Prepared by:
HALBORN
Last Updated 08/13/2025
Date of Engagement: July 4th, 2025 - August 8th, 2025
95% of all REPORTED Findings have been addressed
All findings
20
Critical
0
High
2
Medium
0
Low
5
Informational
13
Casper Association engaged Halborn to conduct a security assessment of the DAO contracts, beginning on July 4th, 2025 and ending on August 8th, 2025. This security assessment was scoped to the smart contracts in the csprfun-core contracts GitHub repository.
The engagement involved a detailed, line-by-line security review of all smart contracts within the Friendly Casper Token Minter ecosystem. This included analysis of the contract code, entry point implementations, bonding curve mechanics, DEX integration, and related administrative controls.
Halborn's team of blockchain security specialists conducted a rigorous smart contract audit on the Friendly Casper Token Minter ecosystem. The review involved a cross-functional team of experts working over a 4 week period to uncover deeply embedded logic flaws, economic design risks, and practical implementation bugs. The primary goal was to stress-test the security posture for token issuance and trading.
The overall architecture demonstrates robust on-chain controls and correct use of Casper primitives. Most critical business logic passed all functional test cases, supporting safe minting, trading, and graduation to DEX liquidity.
However, the audit identified important areas for improvement, which have been partially addressed:
Insufficient input validation. Some functions accept parameters (like tax or fee rates) that can break economic incentives or degrade product safety.
Unexposed getter/setter functions and excessive token approvals—potentially reducing transparency and exposing contracts to privilege escalation or attack in edge cases.
Lack of event emissions, inconsistent error handling, and documentation gaps—reducing upgrade transparency and maintainability.
Numerous minor code hygiene issues: debug code, commented/dead code, naming mismatches.
Halborn employs a combined approach of manual code review and automated security testing to ensure a balanced assessment of efficiency, thoroughness, and practicality within the scope of the smart contract review. Manual testing is essential for uncovering logical flaws, process weaknesses, and implementation issues, while automated techniques expand coverage and rapidly identify security best practice violations. The following phases and tools were utilized throughout the assessment:
Research into the architecture, purpose, and usage of the platform.
Manual code review and walkthrough.
Manual assessment of critical Rust variables and functions to evaluate their use and safety, focusing on identifying potential arithmeticrelated vulnerabilities.
Verification of cross-contract call controls.
Review of architecture-related logical controls.
Scanning Rust files for vulnerabilities using cargo audit)
Analysis and review of unit tests and integration tests.
Deployment to testnet via casper-client.
| EXPLOITABILITY METRIC () | METRIC VALUE | NUMERICAL VALUE |
|---|---|---|
| Attack Origin (AO) | Arbitrary (AO:A) Specific (AO:S) | 1 0.2 |
| Attack Cost (AC) | Low (AC:L) Medium (AC:M) High (AC:H) | 1 0.67 0.33 |
| Attack Complexity (AX) | Low (AX:L) Medium (AX:M) High (AX:H) | 1 0.67 0.33 |
| IMPACT METRIC () | METRIC VALUE | NUMERICAL VALUE |
|---|---|---|
| Confidentiality (C) | None (C:N) Low (C:L) Medium (C:M) High (C:H) Critical (C:C) | 0 0.25 0.5 0.75 1 |
| Integrity (I) | None (I:N) Low (I:L) Medium (I:M) High (I:H) Critical (I:C) | 0 0.25 0.5 0.75 1 |
| Availability (A) | None (A:N) Low (A:L) Medium (A:M) High (A:H) Critical (A:C) | 0 0.25 0.5 0.75 1 |
| Deposit (D) | None (D:N) Low (D:L) Medium (D:M) High (D:H) Critical (D:C) | 0 0.25 0.5 0.75 1 |
| Yield (Y) | None (Y:N) Low (Y:L) Medium (Y:M) High (Y:H) Critical (Y:C) | 0 0.25 0.5 0.75 1 |
| SEVERITY COEFFICIENT () | COEFFICIENT VALUE | NUMERICAL VALUE |
|---|---|---|
| Reversibility () | None (R:N) Partial (R:P) Full (R:F) | 1 0.5 0.25 |
| Scope () | Changed (S:C) Unchanged (S:U) | 1.25 1 |
| Severity | Score Value Range |
|---|---|
| Critical | 9 - 10 |
| High | 7 - 8.9 |
| Medium | 4.5 - 6.9 |
| Low | 2 - 4.4 |
| Informational | 0 - 1.9 |
Critical
0
High
2
Medium
0
Low
5
Informational
13
| Security analysis | Risk level | Remediation Date |
|---|---|---|
| Missing Contract Address Update Functions Break Protocol When External Contracts Upgrade | High | Solved - 07/16/2025 |
| Incorrect Tax Calculation in Bonding Curve Leads to Reduced Output Amount, Protocol Fee Loss and Reserve Imbalances | High | Solved - 07/16/2025 |
| Malicious Tax Configuration Enables DEX Pool Drainage and Blocks WCSPR Returns | Low | Risk Accepted - 07/16/2025 |
| Missing Getter Functions Lead to Blind Trading | Low | Solved - 07/16/2025 |
| Excessive Token Approvals in DEX Liquidity Addition | Low | Partially Solved - 07/16/2025 |
| Missing Getter Function for Token Metadata | Low | Solved - 07/16/2025 |
| Missing Upper Limit Validation for Protocol Fee Configuration | Low | Not Solved |
| Missing Zero Amount Validation in Trade Function | Informational | Acknowledged |
| Lacking Event Emissions for Critical Parameter Changes | Informational | Acknowledged |
| Missing Input Validation For Graduation Parameters | Informational | Acknowledged |
| Mismatch Between EntryPoint Type Signatures and Their Implementations | Informational | Solved - 07/17/2025 |
| Unused Contract Installation Function | Informational | Acknowledged |
| Unnecessary Runtime Arguments in CEP18 Initialization | Informational | Acknowledged |
| Unnecessary Type Conversion in Return Statement | Informational | Acknowledged |
| Unnecessary Wrapper Function Adds Code Bloat | Informational | Acknowledged |
| Commented Out Code and Dead Code Indicates Code Quality Issues | Informational | Acknowledged |
| Documentation Inconsistencies | Informational | Acknowledged |
| Inconsistent Error Handling Patterns | Informational | Acknowledged |
| Debug Code Present in Production | Informational | Solved - 07/16/2025 |
| Inconsistent Naming Conventions For Fee and Tax Parameters | Informational | Acknowledged |
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
//
Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.
// Download the full report
Friendly Casper Token Minter
* Use Google Chrome for best results
** Check "Background Graphics" in the print settings if needed