Omniscia Maverick Protocol Audit

Manual Review

Manual Review

A thorough line-by-line review was conducted on the codebase to identify potential malfunctions and vulnerabilities in Maverick Protocol's V2 common libraries.

As the libraries in scope are meant to implement complex formulae, intricate care was put into ensuring that the calculations within the system conform to the specifications and restrictions laid forth within the protocol's specification.

We validated that all state transitions of the system occur within sane criteria and that all rudimentary formulas within the system execute as expected. We pinpointed a potential discrepancy within the system which we believe to be innocuous, however, we advise the Maverick Protocol to closely evaluate it.

Additionally, the system was investigated for any other commonly present attack vectors such as re-entrancy attacks, mathematical truncations, logical flaws and ERC / EIP standard inconsistencies. The documentation of the project was satisfactory to an exemplary extent, containing extensive in-line documentation to justify the mathematical operations performed and citing external resources where necessary.

A total of 14 findings were identified over the course of the manual review of which 6 findings concerned the behaviour and security of the system. The non-security related findings, such as optimizations, are included in the separate Code Style chapter.

The finding table below enumerates all these security / behavioural findings:

IDSeverityAddressedTitle
MHT-01MPotentially Insecure Casting Operation
MHT-02MPotentially Insecure Negations
TMH-01MDiscrepancy of Whitepaper Formula 22
TMH-02MInexistent Accommodation of Rounding Errors
TLB-01MIncorrect Utilization of Memory
TLB-02MInexistent Masking of Input Arguments