Omniscia Glimpse Audit

Manual Review

Manual Review

A thorough line-by-line review was conducted on the codebase to identify potential malfunctions and vulnerabilities in the ERC20 and BEP20 tokens of Glimpse.

As the project at hand implements a token, intricate care was put into ensuring that the flow of funds within the system conforms to the specifications and restrictions laid forth within the token's specification and that all functions it exposes are fully compliant with the standard of the respective chain implementation.

We validated that all state transitions of the system occur within sane criteria and that all rudimentary formulas within the system execute as expected. We pinpointed certain optimizations and inconsistencies within the system which can be performed to render the tokens secure by design.

Additionally, the system was investigated for any other commonly present attack vectors such as re-entrancy attacks, mathematical truncations, logical flaws and ERC / EIP standard inconsistencies. The documentation of the project was satisfactory to the extent it need be, however, the locker integration aspect does not contain any material with regards to the actual locking mechanism and as such, it should be considered out of scope of the audit.

A total of 8 findings were identified over the course of the manual review of which 3 findings concerned the behaviour and security of the system. The non-security related findings, such as optimizations, are included in the separate Code Style chapter.

The finding table below enumerates all these security / behavioural findings:

IDSeverityAddressedTitle
GLM-01MInformationalYesInconsistent GSN Conformity
GLS-01MMinorYesIncorrect Inheritance
GLS-02MInformationalYesInconsistent GSN Conformity