Overview
At Blaize, we take the security of blockchain projects seriously, and our recent collaboration with Cryptopia stands as a testament to our commitment. In this case study, we will delve into the comprehensive security audit we conducted for the Cryptopia protocol, highlighting our rigorous process and the outcomes achieved.
Task
At Blaize Security, we approach each audit with a well-defined strategy. Our audit procedure involves a meticulously planned series of activities:
1) Standard vulnerabilities checklists, including but not limited to:
- Reentrancy
- Gas limit and loops
- Transaction-ordering dependence
- Unchecked external calls
- Denial-of-Service (DoS) attacks
- Malicious libraries and injections
- Storage issues (uninitialized, unused, etc.) and incorrect local variable usage
- Upgradeability issues
- Correct NFT storage for metadata
and other potential Solidity vulnerabilities and attack vectors;
2) Business logic decompositions to find loopholes, deadlocks, hidden backdoors, incorrect math and calculations, malicious code injections, and other flow-related issues;
3) Review of dependencies, integrations, and 3rd parties, verified with appropriate integration tests;
4) Our internal security checklists with heavy accent on NFT related security were verified during the testing stage. The team had the main focus on verifying the correctness of NFTs minting, checking the foundation of future game logic which starts in ships distributions and upgrades. Additionally auditors provided a round of meta-transactions testing integrated into the protocol.