Audit Notes & Security Reports
This page outlines the security considerations, threat model and a checklist to prepare for formal audits.
Threat model
Malicious relayers attempting to steal funds or disrupt service.
Compromised owner/multisig keys performing unauthorized upgrades.
Target contracts called by meta-transactions may behave maliciously.
Replay or signature misuse across chains.
Key security controls implemented
EIP-712 signatures with nonce and deadline checks.
ReentrancyGuard on public execution paths.
Pausable functionality with reason logging.
Relayer authorization controlled by owner.
UUPS upgrade pattern with owner-only authorization.
Pre-audit checklist
Audit focus areas
Signature verification & domain separation
Ensure domain uses correct chainId and verifyingContract.
Confirm hashing of dynamic arrays (metaTxs) matches frontend signing logic.
Refund and ETH handling
Verify no scenario where user funds can be stolen during refunds.
Confirm safe handling of call failures and that refunds go to the intended recipient.
Upgrade and access control
Ensure only multisig/DAO can upgrade in production.
Validate pause/unpause race conditions.
External contract calls
Consider adding call limits or whitelists for high-risk integrations.
Ensure try-catch and event logging for failed calls.
Edge cases & DoS vectors
Maliciously large batches or reentrancy through target contracts.
Exhausting gas or reverting refunds.
Post-audit actions
Address findings and re-run tests.
Publish audit report summary and remediation steps in docs.
Implement monitoring and on-chain instrumentation to detect exploit attempts.
For formal audits, provide auditors with up-to-date contracts, deployment addresses, tests, and replication scripts.
Last updated