Prepared by:
HALBORN
Last Updated 03/26/2026
Date of Engagement: March 23rd, 2026 - March 23rd, 2026
100% of all REPORTED Findings have been addressed
All findings
4
Critical
0
High
0
Medium
0
Low
0
Informational
4
Temple engaged our security analysis team to conduct a targeted security audit of their DAML smart contract ecosystem deployed on the Canton distributed ledger. The primary aim was to assess the security architecture of the incremental changes introduced between release tags 4.0.1 and 4.1.1, with a focus on identifying authorization flaws, asset accountability gaps, and logic correctness issues within the settlement and delegation framework. Our assessment was strictly confined to the modified non-test DAML modules within those two releases, ensuring a focused and evidence-driven analysis.
Our engagement with Temple spanned a 1 day period, during which we dedicated one full-time security engineer with extensive experience in blockchain security, distributed ledger protocols, and DAML/Canton smart contract semantics. The objectives of this assessment were to:
Verify the correct handling of asset lifecycle operations across the delegation and settlement workflows.
Identify authorization, access control, and logic vulnerabilities introduced in the 4.0.1 → 4.1.1 delta.
Evaluate the integrity of critical flows including allocation splitting, allocation merging, settlement request signing, and fee processing.
Provide actionable recommendations to harden the security and correctness of Temple's settlement infrastructure.
| Security analysis | Risk level | Remediation |
|---|---|---|
| Remainder Holding Not Returned on Partial Split | Informational | Acknowledged - 03/25/2026 |
| Receiver Party Silently Replaced After Allocation Consolidation | Informational | Solved - 03/25/2026 |
| Cross-Role Delegation Usage Not Prevented at Settlement Signing | Informational | Solved - 03/25/2026 |
| Optional Deadline Produces Misleading Assertion Messages | Informational | Solved - 03/25/2026 |
Halborn strongly recommends conducting a follow-up assessment of the project either within six months or immediately following any material changes to the codebase, whichever comes first. This approach is crucial for maintaining the project’s integrity and addressing potential vulnerabilities introduced by code modifications.
// Download the full report
Daml - Diff Review
* Use Google Chrome for best results
** Check "Background Graphics" in the print settings if needed