title | author | date | header-includes | ||
---|---|---|---|---|---|
Protocol Audit Report |
Cyfrin.io |
March 7, 2023 |
|
\begin{titlepage} \centering \begin{figure}[h] \centering \includegraphics[width=0.5\textwidth]{logo.pdf} \end{figure} \vspace*{2cm} {\Huge\bfseries Protocol Audit Report\par} \vspace{1cm} {\Large Version 1.0\par} \vspace{2cm} {\Large\itshape Cyfrin.io\par} \vfill {\large \today\par} \end{titlepage}
\maketitle
Prepared by: Cyfrin Lead Auditors:
- xxxxxxx
- Table of Contents
- Protocol Summary
- Disclaimer
- Risk Classification
- Audit Details
- Executive Summary
- Findings
- High
- Medium
- Low
- Informational
- Gas
Protocol does X, Y, Z
The YOUR_NAME_HERE team makes all effort to find as many vulnerabilities in the code in the given time period, but holds no responsibilities for the findings provided in this document. A security audit by the team is not an endorsement of the underlying business or product. The audit was time-boxed and the review of the code was solely on the security aspects of the Solidity implementation of the contracts.
Impact | ||||
---|---|---|---|---|
High | Medium | Low | ||
High | H | H/M | M | |
Likelihood | Medium | H/M | M | M/L |
Low | M | M/L | L |
We use the CodeHawks severity matrix to determine severity. See the documentation for more details.