Omniscia Kyber Network Audit
Manual Review
Manual Review
A thorough line-by-line review was conducted on the codebase to identify potential malfunctions and vulnerabilities in Kyber Network's Uniswap V4 hook contract.
As the project at hand implements a novel Uniswap V4 hook system, intricate care was put into ensuring that the deltas reported by the system conform to the specifications and restrictions laid forth within the Uniswap V4 protocol's specification.
We validated that all state transitions of the system occur within sane criteria and that all rudimentary formulas within the system execute as expected. We pinpointed two signature-related vulnerabilities within the system which could have had minor-to-moderate ramifications to its overall operation; for more information, kindly consult the relevant non-informational exhibits within the audit report as well as its summary.
Additionally, the system was investigated for any other commonly present attack vectors such as re-entrancy attacks, mathematical truncations, logical flaws and ERC / EIP standard inconsistencies. The documentation of the project was satisfactory to a great extent, containing descriptive documentation outlining the purpose of the system in detail.
A total of 6 findings were identified over the course of the manual review of which 4 findings concerned the behaviour and security of the system. The non-security related findings, such as optimizations, are included in the separate Code Style chapter.
The finding table below enumerates all these security / behavioural findings:
| ID | Severity | Addressed | Title |
|---|---|---|---|
| BKE-01M | ![]() | ![]() | Inexistent Restriction of Status |
| PVK-01M | ![]() | ![]() | Overlap of Signature Digests |
| UVK-01M | ![]() | ![]() | Inexistent Restriction of Signature Submitter |
| UVK-02M | ![]() | ![]() | Inexistent Consumption of Signature |




