Solutions

Company

Resources

Blog

Contact

Login

    • Assurance

      Smart Contract Assessment

      Securing code integrity, protecting digital assets

      Blockchain Layer 1 Assessment

      Assessing protocols, securing blockchain foundations

      Code Security Audit

      Uncovering flaws, strengthening software integrity

      Web Application Penetration Testing

      Exposing weaknesses, fortifying digital defenses

      Cloud Infrastructure Penetration Testing

      Securing configurations, protecting critical environments

      Red Team Exercise

      Simulating real-world attacks, strengthening defenses

      AI Red Teaming

      Testing AI systems against real threats

      AI Security Assessment

      Securing AI models, data, and pipelines

    • Advisory

      AI Advisory

      Guiding secure, strategic AI adoption forward

      Risk Assessment

      From unknown threats to actionable insights

      Blockchain Architecture Assessment

      Optimizing architecture for tomorrow’s networks

      Compliance Readiness

      Stay ready as regulations evolve

      Custody and Key Management Assessment

      Securing the heart of digital custody

      Technical Due Diligence

      See the risks before you invest

      Technical Training

      Empower your teams to secure what matters

    • Who We Are

      The best security engineers in the world

      Careers

      Work with the elite

      Who Trusts Us

      The trusted security advisor for blockchain and financial services industries

      Brand

      Access official logos, fonts, and guidelines

      Service Commitments

      Committed to Protecting Your Data

    • Audits

      In-depth evaluations of smart contracts and blockchain infrastructures

      BVSS

      Blockchain Vulnerability Scoring System

      Disclosures

      All the latest vulnerabilities discovered by Halborn

      Case Studies

      How Halborn’s solutions have empowered clients to overcome security issues

      Reports

      Comprehensive reports and data

  • Blog

  • Contact

  • Login

THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you've provided to them or that they've collected from your use of their services. You consent to our cookies if you continue to use our website. Learn More.

STAY CURRENT WITH HALBORN

Subscribe to the monthly Halborn Digest for our top blogs and videos, major company announcements, new whitepapers, webinar and event invites, and one exclusive interview.

ADVISORY SERVICES

AI AdvisoryRisk AssessmentBlockchain Architecture AssessmentCompliance ReadinessCustody and Key Management AssessmentTechnical Due DiligenceTechnical Training

ASSURANCE SERVICES

AI Security AssessmentAI Red TeamingSmart Contract AssessmentBlockchain Layer 1 AssessmentCode Security AuditWeb Application Penetration TestingCloud Infrastructure Penetration TestingRed Team Exercise

COMPANY

Who We AreWho Trusts UsService CommitmentsCareersBrandBlogContact

RESOURCES

AuditsDisclosuresReportsBVSSCase Studies
Halborn Logo
Privacy PolicyTerms of UseVulnerability Disclosure Policy

© Halborn 2026. All rights reserved.

Background

// Security Assessment

12.15.2025 - 12.18.2025

ERC1450

StartEngine

Halborn logotext
← Back to Audits

ERC1450 - StartEngine


Prepared by:

Halborn Logo

HALBORN

Last Updated 01/06/2026

Date of Engagement: December 15th, 2025 - December 18th, 2025

Summary

100% of all REPORTED Findings have been addressed

All findings

18

Critical

1

High

0

Medium

0

Low

6

Informational

11


Table of Contents

  • 1. Introduction
  • 2. Assessment summary
  • 3. Scope
  • 4. Findings overview

1. Introduction

Halborn was engaged by StartEngine to conduct a security assessment of the ERC-1450 Upgradeable Security Token. The assessment was performed from December 15th, 2025 to December 18th, 2025 with reviewed commit hashes and scope details documented in the Scope section of this report.


The ERC-1450 implementation provides a regulated security token framework designed for compliant issuance, transfer, and lifecycle management of tokenized securities. The system enforces restricted transfers through an RTA-controlled workflow, supports regulation-specific batch tracking, and integrates fee-based transfer requests with broker delegation. Upgradeability is implemented using the UUPS proxy pattern, while administrative control and governance are delegated to a multisignature RTA proxy to reduce single-key risk and enable controlled upgrades.

2. Assessment Summary

A full-time security engineer was assigned by Halborn to perform a targeted review of the smart contracts in scope. The engineer is a blockchain and smart contract security specialist with advanced penetration - testing and smart - contract auditing skills, and extensive knowledge of multiple blockchain protocols.

 

The purpose of the assessment was to:

    • Identify potential security issues within the smart contracts.

    • Confirm that smart contract functionality operates as intended.

 

In summary, Halborn identified several areas for improvement to minimize both the likelihood and potential impact of security risks, which were partially addressed by the StartEngine team. The primary issues include:

    • Enforce protocol-calculated fees and reject zero or user-defined fee amounts to prevent fee bypass across all tokens.

    • Enforce strict mutual exclusivity between ETH and ERC20 fee payments.

    • Replace all usages of '.transfer' with '.call' and explicitly handle the return value.

    • Enforce frozen account checks consistently across all token movement paths.

    • Introduce an explicit expiration or deadline mechanism for multisig operations.

    • Revert if the request is already rejected or executed.

    • Track reserved fees associated with pending transfer requests separately from withdrawable fees.


3. SCOPE

REPOSITORY
(a) Repository: erc1450-reference
(b) Assessed Commit ID: b5fbc93
(c) Items in scope:
  • contracts/upgradeable/ERC1450Upgradeable.sol
  • contracts/upgradeable/RTAProxyUpgradeable.sol
  • contracts/ERC1450.sol
  • contracts/RTAProxy.sol
  • contracts/upgradeable/ERC1450Upgradeable.sol
  • contracts/upgradeable/RTAProxyUpgradeable.sol
  • contracts/ERC1450.sol
↓ Expand ↓
Out-of-Scope: Third party dependencies and economic attacks.
Remediation Commit ID:
  • 3901950
  • 1b273d8
  • 42f000a
  • 2b7c52f
  • 3a25d8c
Out-of-Scope: New features/implementations after the remediation commit IDs.

4. Findings Overview

Security analysisRisk levelRemediation
User-controlled fee amount enables fee bypass and ambiguous multi-token fee enforcementCriticalSolved - 12/22/2025
Incorrect Fee Handling Allows Double Payment of Fees (ETH + ERC20)LowRisk Accepted - 12/17/2025
Native ETH transfers use .transfer, causing refunds and withdrawals to failLowSolved - 12/22/2025
Inconsistent Frozen Account Enforcement Allows Transfers and Token Operations Involving Frozen AddressesLowRisk Accepted - 12/22/2025
Stale multisig operations can be executed long after submission due to missing expirationLowSolved - 12/19/2025
Missing request finalization check allows multiple fee refundsLowSolved - 12/22/2025
Fee withdrawal can break future transfer fee refundsLowRisk Accepted - 12/22/2025
Fee Type Enumeration Is Declared but Not EnforcedInformationalAcknowledged - 12/17/2025
Inconsistent fee refund handling across transfer request rejection pathsInformationalAcknowledged - 12/17/2025
Inconsistent batch cleanup during token burns leaves unused regulation entriesInformationalSolved - 12/22/2025
Token transfers bypass regulation tracking and allow unregulated movementInformationalAcknowledged - 12/30/2025
Missing no-op state change validation allows redundant administrative updatesInformationalAcknowledged - 12/30/2025
burnFrom lacks on-chain enforcement of regulation vs non-regulation token burnsInformationalAcknowledged - 12/30/2025
Transfer agent becomes permanently immutable after being set to a contract addressInformationalAcknowledged - 12/17/2025
Missing input validation during initialization allows invalid token configurationInformationalAcknowledged - 12/30/2025
Single-step ownership initialization limits safe ownership transferInformationalAcknowledged - 12/30/2025
Redundant transfer agent existence check causes unnecessary logic complexityInformationalAcknowledged - 12/22/2025
Event declaration placement improves code readabilityInformationalAcknowledged - 12/30/2025

Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.

Table of Contents

  • 1. Introduction
  • 2. Assessment summary
  • 3. Scope
  • 4. Findings overview

// Download the full report

ERC1450

* Use Google Chrome for best results

** Check "Background Graphics" in the print settings if needed