If you notice some outdated information please let us know!
FAIL
The final review score is indicated as a percentage. The percentage is calculated as Achieved Points due to MAX Possible Points. For each element the answer can be either Yes/No or a percentage. For a detailed breakdown of the individual weights of each question, please consult this document.
Very simply, the audit looks for the following declarations from the developer's site. With these declarations, it is reasonable to trust the smart contracts.
This report is for informational purposes only and does not constitute investment advice of any kind, nor does it constitute an offer to provide investment advisory or other services. Nothing in this report shall be considered a solicitation or offer to buy or sell any security, token, future, option or other financial instrument or to offer or provide any investment advice or service to any person in any jurisdiction. Nothing contained in this report constitutes investment advice or offers any opinion with respect to the suitability of any security, and the views expressed in this report should not be taken as advice to buy, sell or hold any security. The information in this report should not be relied upon for the purpose of investing. In preparing the information contained in this report, we have not taken into account the investment needs, objectives and financial circumstances of any particular investor. This information has no regard to the specific investment objectives, financial situation and particular needs of any specific recipient of this information and investments discussed may not be suitable for all investors.
Any views expressed in this report by us were prepared based upon the information available to us at the time such views were written. The views expressed within this report are limited to DeFiSafety and the author and do not reflect those of any additional or third party and are strictly based upon DeFiSafety, its authors, interpretations and evaluation of relevant data. Changed or additional information could cause such views to change. All information is subject to possible correction. Information may quickly become unreliable for various reasons, including changes in market conditions or economic circumstances.
This completed report is copyright (c) DeFiSafety 2023. Permission is given to copy in whole, retaining this copyright label.
This section looks at the code deployed on the relevant chain that gets reviewed and its corresponding software repository. The document explaining these questions is here.
1. Are the smart contract addresses easy to find? (%)
We could not find smart contract addresses anywhere.
2. How active is the primary contract? (%)
Score is zero as there are no smart contract addresses to refer to.
3. Does the protocol have a public software repository? (Y/N)
No GitHub could be found.
4. Is there a development history visible? (%)
As there is no GitHub repo, there is no history of changes in the repo.
5. Is the team public (not anonymous)?
We found the team members in Linked in. They are not hiding at all.
This section looks at the software documentation. The document explaining these questions is here.
6. Is there a whitepaper? (Y/N)
Location: https://term.finance/howitworks/ While no literal white paper was found, we have given points for explanation pages before. Explanation pages are available.
7. Is the protocol's software architecture documented? (Y/N)
No software architecture documentation was found.
8. Does the software documentation fully cover the deployed contracts' source code? (%)
There is no software documentation of any kind. First audit emntions no commenting (Natspec or otherwise).
9. Is it possible to trace the documented software to its implementation in the protocol's source code? (%)
There is no software documentation of any kind. Therefore, there can be no traceability. In fact, there is no code available to trace to.
10. Has the protocol tested their deployed code? (%)
With no GitHub, there is no evidence of testing available. When reading the audit, the auditor did develop a test suite for their audit. We do not get points for auditor tests. However the audit gives no reference of any developer test suite.
11. How covered is the protocol's code? (%)
With no tests evident, there is no indication of code coverage.
12. Does the protocol provide scripts and instructions to run their tests? (Y/N)
Scripts/Instructions location are not evident.
13. Is there a detailed report of the protocol's test results?(%)
No test report available.
14. Has the protocol undergone Formal Verification? (Y/N)
There is no evidence this protocol underwent formal verification.
15. Were the smart contracts deployed to a testnet? (Y/N)
There is no evidence these contracts were deployed to a testnet.
This section looks at the 3rd party software audits done. It is explained in this document.
16. Is the protocol sufficiently audited? (%)
This protocol gets zero as there are no smart contract addresses available. This makes it impossible to verify if the auditing code is the same as the deployed code. The code that is running could be different than the code that was audited. We do not have the resources to check, therefore the score is zero. We did read the two audits. The results of our review are below. First audit found 27 issues (10 critical) all were resolved. It also indicated basic issues such as high gas consumption. Overall an impression of low quality code persists, Sigma Prime (a good auditor) found 27 issues in their time limited review, how many did they miss? The developer does not indicate evidence of adequate test coverage. Overall this audit would lose points based on these many and varied weaknesses, if the smart contract addresses and code was evident. The second audit has five findings, one critical end to high. This is not a comforting ratio. It also indicates that the options are gas hungry. As this protocol is on the Ethereum Blockchain, should gas prices increase it will quickly become expensive.
17. Is the bounty value acceptably high (%)
This protocol does not have a bug bounty that we can see.
This section covers the documentation of special access controls for a DeFi protocol. The admin access controls are the contracts that allow updating contracts or coefficients in the protocol. Since these contracts can allow the protocol admins to "change the rules", complete disclosure of capabilities is vital for user's transparency. It is explained in this document.
18. Is the protocol's admin control information easy to find?
There is no access control information provided of any type. Evidently the contracts are upgradable. We know this because there are two audits. The second one is based on code changes that were deployed subsequently.
19. Are relevant contracts clearly labelled as upgradeable or immutable? (%)
The relevant contracts are not indicated as upgradable or immutable in the documentation.
20. Is the type of smart contract ownership clearly indicated? (%)
There is no indication of access control information. There is no information on smart contract ownership.
21. Are the protocol's smart contract change capabilities described? (%)
There is no documentation on the methods for changing the smart contracts.
22. Is the protocol's admin control information easy to understand? (%)
There is no information provided, therefore its ease of understanding is moot.
23. Is there sufficient Pause Control documentation? (%)
There is no documentation of the pause control.
24. Is there sufficient Timelock documentation? (%)
There is no documentation around time locks or access controls at all.
25. Is the Timelock of an adequate length? (Y/N)
There is no documentation around time locks or access controls at all.
This section goes over the documentation that a protocol may or may not supply about their Oracle usage. Oracles are a fundamental part of DeFi as they are responsible for relaying tons of price data information to thousands of protocols using blockchain technology. Not only are they important for price feeds, but they are also an essential component of transaction verification and security. These questions are explained in this document.
26. Is the protocol's Oracle sufficiently documented? (%)
Oracles are mentioned as a risk in the risk section of the documentation. In this section, they mentioned using chain-link oracles. 50% score given as per the guidance.
27. Is front running mitigated by this protocol? (Y/N)
There is no indication of front running mitigation documentation available.
28. Can flashloan attacks be applied to the protocol, and if so, are those flashloan attack risks mitigated? (Y/N)
There is no documentation around how flash loan attacks could be mitigated by this protocol.
1Enter appendix example code here