Omniscia Morpho Audit
Manual Review
Manual Review
A thorough line-by-line review was conducted on the codebase to identify potential malfunctions and vulnerabilities in Morpho's binary max-heap implementation.
As the project at hand implements a specialized data structure, intricate care was put into ensuring that the ordering integrity within the system is maintained across all operations that are performed on it according to the specifications laid forth in the computer science academia.
We validated that all state transitions of the system occur within sane criteria and that all rudimentary formulas within the system execute as expected. We pinpointed multiple potentially misusable functions within the system which could have had severe ramifications to the structure's integrity if they were incorrectly utilized.
Additionally, the system was investigated for any other commonly present attack vectors such as re-entrancy attacks, mathematical truncations, logical flaws and ERC / EIP standard inconsistencies. The documentation of the project was satisfactory to the extent it need be.
A total of 10 findings were identified over the course of the manual review of which 2 findings concerned the behaviour and security of the system. The non-security related findings, such as optimizations, are included in the separate Code Style chapter.
The finding table below enumerates all these security / behavioural findings:
ID | Severity | Addressed | Title |
---|---|---|---|
HOG-01M | ![]() | ![]() | Potentially Ambiguous Functionality |
HOG-02M | ![]() | ![]() | Inexistent Association of Former Value |