• Sec. Infra Overview
  • Past Audits
  • Code Structure
  • Centralization
  • Exposure to other Defi
  • Recommendation
  • User Rating
  • Back
protocol logo

Diva Finance

Rating

AA

Score81.00

Derivatives

Sec. Infrastructure Overview

Current Bug Bounty:

No Bug Bounty

Bug Bounty Max Payout: 0 $
Has paid White Hats before:
Date of Last Audit: 1 Jan 1

Recent Security Incidents

  • Incident

    Amount Lost

    Date

Secured By

The Protocol is secured by

  • Name

    Type

    Website

  • logo of list item
    0

Past Audits

Number of Audits

2

Number of Vul. Found

10

Date of Last Audit

1 Jan 1

Past Audit Reports

Last codebase change was on: 1 Jan 1

Show Code Locations
Show all Vulnerabilities

Vulnerabilities reported in past audits

Code Structure

Lines of Code

0

Amount of Contracts

58

External Integrations

0

Code Summery

The main purpose of the DIVA Protocol is to provide a platform for creating, trading, and settling derivative contracts in a peer-to-peer manner. It serves as an OTC marketplace that facilitates the development of various derivative financial applications. Users can leverage basic web2/web3 programming skills to build their own applications on the DIVA Protocol. Additionally, the protocol supports a conditional donation platform and offers tools for visualizing derivative product offers, which can be shared on social media. The DIVA Protocol encourages innovation by showcasing the best applications developed within its ecosystem.

Show Dependency Graph

Code Structure & Dependency

Show Codefile metrics

Centralization

Decentralization Score

15 out of 20

Contract Upgradability

No upgradability

Frontend

Go to Dapp

Maintenance Score

3.00

Poor

Excellent

Admin / Governance Functions

Timelocks

Uses Timelocks

Pauseability

No pause

Admin Wallet

0xE39dEC81B2186A1A2e36bFC260F3Df444b36948A

Use timelocks in settlement process

Recommendations

transferring shortfall risk and receiving immediate capital, can bundle and securitize the collateral recoverable from the policies into a synthetic asset and use it as collateral to secure a loan.

User Rating

Avg. User Rating

No ratings

No ratings yet

Submit your review

Protocols on SCAS can't offer incentives to hide reviews

Disclaimer:

SCAS conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.

In case you find any information on this report is incorrect, please fill out following form:Feedback