Overview
Aut Labs creates a DeSoc platform with a suite of tools designed for Web3 communities, enabling users to create self-sovereign, portable identities based on their skills and contributions rather than personal data. The platform emphasizes reputation mining, allowing users to build and showcase their reputation within the Web3 ecosystem through verifiable contributions and achievements. The platform provides Decentralized Identities (DID) for users, thus making a rapid onboard into DAOs and creating a connected network of users’ identities and their onchain interactions. The platform implements a concept of Collective Autonomy, making it easier for users to join communities, complete tasks, and build their reputation.
The audit’s focus was $AUT token – the token for the Collaboration Economy. It is a reputation-based token designed to power a social economy and designated for Web3 value-contributors committed to their Hubs based on roles, availability and efforts. Therefore contributors are rewarded based on their participation in dapps, protocols, P2P interactions – based on the measurable value that they bring to each of their decentralized projects and communities.
Task
During the auditing process for this project, we checked the AUT token suite smart contracts for various vulnerabilities. The whole procedure is divided into the following stages:
1) Standard vulnerabilities checklists, including but not limited to:
- Storage structure and data modification flow
- Access control structure, roles existing in the system
- Public interface and restrictions based on the roles system
- Order-dependency and time-dependency of operations
- Validation of function parameters, inputs validation
- Asset Security (backdoors connected to underlying assets)
- Incorrect minting, initial supply or other conditions for assets issuance
- Denial-of-Service (DoS) attacks
- General code structure checks and correspondence to best practices
- Correct implementation of standards
and others potential Solidity vulnerabilities and attack vectors;
2) Business logic decompositions to find loopholes, deadlocks, hidden backdoors, incorrect math and calculations, malicious code injections, and other flow-related issues;
3) Review of dependencies, integrations, and 3rd parties, verified with appropriate integration tests;
4) The team paid special attention to:
- ERC20 implementation
- correctness of tokens distribution and risks connected to it
- correctness of funds flow during vestings and correctness of the release schedule
- deployment flow
And other aspects which may bring risks to the platform. The team analyzed the business logic of the platform, thoroughly testing each stage of the funds flow.