risk-assessment
Risk Assessment
Evaluate the risk profile of a DeFi protocol by examining its security history, oracle dependencies, treasury, fundamentals, and yield levels.
Workflow
Step 1 - Resolve the protocol entity
defillama:resolve_entity
entity_type: "protocol"
name: "<user-provided name>"
Step 2 - Hack history
Check whether the protocol has been exploited before.
More from defillama/defillama-skills
yield-strategies
Guide for querying DeFi yield and APY data using get_yield_pools. Covers pool filtering by token, chain, protocol, category, stablecoin-only mode, and capacity assessment. Explains APY conventions, lending vs borrowing rates, and sort options. Use when users ask about yields, APY, lending rates, borrowing costs, best pools, or DeFi yield strategies.
96defi-market-overview
>
92protocol-deep-dive
>
91defillama-setup
>
90defi-data
Core reference for DefiLlama MCP tools. Maps DeFi questions to the correct tool call with proper parameters. Covers entity conventions, metric interpretation, stock vs flow distinctions, percentage formatting, and error recovery. Use whenever querying DeFi data — protocol TVL, token prices, chain metrics, fees, revenue, yields, stablecoins, bridges, ETFs, hacks, raises, treasuries, or institutional holdings.
90chain-ecosystem
>
89