yEarn Creator Says Recent Audits Don't Necessarily Mean the Project Is 100% Safe

Published at: Aug. 20, 2020

Andre Cronje, the creator of Yearn.Finance, has recently made security audits of his project publicly available. He explained to Cointelegraph that he had been previously withholding these audits, which were completed months ago, so as to not give users a false sense of security:

I always refused to publish the audits because I don't want people to get a false sense of security because of them.

Yesterday, Cronje published five audits on the project's GitHub repository. The audits were performed between February and July by leading auditors, such as Certik and Quantstamp. Some of the vulnerabilities that were discovered are classified as "critical". For instance, Certik identified "a major vulnerability, which under quite common situations could temporarily block users from withdrawing all of their funds." Cronje explained that although this was a design choice, it is still a vulnerability:

If you lend, the risk always exists that there are more assets borrowed than the available liquidity to withdraw.

He added that other major DeFi projects like Compound and Aave share this vulnerability. Cronje decided to publish these audits as proof that he subjects his code to external scrutiny, but regardless, people "throw money into contracts when they see 'audited'":

"But since the whole 'no audit yolo' narrative, decided to share them, so people understand, I still do audits, I just don't share them, because I want people to understand the risk."

Another DeFi project called Yam.Finance recently collapsed due to an irreconcilable bug after launching without external audits.

Tags
Related Posts
What is a honeypot crypto scam and how to spot it?
What is a crypto honeypot and why is it used? Smart contracts programs across a decentralized network of nodes can be executed on modern blockchains like Ethereum. Smart contracts are becoming more popular and valuable, making them a more appealing target for attackers. Several smart contracts have been targeted by hackers in recent years. However, a new trend appears to be gaining traction; namely, attackers are no longer looking for susceptible contracts but are adopting a more proactive strategy. Instead, they aim to trick their victims into falling into traps by sending out contracts that appear to be vulnerable but …
Adoption / Dec. 26, 2021
Top 7 cybersecurity jobs in high demand
In today’s digital age, cybersecurity has become a critical aspect of almost every business. Cyber threats are increasing daily, and businesses must take proactive measures to protect their networks and data. As a result, the demand for cybersecurity professionals has skyrocketed. Little Friday humour #meme #cybersecurity @hackurityio pic.twitter.com/MArEpCh03k — Harold De Vries (@devries_harold) February 17, 2023 In this article, we will discuss the top seven cybersecurity jobs that are in high demand. Cybersecurity analyst A cybersecurity analyst is responsible for identifying and mitigating cyber threats to an organization’s network and data. They examine system logs and network traffic to find …
Technology / Feb. 26, 2023
The remaining steps to mainstream institutional investment
It has been said that you only get one chance to make a first impression. Perhaps the best example of this old adage is the cryptocurrency space. From exit scams and money laundering, to unaudited code and high carbon footprints, the crypto landscape has spent the better part of the past decade scrubbing itself of its infamous past. For many, the sanitizing of the decentralized ecosystem was inevitable — simply a matter of when, not if. This mindset hindered the sense of urgency that should have been on display and may have ultimately contributed to the skepticism exhibited by mainstream …
Adoption / May 29, 2021
Building multichain is a new necessity for DeFi products
At present, your DeFi product needs to be multichain to be competitive — this is the hard (and exciting) truth of 2021. Whether you’re building a wallet, a lending service or a DeFi game, your target audience knows that there is more to the crypto space than Ethereum. And they expect you to provide the best of all worlds. It seems there will always be a debate about which blockchain makes for the best foundation for projects. Enhanced security, low transaction costs and formidable speed — there will always be a chain that offers bigger advantages. As the speculators argue …
Technology / Nov. 20, 2021
Cross-chains in the crosshairs: Hacks call for better defense mechanisms
2022 has been a lucrative year for hackers preying on the nascent Web3 and decentralized finance (DeFi) spaces, with more than $2 billion worth of cryptocurrency fleeced in several high-profile hacks to date. Cross-chain protocols have been particularly hard hit, with Axie Infinity’s $650 million Ronin Bridge hack accounting for a significant portion of stolen funds this year. The pillaging continued into the second half of 2022 as cross-chain platform Nomad saw $190 million drained from wallets. The Solana ecosystem was the next target, with hackers gaining access to private keys of some 8000 wallets that resulted in $5 million …
Blockchain / Aug. 11, 2022