Omniscia SaucerSwap Labs Audit
Manual Review
Manual Review
A thorough line-by-line review was conducted on the codebase to identify potential malfunctions and vulnerabilities in SaucerSwap Labs' token wrapper.
As the project at hand implements a Hedera Token Service integrating wrapper, intricate care was put into ensuring that the flow of funds within the system conforms to the specifications and restrictions laid forth within the protocol's specification and that the Hedera precompile is being interacted with safely.
We validated that all state transitions of the system occur within sane criteria and that all rudimentary formulas within the system execute as expected. We pinpointed an important design limitation within the system which we believe would significantly impact the project's adoption and should be revisited.
Additionally, the system was investigated for any other commonly present attack vectors such as re-entrancy attacks, mathematical truncations, logical flaws and ERC / EIP standard inconsistencies. The documentation of the project was satisfactory to a great extent, containing extensive in-line documentation as well as a dedicated README file outlining known issues.
A total of 11 findings were identified over the course of the manual review of which 4 findings concerned the behaviour and security of the system. The non-security related findings, such as optimizations, are included in the separate Code Style chapter.
The finding table below enumerates all these security / behavioural findings:
| ID | Severity | Addressed | Title |
|---|---|---|---|
| ERC-01M | ![]() | ![]() | Improper Rounding of Initial Deposit |
| ERC-02M | ![]() | ![]() | Incorrect Handling of Zero Supply in Conversions |
| ERC-03M | ![]() | ![]() | Inexplicable Share-Based System |
| HTS-01M | ![]() | ![]() | Potentially Insecure Value Negation |




