Proof of Reserves Explained: How Crypto Audits Verify Exchange Solvency and Custody

Proof of Reserves has become a key transparency mechanism for centralized crypto platforms that custody user funds. After major failures in 2022 exposed how opaque balance sheets and undisclosed risks can harm customers, exchanges and custodians increasingly publish Proof of Reserves reports to demonstrate they can cover customer balances with verifiable assets.
This guide explains what Proof of Reserves is, how crypto audits validate solvency and custody, what Merkle trees actually prove, and where modern approaches like continuous monitoring and zero-knowledge proofs may take the industry next.

What Proof of Reserves Is (and What It Is Not)
Proof of Reserves (PoR) is a verification process designed to demonstrate that a custodian - typically a centralized exchange, broker, or lending platform - holds sufficient reserves to cover the customer balances it reports at a specific point in time. Modern PoR typically combines on-chain verification with cryptographic techniques that allow users to confirm their own balance was included in the reported liabilities.
The Two Questions Proof of Reserves Tries to Answer
A well-designed Proof of Reserves process focuses on two core checks:
- Reserve control: Does the platform actually control the on-chain assets it claims to hold?
- Liability coverage: Do those reserves equal or exceed total customer liabilities as of the audit snapshot?
In plain terms, PoR aims to show whether the platform could honor withdrawals if many users requested them at once, at least as of the time the snapshot was taken.
What Proof of Reserves Does Not Guarantee
PoR is consistently described by auditors as a limited-scope engagement. It does not provide a full view of a company's financial condition. Common gaps include:
- Off-chain liabilities: bank loans, venture debt, derivatives exposure, legal claims, and other obligations may not be captured.
- Operational and governance risks: internal controls, segregation of duties, and related-party transactions are typically outside PoR scope.
- Profitability and long-term solvency: PoR is not a substitute for a full financial statement audit under IFRS or US GAAP.
How Proof of Reserves Works: The Audit Workflow
Most Proof of Reserves implementations follow a similar structure: snapshot liabilities, prove reserves, compare totals, and publish an attestation. While details vary by platform and auditor, the core mechanics are consistent across the industry.
Step 1: Snapshot Customer Balances (Liabilities)
The exchange takes a point-in-time snapshot of customer account balances. To protect privacy, customer identifiers are typically pseudonymized before building the cryptographic structure used for verification.
Step 2: Build a Merkle Tree of Liabilities
A Merkle tree is a hash-based data structure that compresses many entries into a single fingerprint called a Merkle root. It is widely used in blockchains to verify inclusion without revealing the full dataset.
- Each user balance becomes a hashed leaf.
- Leaves are hashed together repeatedly up the tree.
- The final output is a Merkle root representing the entire liabilities set.
If any single leaf changes, the Merkle root changes, making tampering detectable when users or auditors check consistency.
Step 3: Prove Control Over Reserve Addresses
To verify reserves, the exchange provides the on-chain addresses that hold customer assets. Control is commonly demonstrated via:
- Digital signatures created with the private keys controlling those wallets, or
- Small on-chain transactions that prove the entity can move funds from the relevant addresses.
Once control is proven, the auditor and often the public can verify balances on-chain using blockchain explorers and on-chain data.
Step 4: Compare Reserves vs. Liabilities and Publish an Attestation
An independent auditor compares:
- Total reserves held at verified addresses, and
- Total liabilities represented by the Merkle-tree-based dataset.
If reserves are greater than or equal to liabilities, the auditor issues an attestation confirming that customer funds were fully backed at the snapshot time. Some platforms publish an explicit reserve ratio - for example, reserves at 102% of liabilities - though the exact figure can fluctuate over time.
Step 5: Enable User Verification
A key advantage of Merkle-tree-based Proof of Reserves is user-level verification. Users receive data that lets them confirm their account entry was included in the liabilities tree without exposing other users' balances. This helps detect exclusion risks, such as certain accounts being omitted from the liabilities snapshot.
The Cryptography Behind Proof of Reserves
Proof of Reserves uses established cryptographic primitives, but the security properties depend on correct implementation and credible independent oversight.
Merkle Trees: Inclusion Proofs at Scale
Merkle trees allow a user to prove, efficiently and privately, that their balance is part of the total liabilities set represented by the published Merkle root. This supports transparency without requiring the platform to disclose all customer balances publicly.
Digital Signatures: Proving Wallet Ownership
Signing messages with wallet keys provides evidence that the platform controls the addresses holding reserves. Without a control proof, publishing a list of wallets is insufficient, as it does not demonstrate the exchange can actually move the funds.
Zero-Knowledge Proofs: The Next Frontier
Zero-knowledge proofs (ZKPs) represent an emerging approach for Proof of Reserves that can improve both privacy and integrity. ZKPs can allow an exchange to prove statements such as:
- The sum of customer liabilities equals a specific number, without exposing individual balances.
- Reserves are greater than or equal to liabilities, without revealing full wallet mappings.
Production-grade ZK-based PoR is still maturing, but it is widely regarded as a path toward stronger privacy-preserving audits.
What Changed After 2022: Adoption and Uneven Standards
After high-profile collapses in 2022, Proof of Reserves reporting became far more common, largely driven by market expectations rather than uniform regulation. Many major exchanges now publish PoR pages, but rigor varies significantly across the industry.
Common PoR Disclosure Patterns
- Assets-only disclosures: wallet address lists and balances, without a cryptographic liabilities proof.
- Full PoR disclosures: reserves verification combined with a Merkle-tree-based liabilities snapshot and a third-party attestation.
- Automation for specific products: on-chain Proof of Reserves feeds for stablecoins, wrapped assets, and bridges.
Because no single global reporting standard exists, comparing PoR reports across platforms requires careful reading of scope, methodology, and reporting frequency.
Proof of Reserves vs. Traditional Financial Audits
Proof of Reserves is distinct from a full financial statement audit and should not be treated as equivalent.
Proof of Reserves Is Typically Limited in Scope
PoR focuses on whether on-chain assets match customer liabilities at a given time. A full audit is broader and generally includes:
- All assets and liabilities, including fiat and off-chain obligations
- Accounting standards compliance and required disclosures
- Internal controls and risk management review
For institutions, best practice is to treat Proof of Reserves as one input within a broader due diligence program, not the sole control.
Real-World Examples: What Good PoR Looks Like
Centralized Exchanges
One widely cited model involves a periodic PoR review where an independent accountant builds a Merkle tree of anonymized client balances, publishes the Merkle root, verifies signatures for reserve addresses, and confirms that on-chain reserves meet or exceed client liabilities. Users can then verify their inclusion using their Merkle proof data.
DeFi, Stablecoins, and Bridges
Proof of Reserves concepts also apply beyond exchanges. For wrapped assets, stablecoins, and cross-chain tokens, automated Proof of Reserves oracles can publish reserve data directly on-chain. Smart contracts can then enforce collateralization thresholds - pausing minting or triggering safeguards if reserves fall below required levels.
Limitations and Risks: What Proof of Reserves Can Miss
Proof of Reserves improves transparency, but it is not a comprehensive safeguard. Understanding the failure modes matters for both users and enterprises.
The Snapshot Problem
Most PoR reports are point-in-time snapshots. A platform could potentially borrow assets shortly before the snapshot, pass the attestation, and return those assets afterward. This vulnerability is one reason the industry is actively exploring more continuous verification approaches.
Incomplete Liabilities Coverage
Some PoR disclosures show only assets, or only a subset of liabilities. Even when customer balances are included, off-chain obligations can materially change the overall solvency picture.
Auditor Quality and Independence
The credibility of Proof of Reserves depends heavily on the independence and technical competence of the auditor, as well as the clarity of the published methodology. Specialist audit firms have become more common in this space, while some large accounting firms have remained cautious due to reputational and standardization concerns.
Privacy and Data Integrity
Merkle trees help protect user privacy, but PoR still relies on the platform generating a complete and accurate liabilities dataset. Strong auditor reconciliation and user verification tools reduce the risk of deliberate or accidental omission.
How to Evaluate a Proof of Reserves Report
Whether selecting an exchange or assessing custodial risk, Proof of Reserves can serve as a practical verification tool when reviewed carefully.
For Individual Users
- Locate the PoR page or audit report and read the scope carefully.
- Check reserve wallets using blockchain explorers and confirm balances match what is claimed.
- Verify your inclusion using the platform's Merkle proof tool or published instructions.
- Check the date and reporting frequency and treat stale reports as a higher risk indicator.
- Confirm independent oversight by reviewing who performed the attestation and what was verified.
For Institutions and Risk Teams
- Does the PoR include both assets and liabilities?
- Are off-chain balances (fiat, bank custody) and off-chain obligations addressed separately?
- Is there a plan for continuous monitoring or frequent reporting?
- Can results be independently reproduced from public data and the published methodology?
Teams building internal capability in this area may benefit from structured learning covering crypto auditing fundamentals, cryptographic verification, and custody controls. Relevant certifications include the Certified Cryptocurrency Expert (CCE), Certified Blockchain Expert (CBE), and specialized tracks in Web3 security and crypto compliance.
Future Outlook: Continuous PoR, ZK Proofs, and Standardization
The next phase of Proof of Reserves development is likely to focus on three areas:
- More continuous verification: reducing the gap between audit snapshots to limit window-dressing risk.
- Privacy-preserving liabilities proofs: using zero-knowledge proofs to validate totals without exposing sensitive user data.
- Standard reporting formats: clearer, comparable disclosures that bring consistency closer to traditional finance audit standards, even as PoR remains crypto-native in its methods.
As custodial crypto services mature and face stronger regulatory scrutiny, PoR-style attestations may increasingly integrate into licensing requirements, supervisory expectations, and enterprise procurement criteria.
Conclusion
Proof of Reserves is one of the most practical, crypto-native methods for testing whether a centralized exchange or custodian can back customer balances with verifiable assets. By combining on-chain reserve verification, Merkle-tree-based liabilities attestations, and user-level inclusion checks, PoR significantly raises the transparency baseline for centralized platforms.
Proof of Reserves is best treated as a necessary control rather than a comprehensive guarantee. The strongest risk posture combines PoR with broader audits, governance review, custody controls, and ongoing monitoring. As the ecosystem matures, continuous PoR and zero-knowledge-based approaches are positioned to make solvency verification more frequent, more privacy-preserving, and more dependable.
Related Articles
View AllCryptocurrency
Crypto Trading Audits Explained: How to Review Trades and Build a Repeatable Playbook
Learn how crypto trading audits work, how to review trades step by step, spot common errors, and build a repeatable audit playbook for controls and reporting.
Cryptocurrency
On-Chain Forensics for Crypto Audits: Detecting Fraud, Wash Trading, and Suspicious Wallet Activity
Learn how on-chain forensics strengthens crypto audits by tracing fund flows, detecting fraud and wash trading, and flagging suspicious wallets for AML and compliance.
Cryptocurrency
Compliance-Ready Crypto Trading: Auditing P&L, Tax Lots, and Exchange Records for Accurate Reporting
Learn how compliance-ready crypto trading uses accurate P&L, defensible tax lots, and reconciled exchange and wallet records to prevent mismatches and support audit-ready reporting.
Trending Articles
AWS Career Roadmap
A step-by-step guide to building a successful career in Amazon Web Services cloud computing.
What is AWS? A Beginner's Guide to Cloud Computing
Everything you need to know about Amazon Web Services, cloud computing fundamentals, and career opportunities.
Blockchain in Supply Chain Provenance Tracking
Supply chains are under pressure to prove not just efficiency, but also authenticity, sustainability, and fairness. Customers want to know if their coffee really is fair trade, if the diamonds are con