Logo
blank Skip to main content

Evaluating Smart Contract Security for Decentralized Finance (DeFi)

Plenty, a decentralized yield farm, approached Apriorit with a request to check their smart contract security for a decentralized finance project.

As a company that works with blockchain and cryptocurrency technologies, our client has to ensure flawless security of all infrastructure elements so they can maintain a reliable reputation and gain customersโ€™ trust.

The Apriorit team performed a comprehensive security audit for the DeFi project. We detected several vulnerabilities in smart contracts and offered best practices to address them.

The client

Our client, Plenty, is a platform for creating liquidity and trading FA 1.2 and FA 2 tokens on the Tezos blockchain. Unlike centralized exchanges, Plenty allows users to trade directly from their wallets and does not control their funds. This is why itโ€™s essential for Plenty to ensure top-notch security and performance of their smart contracts.

The challenge

Plenty approached us with a request to perform a security audit for a decentralized finance smart contract implementation. Since they work in the DeFi sector, our client needs to make sure their smart contracts operate smoothly and that usersโ€™ funds are safe and sound.

Plenty wanted to receive an unbiased evaluation of their smart contract security and discover possible vulnerabilities.

Related services

Security Testing

The result

After performing a swap and DeFi smart contract security audit, we discovered 15 vulnerabilities:

  • Two high-risk vulnerabilities related to bypassing system norms
  • Six medium-risk vulnerabilities related to excessive admin rights that could possibly cause unexpected behavior
  • Seven low-risk vulnerabilities that had little chance of breaking the contractโ€™s execution flow

Thanks to Aprioritโ€™s quick feedback on smart contract vulnerabilities and recommendations on how to address them, our client was able to quickly and efficiently fix the most critical issues.

Read also:
How to Use Atomic Swaps to Implement a Decentralized Exchange (DEX)

Our approach

To help our client ensure the security of their product, we gathered a team of blockchain developers with experience auditing smart contracts. The team analyzed the project, defined the scope of work, planned their actions, and received our clientโ€™s confirmation of the plan.

Our security audit consisted of checking the security of two types of smart contracts:

  • DeFi smart contracts
  • Swap smart contracts

To check the security of the clientโ€™s smart contracts, we used the following methods:

  • Behavioral analysis of smart contract source code
  • Smart contract checks against our database of vulnerabilities and manual attacks
  • Symbolic analysis of potentially vulnerable areas
  • Manual code review and evaluation of code quality
  • Unit test coverage analysis
  • Gas usage analysis

The three major steps of our security evaluation included:

  1. Checking smart contract security
  2. Reviewing smart contract code
  3. Analyzing test coverage
3 steps of evaluating smart contract security

Letโ€™s start with finding vulnerabilities in smart contracts.

Related services

Blockchain-based Solution Development

Smart contract security checks

First, we focused our attention on finding possible vulnerabilities in the clientโ€™s smart contracts. To do that, the Apriorit team applied our security checklist that covers the main types of security risks, including unprotected functions and storage allocation exploits.

To conduct a security audit for swap and DeFi smart contracts, we used manual code analysis. Once we discovered potential vulnerabilities, we performed manual attacks to check if these vulnerabilities were exploitable. During the security audit, our team detected:

1. Four vulnerabilities in swap smart contracts: two high-risk, one medium-risk, and one low-risk. Below, we describe the most significant vulnerabilities:

swap smart contract vulnerabilities

2. Eleven vulnerabilities in DeFi smart contracts: five medium-risk and the rest low-risk. Below are the most significant:

defi smart contract vulnerabilities

High-risk vulnerabilities can potentially allow fraudulent voters to block attempts to remove them from the voter list and reset the ongoing voting process against them. To fix these issues, we suggested a way to change the architecture of the voting procedure.

Medium-risk vulnerabilities are concerned with excessive administrator access rights that can lead to transferring reward tokens without the ownerโ€™s approval, skipping the minting process, compromising the voting protection of operations, etc.

To fix these issues, we recommended our client take various actions to limit admin access rights to usersโ€™ balances and staking tokens. These actions included implementing pending parameters, revising an adminโ€™s rights over user accounts, and adding voting protections.

Our team put effort into establishing clear and efficient communication with our client by sending them timely updates so they could fix the most critical vulnerabilities right off the bat. This was especially vital for high-risk vulnerabilities, since fixing them could have a large impact on the entire solution architecture and therefore require time and effort.

By the end of the security audit, our client managed to fix the most critical high- and medium-risk vulnerabilities and significantly improved the security posture of their smart contracts.

Read also:
Smart Contract Security Audit: Penetration Testing and Static Analysis

Smart contract code review

Reviewing smart contract source code is essential, since it helps you avoid coding antipatterns, make code understandable for all team members, and eliminate potential bugs. And since itโ€™s impossible to make changes to a deployed smart contract, we have to make sure that contracts are secure before deployment.

During the smart contract security assessment, we compared contract code against our list of best practices. By doing so, we identified potential weak spots in smart contract code and formed 12 key recommendations for our client:

12 key recommendations to make tezos smart contract code clear

Test coverage analysis

Unit tests help developers find issues in code missed by the compiler before deploying the contract to the blockchain. This is why checking unit test coverage was a crucial part of our audit.

why analyze test coverage

During this stage, our team evaluated the percentage of unit test coverage and highlighted uncovered test cases for each of the contracts. Once our client fixed critical cases, we checked test coverage again and saw a significant improvement with two out of three smart contracts.

Thanks to Aprioritโ€™s work, our client managed to significantly increase test coverage of their smart contracts. For some contracts, they improved test coverage by 20% to 30%.

Increasing test coverage is essential for both measuring the effectiveness of testing efforts and finding issues before they affect users.

Read also:
Enhancing Financial Data and Operational Security with a Tezos Wallet and dApp Audit

The impact

Security audits are essential for decentralized finance products since they allow you to identify vulnerabilities and security loopholes. The swap and DeFi smart contracts audit we performed for our client helped them make certain their project was secure and reliable.

the clients key accomplishments

After receiving comprehensive reports, the client continues using our recommendations related to code quality and other security practices. Also, they are planning to address the rest of the open issues mentioned in reports to improve the security posture of their smart contracts.

Overall, Plenty was pleased to know that no vulnerabilities were found during the assessment that could result in a loss of funds and that all of the identified medium- and low-risk vulnerabilities can be fixed. And since they feel certain about their smart contract security, our client can work on further improvements and adding features to current functionality. Not to mention that an unbiased security audit can help win usersโ€™ trust.

Ready to check your productโ€™s security? Contact Apriorit to receive a comprehensive security evaluation along with relevant recommendations for improvements.

Have a question?

Ask our expert!

Tell us about
your project

...And our team will:

  • Process your request within 1-2 business days.
  • Get back to you with an offer based on your project's scope and requirements.
  • Set a call to discuss your future project in detail and finalize the offer.
  • Sign a contract with you to start working on your project.

Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.