ImmuneBytes Audits Spore Engineering Smart Contracts| Read Details
--
ImmuneBytes is happy to announce the successful completion of the smart contract security audit for Spore Engineering.
ImmuneBytes team has performed thorough testing of the project starting with analyzing the code design patterns in which we reviewed the smart contract architecture to ensure it is structured and safe use of third-party smart contracts and libraries.
The audit rigorously checked the smart contract for any signs of vulnerabilities like Re-entrancy, Timestamp Dependence, Gas Limit, and Loops, DoS with Block Gas Limit, Unchecked external calls, Unchecked math, Unsafe type inference, etc.
The audit team at ImmuneBytes conducted a meticulous security audit which checked & ensured the following imperative points:
- Risk identification and mitigation.
- Efficient use of gas.
- Use of best practices and principles.
- Improved overall quality and structure of the code.
- Token distribution and calculations as mentioned in the whitepaper.
For the automated analysis, our auditors used Solhint, Slither and Contract Library.
While conducting the audits of the SPORE Engineering smart contracts, we observed that there were a few Admin/Owner Privileges and Low severity issues, along with several areas of recommendations. Our auditors suggest that Low severity issues should be resolved by SPORE Engineering developers.
Audit Overview
Project Name: Spore Engineering
Languages: Solidity(Smart contract), JavaScript(Unit Testing)
Github commits for audit:
○ https://github.com/spore-engineering/BSC-Contracts-Mainnet/blob/main/SporeToken.sol
○ https://github.com/spore-engineering/Spore-Stake-Farming-Rewards/blob/main/SporeStake.sol
○ https://github.com/spore-engineering/Spore-Stake-Farming-Rewards/blob/main/LiquidityFarming.sol
Contract Deployment on the test network
○ SporeToken: 0xcebfd289273ebd1f2a4b594070671f284f737db2
○ SporeStake: 0x2a3138f6e436de36b2792d5aa1e8b695e5878830
○ Liquidity Farming: 0xcf651c746899f35fb96d900301c61535a8b3a6ac
The audit primarily focused on the formal verification of the smart contract system. The auditors ensured it was secure, resilient, and working according to its specifications. The main goal throughout the audit process was:
- Correctness
- Readability
- Sections of code with high complexity
- Quantity and quality of test coverage
Our smart contract auditors split the issues according to the severity levels:
Admin/Owner Privileges can be misused either intentionally or unintentionally.
High severity issues will bring problems and should be fixed.
Medium severity issues could potentially bring problems and should eventually be fixed.
Low severity issues are minor details and warnings that can remain unfixed but would be better fixed at some point in the future.
The smart contract audit report with in-depth details about the contract code and its vulnerabilities can be found here: Spore Engineering Audit Report
About Spore Engineering
SPORE Engineering Blockchain Factory focused on closing the gap between traditional fintech instruments and industry 4.0 powered by Ethereum smart contracts on Binance Smart Chain Network.
The SPORE Token is based on the BEP-20, written in Solidity, which is the native language of The Ethereum Smart Contracts. The SPORE Token uses only audited contracts provided by OpenZeppelin with no third-party libraries implications, it’s backed and paired with BNB cryptocurrency and can be traded on Pancakeswap Protocol.
About ImmuneBytes
ImmuneBytes is a blockchain security company, focused on providing comprehensive smart contract audit services. We help startups and enterprises safeguard their applications before they turn into expensive exploits. The company was founded with a distinct aim to foster security in the blockchain sphere and an enthusiasm to improve the performance of large-scale systems.
Blockchain technology has undoubtedly revolutionized many industries. However, Blockchain networks are secure, applications running on them might not be. ImmuneBytes conducts rigorous smart contract audits, employing both static and dynamic methods, while also examining a contract’s code and gas optimization, leaving no bugs hidden.
For further discussion and queries on the same topic, join the discussion on the Telegram group of ImmuneBytes- https://t.me/immunebytes
Check the GitHub repository- https://github.com/ImmuneBytes