Moderate risk — instant Security Council upgrade powers and EigenDA dependency create trust assumptions, balanced by a decentralized sequencer design, active governance community, and unique real-world payments adoption.
Risk Breakdown
Top Risks
Celo L2 contracts are instantly upgradeable by a Security Council (6-of-8 multisig) with no exit window for users. In the event of an unwanted upgrade, users have no opportunity to withdraw their funds before the changes take effect.
Celo uses EigenDA for data availability rather than posting full data to Ethereum. While EigenDA is secured by restaked ETH, it introduces an additional trust assumption: if EigenDA operators fail or withhold data, users cannot independently reconstruct the chain state.
The migration from L1 to L2 (completed March 2025) is a significant architectural transition. While the existing validator set provides decentralized sequencing, the L2 architecture changes security assumptions compared to the original standalone L1. Edge cases in the migration could create unexpected vulnerabilities.
The Moola Market exploit on Celo (October 2022, $9.1M) demonstrated that DeFi protocols on Celo are vulnerable to standard market manipulation attacks. While this was a protocol-level vulnerability (not Celo chain-level), it affected user trust in the ecosystem.
Frequently Asked Questions
Is Celo safe to use?
What are the main risks of using Celo?
What is Celo's risk score breakdown?
How does Celo compare to other L2 protocols?
Has Celo ever been hacked or exploited?
Get risk alerts before it's too late
Weekly grade changes, downgrade alerts, and new protocol risk findings. Free.