When I was checking project updates recently, I noticed that a lot of newcomers (including me before) hear “audited” or “open source on GitHub” and immediately feel like it’s solid. But you really need to break it down and look at the details. For GitHub, I usually check three things first: whether the most recent meaningful commit was actually made by a real person, whether there are corresponding discussions/PRs for changes to key contracts, and whether the release tags and on-chain deployments line up… otherwise, open source might just be “put there for show.”



And don’t only look at the cover logo of an audit report—flip to the conclusion page: which contracts are covered, whether there are notes about “unaudited upgrade proxies/multisig permissions,” and whether the remaining issues are “fixed” or “accepted risks.” Upgrading a multisig is even more straightforward: how many keys, who controls them, whether there’s a timelock and an emergency pause, and whether the permissions are so powerful that they can directly change the logic—those are the kind I default to as high risk.

Lately, everyone’s been talking about rate-cut expectations, the US dollar index, and risk assets sometimes rising and sometimes falling… the more tug-of-war there is between these emotions, the more I want to make sure I understand clearly the whole “who can change the code” issue. Next time, I’m planning to turn the common upgrade/multisig permission setup into a simple little sketch so it’s easy to compare. Which item do you usually look at first to judge credibility?
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pinned