Sec. Infrastructure Overview
No Bug Bounty
Recent Security Incidents
Incident
Amount Lost
Date
Past Audits
3
51
1 Jan 1
Past Audit Reports
Last codebase change was on: 1 Jan 1
- CompanyDateNumber of Vul FoundLink
- 1 Jan 10
- 1 Jan 10
- 1 Jan 10
Code Structure
0
12
0
Code Summery
Hats Protocol transforms organizations into programmable digital entities, automating onboarding and permission management through on-chain roles called "hats." Each hat, represented as an ERC-1155 token, encapsulates responsibilities, permissions, and incentives, allowing for flexible control by individuals or groups. The system promotes accountability by enabling agents to evaluate and revoke roles as necessary. Hats can be easily integrated with various automations, enhancing organizational efficiency and decision-making. This infrastructure aims to support the next era of digital collaboration and governance.
Centralization
13 out of 20
No upgradability
Go to Dapp
2.00
Poor
Excellent
Admin / Governance Functions
Timelocks
Uses Timelocks
Pauseability
No pause
Admin Wallet
Admins can Create new hat Issue hat to wearer(s), aka “t”dit hat properties (while mutable) Transfer hat (while mutable)
Can not be paused
No Timelocks
Recommendations
There should never be more than 1 module enabled on the safe No multisig transactions can be executed when the number of static signers is less than the min threshold No multisig transactions can be executed when the number of static signers is less than the "enforced threshold" No multisig transactions can be executed when the number of valid signers is less than the "enforced threshold" Modules should never be able to change any values in Safe storage
User Rating
No ratings
Disclaimer:
SCAS conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.
In case you find any information on this report is incorrect, please fill out following form:Feedback