Statera SC Audit Report
Statera SC Audit Report
Customer: Statera
Date: June 18, 2020
Platform: Ethereum
Language: Solidity
2
Document
Repository https://github.com/StateraProject/statera-token/tree/master/contracts
Commit 611d2b5c2675d824c233400f732d172d3cc14738
Branch master
Date 18.06.2020
3
Table of contents
Document ..................................................... 2
Table of contents............................................. 3
Introduction ................................................. 4
Scope ........................................................ 4
Executive Summary............................................. 5
Severity Definitions.......................................... 6
AS-IS overview ............................................... 6
Audit overview ............................................... 9
Conclusion .................................................. 11
Disclaimers ................................................. 12
4
Introduction
Hacken OÜ (Consultant) was contracted by Statera (Customer) to
conduct a Smart Contract Code Review and Security Analysis. This
report presents the findings of the security assessment of
Customer`s smart contract and its code review conducted between
June 17th, 2020 – June 18th, 2020.
Scope
The scope of the project are smart contracts within the
repository:
Repository – https://github.com/StateraProject/statera-token/tree/master/contracts
Commit – 611d2b5c2675d824c233400f732d172d3cc14738
Branch - master
We have scanned this smart contract for commonly known and more
specific vulnerabilities. Here are some of the commonly known
vulnerabilities that are considered (the full list includes them
but is not limited to them):
• Reentrancy
• Timestamp Dependence
• Gas Limit and Loops
• DoS with (Unexpected) Throw
• DoS with Block Gas Limit
• Transaction-Ordering Dependence
• Style guide violation
• Transfer forwards all gas
• ERC20 API violation
• Compiler version not fixed
• Unchecked external call - Unchecked math
• Unsafe type inference
• Implicit visibility level
5
Executive Summary
According to the assessment, Customer`s smart contracts are
secured.
Low
70%
Severity Definitions
Risk Level Description
Critical vulnerabilities are usually straightforward to
Critical
exploit and can lead to tokens lose etc.
High-level vulnerabilities are difficult to exploit;
however, they also have significant impact on smart
High
contract execution, e.g. public access to crucial
functions
Medium-level vulnerabilities are important to fix;
Medium
however, they can’t lead to tokens lose
Low-level vulnerabilities are mostly related to
Low outdated, unused etc. code snippets, that can’t have
significant impact on execution
Lowest / Code Lowest-level vulnerabilities, code style violations
Style / Best and info statements can’t affect smart contract
Practice execution and can be ignored.
AS-IS overview
IERC20 is the standard ERC20 interface.
Audit overview
Critical
High
Medium
Low
a. Line 36
b. Line 61
c. Line 107
Conclusion
Smart contracts within the scope was manually reviewed and
analyzed with static analysis tools. For the contract high level
description of functionality was presented in As-is overview
section of the report.
Disclaimers
Hacken Disclaimer
Technical Disclaimer