IOP | Paradex-logo

IOP | Paradex

|

Paradex is a high-performance crypto-derivatives exchange built on a Starknet Appchain.

Solidity

Status

Finished
Reward Pool
$45,000
Start Date
23 May 2025
End Date
13 June 2025
Rewards Token
USDC
Lines of Code
7,700
  • Triaged by Immunefi

  • Step-by-step PoC Required

  • KYC required

Select the category you'd like to explore

Assets in Scope

Target
Type
Smart Contract - Paraclear - Manages all positions and balance accounting
Added on
23 May 2025
Target
Type
Smart Contract - Vault - Pool users’ assets for the Vault feature
Added on
23 May 2025
Target
Type
Smart Contract - Factory - Initializing new vaults and their configs
Added on
23 May 2025
Target
Type
Smart Contract - Registry - Maintains a record of roles on the platform
Added on
23 May 2025
Target
Type
Smart Contract - Oracle - Provides up-to-date pricing for all markets
Added on
23 May 2025
Target
Type
Smart Contract - L1 Bridge - Fork with minor adjustments to Starknet Bridge
Added on
23 May 2025

Impacts in Scope

Build Commands, Test Commands, and How to Run Them

Included in repo readme

Previous Audits

Paradex’s completed audit reports can be found at https://github.com/Cairo-Security-Clan/Audit-Portfolio/blob/main/Paradex_Audit_Report.pdf. Unfixed vulnerabilities mentioned in these reports are not eligible for a reward.

L1 Bridge contract is a fork of starknet’s starkgate bridge with some minor additions. Their audits are:

Private Known Issues Reward Policy

Private known issues, meaning known issues that were not publicly disclosed, are valid for a reward.

Optional Project Info

Is this an upgrade of an existing system? If so, which? And what are the main differences?

Mainnet is currently running a slightly newer version of the code that’s being audited.

Starkgate contract is running exactly the same as the repo on mainnet

Where do you suspect there may be bugs and/or what attack vectors are you most concerned about?

Attack Vectors:

  • Stealing User Funds / Unauthorized fund transfers
  • Market Manipulation

What ERC20 / ERC721 / ERC777 / ERC1155 token standards are supported?

ERC20

Which chains and/or networks will the code in scope be deployed to?

We currently run on a starknet app chain

What external dependencies are there?

Openzeppelin, Alexandria Data Structures

Are there any unusual points about your protocol that may confuse Security Researchers?

Potentially, the way some transfer restrictions are implemented and some of the functionalities implemented on Vaults can be quite complex

What are the most valuable educational resources already available? (Ie. Documentation, Explainer videos or articles, etc)

Severity
Critical
Title

Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield

Severity
Critical
Title

Permanent freezing of funds

Severity
Critical
Title

Protocol insolvency

Severity
High
Title

Theft of unclaimed yield

Severity
High
Title

Permanent freezing of unclaimed yield

Severity
High
Title

Temporary freezing of funds for at least 24 hour

Severity
Medium
Title

Smart contract unable to operate due to lack of token funds

Severity
Medium
Title

Block stuffing

Severity
Medium
Title

Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)

Severity
Medium
Title

Temporary freezing of funds for at least 1 hour

Severity
Low
Title

Contract fails to deliver promised returns, but doesn't lose value

Severity
Low
Title

Theft of gas

Out of scope

Default Out of Scope and rules

Smart Contract specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers