Audits

This page summarizes the audit conducted on the Takaturn Diomond contract.

Takaturn Diamond contract has undergone a security audit by PeckShield, a leading blockchain security company, to elevate the security, privacy, and usability of current blockchain ecosystems.

Methodology

  • The audit follows a systematic approach, including static analysis, manual review, and advanced DeFi scrutiny.

  • A full audit checklist is provided, covering various aspects, from basic coding bugs to advanced DeFi scrutiny and best practices.

  • The methodology is based on the OWASP Risk Rating Methodology, and findings are categorized using Common Weakness Enumeration (CWE).

  • The audit examines the smart contract source code for potential security issues and semantic inconsistencies and provides improvement suggestions.

  • The audited protocol's Git repository and commit hashes before and after fixes are provided.

Summary of Findings

The smart contracts were found to be well-designed and engineered, but the implementation has room for improvement. The identified issues include:

  • PVE-001: Public Exposure of Privileged Functions (High Severity) - This issue was resolved.

  • PVE-002: Potential Reentrancy Risk in Repeatedly Claiming Yields (High Severity) - This issue was resolved.

  • PVE-003: Possibly Unexpected Fund Withdrawal in FundFacet (Medium Severity) - This issue was resolved.

  • PVE-004: Accommodation of Non-ERC20-Compliant Tokens (Low Severity) - This issue was confirmed.

  • PVE-005: Incorrect Withdrawal User Amount Calculation In GettersFacet (Medium Severity)

  • PVE-006: Revisited Total Yield Calculation in GettersFacet (Low Severity)

  • PVE-007: Trust Issue of Admin Keys (Medium Severity)

  • PVE-008: Revisited _solveDefaults() Logic in CollateralFacet (Informational)

Final Report

Last updated