algorithms, and concrete per-incident examples (including the two highest-systemic-impact events) showing how the infrastructure was applied to attribute root causes. This will enable readers to assess reproducibility. revision: yes
Circularity Check
No significant circularity in the derivation chain
full rationale
The paper extends an external six-dimension taxonomy (Moody's Analytics and Gauntlet) with three novel dimensions, grounding the extension in retrospective analysis of 12 historical incidents via a described ontology infrastructure covering over 8,000 protocols. This does not reduce to self-definition, fitted inputs renamed as predictions, or load-bearing self-citations, as the ontology is presented as an independent structural map and the incidents are external events. No equations, uniqueness theorems, or ansatzes are shown to make the claim that five incidents require novel dimensions equivalent to the inputs by construction. The derivation remains self-contained against the stated external benchmarks and taxonomy.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption The six-dimension taxonomy introduced by Moody's Analytics and Gauntlet constitutes a valid and complete base that can be extended without re-derivation.
- domain assumption The ontology-based analysis of more than 8,000 protocols accurately captures structural dependencies relevant to risk.
invented entities (3)
-
composability risk
no independent evidence
-
comprehension debt
no independent evidence
-
temporal risk dynamics
no independent evidence
Reference graph
Works this paper leans on
-
[1]
S&P Global Ratings Corporate Methodology,
S&P Global Ratings, "S&P Global Ratings Corporate Methodology," S&P Global, Jan. 7, 2024. [2] R. C. Merton, "On the pricing of corporate debt: The risk structure of interest rates," Journal of Finance, vol. 29, no. 2, pp. 449–470, May 1974, doi: 10.1111/j.1540-6261.1974.tb03058.x
-
[2]
Basel Committee on Banking Supervision, Basel III: Finalizing post-crisis reforms, BCBS d424, Bank for International Settlements, Dec. 2017
2017
-
[3]
Moody’s Analytics and Gauntlet, Block by Block: Assessing Risk in Decentralized Finance, Moody’s Investors Service, Jan. 2022. 18
2022
-
[4]
SoK: Decentralized finance (DeFi),
S. M. Werner, D. Perez, L. Gudgeon, A. Klages-Mundt, D. Harz, and W. J. Knottenbelt, "SoK: Decentralized finance (DeFi)," in Proc. 4th ACM Conf. Advances in Financial Technologies (AFT ’22), Sep. 2022, pp. 30–46, doi: 10.1145/3558535.3559780. Preprint: arXiv:2101.08778
-
[5]
SoK: Decentralized finance (DeFi) — Fundamentals, taxonomy and risks,
K. Gogol, C. Killer, M. Schlosser, T. Bocek, B. Stiller, and C. J. Tessone, "SoK: Decentralized finance (DeFi) — Fundamentals, taxonomy and risks," arXiv:2404.11281 [q-fin.GN], Apr. 2024
-
[6]
Assessing risk in DeFi — The Exponential whitepaper,
Enterprise Ethereum Alliance, EEA DeFi Risk Assessment Guidelines, Version 1, Jul. 17, 2024. [8] D. Kuang, O. Rivera, and M. Lebbar, "Assessing risk in DeFi — The Exponential whitepaper," Exponential.fi, ca. 2023
2024
-
[7]
Chaos Labs Is Leaving Aave,
DeFi Safety, Process Quality Review (PQR) Methodology, Version 0.9, DeFi Safety, 2023. [10] O. Goldberg, "Chaos Labs Is Leaving Aave," Aave Governance Forum, Topic 24386, posted Apr. 6, 2026. https://governance.aave.com/t/chaos-labs-is-leaving-aave/24386
2023
-
[8]
Manage- ment Science 47, 236–249
L. Eisenberg and T. H. Noe, "Systemic risk in financial systems," Management Science, vol. 47, no. 2, pp. 236–249, Feb. 2001, doi: 10.1287/mnsc.47.2.236.9835
-
[9]
DebtRank: Too central to fail? Financial networks, the FED and systemic risk,
S. Battiston, M. Puliga, R. Kaushik, P. Tasca, and G. Caldarelli, "DebtRank: Too central to fail? Financial networks, the FED and systemic risk," Scientific Reports, vol. 2, art. 541, Aug. 2012, doi: 10.1038/srep00541
-
[10]
American Economic Review 105, 564–608
D. Acemoglu, A. Ozdaglar, and A. Tahbaz-Salehi, "Systemic risk and stability in financial networks," American Economic Review, vol. 105, no. 2, pp. 564–608, Feb. 2015, doi: 10.1257/aer.20130456
-
[11]
Systemic risk in DeFi: A network-based fragility analysis of TVL dynamics,
S. Zhang et al., "Systemic risk in DeFi: A network-based fragility analysis of TVL dynamics," arXiv:2601.08540 [q-fin.RM], Jan. 2026
-
[12]
W. Wu et al., "DeXposure: A dataset and benchmarks for inter-protocol credit exposure in decentralized financial networks," arXiv:2511.22314 [cs.CR], Nov. 2025
-
[13]
A. Shu et al., "DeXposure-FM: A time-series, graph foundation model for credit exposures and stability on decentralized financial networks," arXiv:2602.03981 [cs.LG], Feb. 2026
-
[14]
Mapping microscopic and systemic risks in TradFi and DeFi: A literature review,
S. Aufiero et al., "Mapping microscopic and systemic risks in TradFi and DeFi: A literature review," arXiv:2508.12007 [q-fin.RM], Aug. 2025
-
[15]
Computing systemic risk measures with graph neural networks,
L. Gonon, T. Meyer-Brandis, and N. Weber, "Computing systemic risk measures with graph neural networks," arXiv:2410.07222 [q-fin.RM], Oct. 2024
-
[16]
The devil is in the tails: Actuarial mathematics and the subprime mortgage crisis,
C. Donnelly and P. Embrechts, "The devil is in the tails: Actuarial mathematics and the subprime mortgage crisis," ASTIN Bulletin, vol. 40, no. 1, pp. 1–33, May 2010, doi: 10.1017/S0515036100015907
-
[17]
The Formula That Killed Wall Street
D. MacKenzie and T. Spears, "‘The formula that killed Wall Street’: The Gaussian copula and modelling practices in investment banking," Social Studies of Science, vol. 44, no. 3, pp. 393–417, Jun. 2014, doi: 10.1177/0306312713517157
-
[18]
T. Lebo, S. Sahoo, and D. McGuinness, Eds., PROV-O: The PROV Ontology, W3C Recommendation, Apr. 30, 2013
2013
-
[19]
In: 2023 IEEE Symposium on Security and Privacy
L. Zhou, X. Xiong, J. Ernstberger, S. Chaliasos, Z. Wang, Y. Wang, K. Qin, R. Wattenhofer, D. Song, and A. Gervais, "SoK: Decentralized Finance (DeFi) Attacks," in Proc. 2023 IEEE Symp. Security and Privacy (SP), May 2023, pp. 2444–2461, doi: 10.1109/SP46215.2023.10179435. Preprint: arXiv:2208.13035. 19
-
[20]
shadow contagion
@PeckShieldAlert, post on X (Twitter), Apr. 1, 2026, introducing the term “shadow contagion” in connection with the Resolv incident. Corroborated and elaborated in: Sherlock Research Team, The Sherlock Web3 Security Report, Q1 2026, Sherlock, Apr. 6, 2026
2026
-
[21]
Comprehension Debt in GenAI-Assisted Software Engineering Projects
M. O. Ahmad, "Comprehension debt in GenAI-assisted software engineering projects," arXiv:2604.13277 [cs.SE], Apr. 2026
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[22]
From Technical Debt to Cognitive and Intent Debt: Rethinking Software Health in the Age of AI
M.-A. Storey et al., "From technical debt to cognitive and intent debt: Rethinking software health in the age of AI," arXiv:2603.22106 [cs.SE], Mar. 2026
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[23]
How AI impacts skill formation,
J. H. Shen and A. Tamkin, "How AI impacts skill formation," arXiv:2601.20245 [cs.LG], Feb. 2026. [27] T. Baum, K. Schneider, and A. Bacchelli, "Associating working memory capacity and code change ordering with code review performance," Empirical Software Engineering, vol. 24, no. 4, pp. 1762–1798, Aug. 2019, doi: 10.1007/s10664-018-9676-8
-
[24]
P. Wurzel Gonçalves, E. Fregnan, T. Baum, K. Schneider, and A. Bacchelli, "Do explicit review strategies improve code review performance? Towards understanding the role of cognitive load," Empirical Software Engineering, vol. 27, no. 4, art. 99, Jul. 2022, doi: 10.1007/s10664-022-10123-8
-
[25]
Smart contract security: A practitioners’ perspective,
Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang, "Smart contract security: A practitioners’ perspective," in Proc. IEEE/ACM 43rd Int. Conf. Software Engineering (ICSE ’21), May 2021, pp. 1410–1422, doi: 10.1109/ICSE43902.2021.00127
-
[26]
Epistemic debt: A concept and measure of technical ignorance in smart manufacturing,
T. B. Ionescu, S. Schlund, and C. Schmidbauer, "Epistemic debt: A concept and measure of technical ignorance in smart manufacturing," in Advances in Production Management Systems (APMS 2019), IFIP AICT, vol. 567, Springer, 2020, pp. 60–68, doi: 10.1007/978-3-030-29996-5_7
-
[27]
ASRI: An aggregated systemic risk index for cryptocurrency markets,
M. Farzulla and A. Maksakov, "ASRI: An aggregated systemic risk index for cryptocurrency markets," arXiv:2602.03874 [q-fin.RM], Feb. 2026
-
[28]
Who to regulate? Identifying actors within DeFi’s governance,
A. Born, Z. Gati, C. Lambert, M. Naeem, and A. Pellicani, "Who to regulate? Identifying actors within DeFi’s governance," ECB Working Paper Series No. 3208, European Central Bank, Mar. 2026
2026
-
[29]
Smart contract and DeFi security tools: Do they meet the needs of practitioners?,
S. Chaliasos, M. A. Charalambous, L. Zhou, R. Galanopoulou, A. Gervais, D. Mitropoulos, and B. Livshits, "Smart contract and DeFi security tools: Do they meet the needs of practitioners?," in Proc. IEEE/ACM 46th Int. Conf. Software Engineering (ICSE ’24), Apr. 2024, art. 60, pp. 1–13, doi: 10.1145/3597503.3623302. Preprint: arXiv:2304.02981. 20
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.