Solana-Launchpad-Assessment - Blockstreet


Prepared by:

Halborn Logo

HALBORN

Last Updated 12/17/2025

Date of Engagement: August 28th, 2025 - September 26th, 2025

Summary

100% of all REPORTED Findings have been addressed

All findings

21

Critical

2

High

1

Medium

0

Low

4

Informational

14


1. Introduction

Blockstreet engaged Halborn to conduct a security assessment on their Blockstreet Launchpad program beginning on August 28, 2025 and ending on September 26, 2025. The security assessment was scoped to the smart contracts provided in the GitHub repository Blockstreet-Launchpad, commit hashes, and further details can be found in the Scope section of this report.


The Blockstreet team is releasing a new version their Blockstreet Launchpad Solana program. This program is a decentralized fundraising platform that enables crypto projects to raise capital through token sales by creating fundraising pools where investors can contribute funds in exchange for project tokens, featuring staking systems, fee collection mechanisms, and pool lifecycle management.

2. Assessment Summary


Halborn was provided 22 business days for the engagement and assigned one full-time security engineer to review the security of the Solana Programs in scope. The engineer is a blockchain and smart contract security expert with advanced smart contract hacking skills, and deep knowledge of multiple blockchain protocols.

The purpose of the assessment is to:

    • Identify potential security issues within the Solana Program.

    • Ensure that smart contract functionality operates as intended.


In summary, Halborn identified some improvements to reduce the likelihood and impact of risks, which were mostly addressed by the Blockstreet team. The main ones were the following:

    • Exclude platform fees from pool accounting calculations to ensure accurate fund tracking

    • Implement proper treasury account ownership validation in all the instructions where it is not implemented

    • Fix issues in the cancel contribution functionality to ensure users can properly cancel contributions

3. SCOPE

REPOSITORY
(a) Repository: Blockstreet-Launchpad
(b) Assessed Commit ID: 1995ead
(c) Items in scope:
  • Blockstreet-Launchpad/programs/blockstreet-launchpad/src/constants.rs
  • Blockstreet-Launchpad/programs/blockstreet-launchpad/src/error.rs
  • Blockstreet-Launchpad/programs/blockstreet-launchpad/src/events.rs
↓ Expand ↓
Out-of-Scope: Third party dependencies and economic attacks.
Remediation Commit ID:
  • 99a5830
  • 0fbb6a9
  • a58655f
  • 094e8e3
Out-of-Scope: New features/implementations after the remediation commit IDs.

4. Findings Overview

Security analysisRisk levelRemediation
Platform Fee Inclusion in Pool Accounting Creates Inconsistent Fund TrackingCriticalSolved - 10/13/2025
Multiple Account Ownership Validation Vulnerabilities Across Pool Creation, Contribution, and Staking Systems Enable Fee Diversion and Unauthorized AccessCriticalSolved - 10/13/2025
Cancel Contribution Function is Non-Operational Due to Multiple Issues Preventing Users from Cancelling ContributionsHighSolved - 10/13/2025
finalize_pool_with_liquidity Instruction Contains Multiple Vulnerabilities Leading to Permanent Fund LossLowSolved - 10/13/2025
Multiple Security Vulnerabilities and Validation Failures in Staking Pool Initialization FunctionsLowSolved - 11/25/2025
Pool Vault Addresses Not Stored in Pool State Creates Operational Validation ChallengesLowSolved - 10/13/2025
Pool Finalization Instructions Fail to Update Pool State Values Breaking Token Claims and Pool AnalyticsLowSolved - 10/13/2025
USD1 Staking System Contains Multiple Design Flaws and Missing Functionality That Must Be Redesigned to Prevent User Fund Lock and System InconsistenciesInformationalSolved - 10/13/2025
Pool Creation Instructions Validate Vault PDAs But Fail to Create Required Vault AccountsInformationalSolved - 10/13/2025
Logical Contradiction Prevents Pool Status Transition from Pending to ActiveInformationalSolved - 10/12/2025
Staking System Contains Multiple Design Flaws That Can Be Improved to Enhance Reward Calculation and Code ConsistencyInformationalSolved - 10/13/2025
Meteora Liquidity Instruction is Non-Functional and Lacks Multiple Call ProtectionInformationalAcknowledged - 11/04/2025
Missing Admin Approval Flag Assignment Creates Inconsistent Pool StateInformationalSolved - 10/13/2025
Pool Migration Logic Contains Multiple Validation Gaps and Design Inconsistencies That Compromise Pool State IntegrityInformationalSolved - 10/13/2025
Missing Fee Payment Tracking Prevents Validation of Pool Creation RequirementsInformationalSolved - 11/04/2025
Variable Token Mints on Initialization Allow Platform-Wide CompromiseInformationalSolved - 10/13/2025
Missing Length Validation on project_uri Allows for Oversized DataInformationalSolved - 10/13/2025
Fee Collection Event Emits Hardcoded Values, Leading to Inaccurate Off-Chain DataInformationalSolved - 10/13/2025
Decentralized Account Initialization Logic Increases Risk of InconsistenciesInformationalSolved - 11/25/2025
Update Pool Instruction Contains Security and Observability Issues That Enable Fund Locking and Reduce TransparencyInformationalSolved - 10/13/2025
Pool Lifecycle Management Contains Inconsistent Hard Cap Completion Logic Leading to Behavioral DiscrepanciesInformationalSolved - 10/13/2025

Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.

// Download the full report

Solana-Launchpad-Assessment

* Use Google Chrome for best results

** Check "Background Graphics" in the print settings if needed