Audit
Triaged by Hackenproof

Unizen DualDefense Audit: Program info

Unizen DualDefense Audit

Company: Unizen
Ended
Contest ended 09.01.2025
Program infoHackers (5)Reports

Unizen is a next-generation DEX aggregator, offering developers, traders, and businesses the ability to unlock unparalleled token swap capabilities. Powered by groundbreaking innovations such as the Unizen Liquidity Distribution Mechanism (ULDM) and Unizen Interoperability Protocol (UIP), Unizen offers cost-efficient, decentralized, omni-chain swaps across multiple blockchains.

In scope
TargetTypeSeverityReward
https://github.com/unizen-io/unizen-stratosphere-sc/tree/main/contracts/V2/Executors
copy
Copy
success Copied

main brunch

Smart Contract
Critical
Bounty
Target
https://github.com/unizen-io/unizen-stratosphere-sc/tree/main/contracts/V2/Executors
copy
Copy
success Copied

main brunch

TypeSmart Contract
Severity
Critical
RewardBounty

Focus Area

IN-SCOPE: SMART CONTRACT VULNERABILITIES

We are looking for evidence and reasons for incorrect behavior of the smart contract, which could cause unintended functionality:

  • Stealing or loss of end-user funds
  • Permanent lock of end-user funds

OUT OF SCOPE: SMART CONTRACT VULNERABILITIES

  • Theoretical vulnerabilities without any proof or demonstration
  • Old compiler version
  • The compiler version is not locked
  • Vulnerabilities in imported contracts
  • Code style guide violations
  • Redundant code
  • Gas optimizations
  • Best practice issues
  • Known issues on GitHub issue tracker
  • Known issues in README.md
  • Front-run attacks
  • All other issues not mentioned “IN SCOPE” area

Program Rules

Only critical vulnerabilities that could lead to the loss of user funds or the permanent lock of funds are eligible for rewards.

  • The company is not obliged to pay for "Low"-"High" severity issues. Only "Critical" issues are under the scope. However, the team may, at its discretion, accept the report and pay the bonus, the reward will not be a part of the bounty pool.
  • Perform testing only within the scope
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission
  • Each submission requires a working PoC to be eligible for a bounty

Reward Distribution:

  • The reward will be distributed in HAI tokens. For that you will need to provide in your account your hAI wallet address so we can arrange the transaction.

Clear wording:

  • Bounty pool — total amount of reward in the DualDefence Audit.
  • Allocated bounty — amount of reward for each unique vulnerability reported.
  • The total bounty pool for the DualDefence Audit will be equally split among all unique issues reported.
  • Example: If three researchers identify the same vulnerability and also there are two other vulnerabilities submitted only once (total 3 unique issues reported) each vulnerability will get 1/3 of the bounty pool. Allocated bounty reward will be split between all researchers who submitted the same issue (where uniq issues receive 1/3 of the pool and researchers will get 1/9 each of the initial reward pool).

Allocated bounty reward will be split between all researchers who submitted the same issue (where uniq issues receive 1/3 of the pool and researchers will get 1/9 each of the initial reward pool).

Single Valid Submission

Full Reward: If a critical vulnerability is found by only one participant, that reporter receives 100% of the bounty pool.

Duplicate Submissions

If multiple participants find the same vulnerability, the allocated bounty for that issue (bounty pool always equally split among all unique issues reported) is divided equally among all reporters. Example: If two researchers report the same vulnerability, each receives 50% of the allocated bounty. It can be 50% of the bounty pool if only one eligible issue was reported.

Multiple Unique Submissions

Split Based on Uniqueness of issues reported:

  • Unique Issue 1: Found by one reporter.
  • Unique Issue 2: Found by another reporter.

Each will receive 50% of the bounty pool.

[DISCLAIMER] The reward amount will be denominated in HAI tokens which are staked in FlashPool, due to market volatility, the final USD amount may differ from the one stated in the rules.

Disclosure Guidelines

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed till the end of FlashBounty Audit contest.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve our security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • The vulnerability must be a qualifying vulnerability
  • Any vulnerability found must be reported exclusively through hackenproof.com
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • You must not be a former or current employee of us or one of its contractor.
  • Provide detailed but to-the point reproduction steps

Last audit

Hacken - November 2024

Assets in Scope

dependencies
 Controller.sol - dependencies/Controller.sol
helpers
 EthReceiver.sol - helpers/EthReceiver.sol
interfaces
 IController.sol - interfaces/IController.sol
 IDlnSource.sol - interfaces/IDlnSource.sol
 ILayerZeroEndpoint.sol - interfaces/ILayerZeroEndpoint.sol
 ILayerZeroReceiver.sol - interfaces/ILayerZeroReceiver.sol
 ILayerZeroUserApplicationConfig.sol - interfaces/ILayerZeroUserApplicationConfig.sol
 IMeson.sol - interfaces/IMeson.sol
 IStargateReceiver.sol - interfaces/IStargateReceiver.sol
 IStargateRouter.sol - interfaces/IStargateRouter.sol
 ITcRouter.sol - interfaces/ITcRouter.sol

libraries
 DlnOrderLib.sol - libraries/DlnOrderLib.sol
  wormhole
   CCTPBase.sol - libraries/wormhole/CCTPBase.sol
     interfaces
      CCTPInterfaces
       IMessageTransmitter.sol - libraries/wormhole/interfaces/CCTPInterfaces/IMessageTransmitter.sol
       IReceiver.sol - libraries/wormhole/interfaces/CCTPInterfaces/IReceiver.sol
       IRelayer.sol - libraries/wormhole/interfaces/CCTPInterfaces/IRelayer.sol
       ITokenMessenger.sol - libraries/wormhole/interfaces/CCTPInterfaces/ITokenMessenger.sol
      IWormhole.sol - libraries/wormhole/interfaces/IWormhole.sol
      IWormholeReceiver.sol - libraries/wormhole/interfaces/IWormholeReceiver.sol
      IWormholeRelayer.sol - libraries/wormhole/interfaces/IWormholeRelayer.sol

V2
 Executors
  BaseExecutor.sol - V2/Executors/BaseExecutor.sol
  DebridgeMesonWormholeExecutor.sol - V2/Executors/DebridgeMesonWormholeExecutor.sol
  DexHelpers.sol - V2/Executors/DexHelpers.sol
  GasLessExecutor.sol - V2/Executors/GasLessExecutor.sol
    interfaces
     IDebridgeMesonWormholeExecutor.sol - V2/Executors/interfaces/IDebridgeMesonWormholeExecutor.sol
     IDexHelpers.sol - V2/Executors/interfaces/IDexHelpers.sol
     IGaslessExecutor.sol - V2/Executors/interfaces/IGaslessExecutor.sol
     IRouter.sol - V2/Executors/interfaces/IRouter.sol
     ISingleChainExecutor.sol - V2/Executors/interfaces/ISingleChainExecutor.sol
     IStargateThorchainExecutor.sol - V2/Executors/interfaces/IStargateThorchainExecutor.sol
     IWETH.sol - V2/Executors/interfaces/IWETH.sol
     Types.sol - V2/Executors/interfaces/Types.sol
      uniswapV2Interfaces
       IUniswapV2Pair.sol - V2/Executors/interfaces/uniswapV2Interfaces/IUniswapV2Pair.sol
  SingleChainExecutor.sol - V2/Executors/SingleChainExecutor.sol
  StargateThorchainExecutor.sol - V2/Executors/StargateThorchainExecutor.sol
  UnizenBridgeExecutor.sol - V2/Executors/UnizenBridgeExecutor.sol
  UnizenRouter.sol - V2/Executors/UnizenRouter.sol

Duration
Start date13 Dec 2024
End date09 Jan 2025
Rewards
Range of bounty$0 - $65,000
Severity
Critical
$65,000
High
$0
Medium
$0
Low
$0
Stats
Scope Review1925
Submissions9
Total rewards0
Types
smart contract
Languages
Solidity
Hackers (5) View all
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response0d
Triage Time0d
Reward Time30d
Resolution Time30d