Comment on page
Security audits 👮
Emiswap hired Hacken OÜ and BlueSwarm to perform a Smart Contract Code Review and Security Analysis.
This paper summarizes the results of the smart contract protection evaluation and code analysis, which took place between December 4th and December 9th, 2020. The second examination took place on December 23rd, 2020. The third examination took place on January 21, 2021. The fourth examination took place on February 18, 2021.
The implementation strategy of Hacken combines established processes, highly skilled staff, and a super-responsive approach to deliverables management and the use of proprietary technologies.
The code audit was carried out utilizing the SWC (Smart Contract Weakness Classification) and CWE (Common Weakness Enumeration) specifications. The evaluation was carried out by highly experienced personnel utilizing a combination of proprietary software and manual testing.
The contract has undergone various phases of the audit process, including structural analysis, automated testing, manual code review, and so on. All of the concerns have been thoroughly addressed and explored. All vulnerabilities and concerns discovered were either resolved or properly addressed by other controls, or the contract in question was deprecated, or future low-effect solutions would be updated in future releases.
The code has 0 critical, 0 medium, and 2 low severity issues. Low-level bugs are often caused by old, unused, or otherwise ineffective code snippets that have little effect on execution.