Our auditors are elite bounty hunters who have earned over $600K across top-tier protocols. This attacker mindset is what makes our audits different.
Predictable randomness in VRFv2 allowing manipulation of on-chain random outcomes
Rewards may be permanently frozen.
Execution of account transactions in malicious contexts leading to downstream freeze of funds in applications.
Core user operation can be denied.
Repeatable freeze of funds for protocol AA users
Unsafe oracle consumption could lead to fund loss.
DoS of all trades for AA users.
Accounting flaw leads to theft of rewards.
Staking yield may be permanently frozen.
Attacker can destroy key contract and DoS all actions until redeploy.