LogoLogo
Home Page
  • Get Started
    • What is Tren Finance?
      • LP Tokens
      • Money Market Deposits
      • Concentrated Liquidity Positions
      • PT Tokens
    • FAQ
  • TrenOS
    • What is TrenOS?
    • AI Agent Network
    • Learning & Data Processing
    • Agent Specialization
      • Interest Rate + Borrowing Fee Optimizer
      • XY
      • Asset Risk
      • Gauge
      • User Interaction
      • Market Sentiment
      • Yield Optimization
      • Proof of Liquidity
      • Collateral Manager
      • Liquidation Prediction
      • Ecosystem
    • Vector Databases & AI Knowledge Storage
    • TrenOS Architecture
    • Community-Driven AI Expansion
  • Protocol
    • Protocol Design & Risk Management
    • Isolated Modules
    • Liquidations
    • Asset Risk
      • Liquidity Risk
      • Oracle Risk
      • Security Risk
      • Centralisation Risk
    • Proof-of-Liquidity
    • Hooks
      • Looping Leverage
      • Rebase Token Wrapper
      • Auto-Rollover
      • Auto-Compounder
      • Router
    • FlashMint
    • Fees
    • Single Sided Liquidity (SSL)
    • Gauges
  • Tokens
    • XY
    • TREN & veTREN
  • Resources
    • Official Links
    • Security Audits
    • Contract Addresses
      • Withdrawing via Smart Contracts
    • Media Kit
Powered by GitBook
LogoLogo
On this page

Was this helpful?

  1. Protocol
  2. Asset Risk

Centralisation Risk

PreviousSecurity RiskNextProof-of-Liquidity

Last updated 6 months ago

Was this helpful?

As mentioned in the section, the technical security risk review encompasses a large portion of the centralisation risk process. This is because the smart contract of an asset can be assessed based on centralisation factors such as whether the contract is multi-sig, whether the contract is upgradeable vs immutable, whether the contract is permissionless, and if there are any built-in functions like minting in the contract.

A more qualitative approach is also used to assess the governance structure of an asset. Block explorers and bubble maps will be used to determine the percentage of the supply the top holders of the token control. In general, the more decentralised an asset is, the better. Governance rules and functionalities of the protocol governing an asset will also be analysed to account for centralisation risk.

Security Risk
Page cover image