Once the protocols are listed, we will employ the preparatory risk models to continuously evaluate risk levels by collecting data and information from the given protocol, such as the staking changes, the claims to the protocol, correlation analysis to new security incidents and more. Such updates will be reflected in the existing risk model and provide up-to-date risk assessments.