Prepared by:
HALBORN
Last Updated Unknown date
Date of Engagement: February 5th, 2025 - February 7th, 2025
100% of all REPORTED Findings have been addressed
All findings
12
Critical
1
High
0
Medium
5
Low
3
Informational
3
BlockDAG engaged Halborn to conduct a security assessment on smart contracts beginning on February 5th, 2025 and ending on February 7th, 2025. The security assessment was scoped to the smart contracts provided to the Halborn team. Commit hashes and further details can be found in the Scope section of this report.
The team at Halborn dedicated 3 days for the engagement and assigned one full-time security engineer to evaluate the security of the smart contract.
The security engineer is a blockchain and smart-contract security expert with advanced penetration testing, smart-contract hacking, and deep knowledge of multiple blockchain protocols
The purpose of this assessment is to:
Ensure that smart contract functions operate as intended.
Identify potential security issues with the smart contracts.
In summary, Halborn identified some improvements to reduce the likelihood and impact of risks, which were all addressed by the BlockDAG team. The main ones were the following:
Implement Correct logic for token distribution
Ensure accurate accounting for multi sig approvals
Strengthening validation during token allocation
Implement proper access control on release functions.
Add an expiry mechanism to time-lock operations.
Add explicit category validation at the start of the executeAddCategory function.
Disable the initializer in the implementation contract.
Halborn performed a combination of manual, semi-automated and automated security testing to balance efficiency, timeliness, practicality, and accuracy regarding the scope of this assessment. While manual testing is recommended to uncover flaws in logic, process, and implementation; automated testing techniques help enhance coverage of the code and can quickly identify items that do not follow security best practices. The following phases and associated tools were used throughout the term of the assessment:
Research into architecture and purpose.
Smart contract manual code review and walk-through.
Manual assessment of use and safety for the critical Solidity variables and functions in scope to identify any vulnerability classes
Manual testing by custom scripts.
Static Analysis of security for scoped contract, and imported functions. (Slither)
Local deployment and testing ( Foundry)
| EXPLOITABILITY METRIC () | METRIC VALUE | NUMERICAL VALUE |
|---|---|---|
| Attack Origin (AO) | Arbitrary (AO:A) Specific (AO:S) | 1 0.2 |
| Attack Cost (AC) | Low (AC:L) Medium (AC:M) High (AC:H) | 1 0.67 0.33 |
| Attack Complexity (AX) | Low (AX:L) Medium (AX:M) High (AX:H) | 1 0.67 0.33 |
| IMPACT METRIC () | METRIC VALUE | NUMERICAL VALUE |
|---|---|---|
| Confidentiality (C) | None (C:N) Low (C:L) Medium (C:M) High (C:H) Critical (C:C) | 0 0.25 0.5 0.75 1 |
| Integrity (I) | None (I:N) Low (I:L) Medium (I:M) High (I:H) Critical (I:C) | 0 0.25 0.5 0.75 1 |
| Availability (A) | None (A:N) Low (A:L) Medium (A:M) High (A:H) Critical (A:C) | 0 0.25 0.5 0.75 1 |
| Deposit (D) | None (D:N) Low (D:L) Medium (D:M) High (D:H) Critical (D:C) | 0 0.25 0.5 0.75 1 |
| Yield (Y) | None (Y:N) Low (Y:L) Medium (Y:M) High (Y:H) Critical (Y:C) | 0 0.25 0.5 0.75 1 |
| SEVERITY COEFFICIENT () | COEFFICIENT VALUE | NUMERICAL VALUE |
|---|---|---|
| Reversibility () | None (R:N) Partial (R:P) Full (R:F) | 1 0.5 0.25 |
| Scope () | Changed (S:C) Unchanged (S:U) | 1.25 1 |
| Severity | Score Value Range |
|---|---|
| Critical | 9 - 10 |
| High | 7 - 8.9 |
| Medium | 4.5 - 6.9 |
| Low | 2 - 4.4 |
| Informational | 0 - 1.9 |
Critical
1
High
0
Medium
5
Low
3
Informational
3
| Security analysis | Risk level | Remediation Date |
|---|---|---|
| No Token Distribution in BatchRelease Due to Premature State Updates | Critical | Solved - 02/18/2025 |
| Total Amount Limit Can Be Bypassed During Allocations | Medium | Solved - 02/12/2025 |
| Missing Access Control on Token Release Functions | Medium | Solved - 02/12/2025 |
| Cleanup Reverts for Pause/Unpause Approvals | Medium | Solved - 02/18/2025 |
| Double-Counting in Multi-Signature Approval for Users with Multiple Roles | Medium | Solved - 02/18/2025 |
| Operator Approvals Equal to Admin Approvals | Medium | Solved - 02/18/2025 |
| Timelock Operations Without Expiry | Low | Solved - 02/12/2025 |
| Missing Category Validation | Low | Solved - 02/12/2025 |
| Initializer Not Disabled | Low | Solved - 02/12/2025 |
| Insufficient Validation Of Vesting Duration | Informational | Solved - 02/12/2025 |
| Centralization Risks | Informational | Solved - 02/12/2025 |
| Redundant Constants | Informational | Solved - 02/18/2025 |
//
//
//
//
//
//
//
//
//
//
//
//
Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.
// Download the full report
Treasury Vesting
* Use Google Chrome for best results
** Check "Background Graphics" in the print settings if needed