We express our gratitude to the Neemo Finance team for the collaborative engagement that enabled the execution of this Smart Contract Security Assessment.
Neemo Finance is a non-custodial liquid staking protocol for Astar Network. It allows users to liquid stake their ASTR with Neemo Finance to support dApp staking. All while exercising complete control over their deposited ASTR.
Document
Review Scope
The system users should acknowledge all the risks summed up in the risks section of the report
Functional requirements are provided.
Technical description is provided.
The code is clearly written.
The code follows best practices and official language by style guide.
The development environment is configured.
Code coverage of the project is 87.01% (branch coverage).
Deployment and basic user interactions are covered with tests.
Negative cases coverage is missed.
Neemo Finance is a non-custodial liquid staking protocol for Astar Network. It allows users to liquid stake their ASTR with Neemo Finance to support dApp staking. All while exercising complete control over their deposited ASTR.
AcessController — contract for managing access control roles and permissions.
DappStakingManager — contract for handling core functionalities of the Neemo dAppStaking.
DepositWrapper — contract for handling wrapped astar deposits.
PauseController — contract for controlling pause and unpause actions based on access control roles.
Timelock — implementation of OpenZeppelin's TimelockController for Neemo.
NEEMO_DEV_ROLE: Role identifier for Neemo developers.
TIMELOCK_ROLE: Role identifier for timelock contract.
PAUSER_ROLE: Role identifier for pausers.
UNPAUSER_ROLE: Role identifier for unpausers.
GOVERNANCE_ROLE: Role identifier for governance entities.
Flexibility and Risk of Contract Upgrades: The token contract is upgradeable, allowing the admin to update the contract logic at any time. While this provides flexibility for addressing issues and evolving the project, it also introduces risks if upgrade processes are not properly managed or secured, potentially allowing for unauthorized changes that could compromise the project's integrity and security. This risk is mitigated by the team's use of a timelock with a 1-day delay.
Code ― | Title | Status | Severity | |
---|---|---|---|---|
F-2024-5604 | Unused Import | Fixed | Observation | |
F-2024-5603 | State Variables That Should Be Immutable | Fixed | Observation | |
F-2024-5602 | Redundant Storage Reads Leading to Gas Overhead | Fixed | Observation |
When auditing smart contracts, Hacken is using a risk-based approach that considers Likelihood, Impact, Exploitability and Complexity metrics to evaluate findings and score severities.
Reference on how risk scoring is done is available through the repository in our Github organization:
Severity
Description
Severity
Description
Severity
Description
Severity
Description
The scope of the project includes the following smart contracts from the provided repository:
Scope Details
src/AccessController.sol
src/DappStakingManager.sol
src/DepositWrapper.sol
src/PauseController.sol
src/Timelock.sol
src/libraries/Configs.sol
src/libraries/PauseActions.sol
src/libraries/Roles.sol