en

Smart Contract Audit for a Blockchain Solution

Client:
Qube – a Web3 and Blockchain solutions developer
Industry:
FinTech (financial technologies)
Focus:
Smart contract security verification before mainnet launch
Main challenge:
Full audit within a short timeframe to protect investors’ assets and prevent loss of control over contracts
Market:
International
Services provided:
 
Key Takeaways
  • Eliminated up to 99% of known threats at the time of the audit
  • Provided an audit report for exchange certification
  • Reviewed 4 smart contracts, identified 16 non-critical vulnerabilities
  • Recorded outdated functionality and compiler version
  • Formulated recommendations for contract code optimization
  • 4
    smart contracts audited
    16
    vulnerabilities identified
    99%
    resilience to threats ensured
    Smart Contract Audit for a Blockchain Solution
    How important is it in blockchain for smart contract code to comply with modern security requirements? Without exaggeration - extremely. Even a single vulnerability can cause the complete collapse of a project. The comprehensive audit conducted by Datami revealed 16 issues in the source code and ensured the contracts’ resilience to 99% of known threats.

    Qube operates in the international market and develops solutions in the field of Web3, Blockchain, and smart contracts. The main project is an ERC20 token for investments and transactions.

    In the blockchain sphere, security is of critical importance, as even a single vulnerability can lead to the collapse of a business. At risk of financial losses are not only the system owners but also the users.

    Tasks and challenges
    Before the project release, the client needed to ensure the absence of vulnerabilities in the source code of the smart contracts in order to obtain permission for operations on Web3 exchanges.

    Datami was tasked with auditing all processes of 4 blockchain contracts within 2 weeks (the time remaining before the mainnet launch):
     
    • Test the written smart contract code.
    • Check for vulnerabilities and non-compliance with standards.
    • Provide recommendations for eliminating the identified issues.
    icon
    White-box code audit
    Dynamic and static analysis using automated and manual tools
    icon
    Documentation review
    Review of specifications, compilation (build) of contracts, and deployment in test environments
    icon
    Report and recommendations
    Detailed report with results and advice on code modernization and optimization
    Our approach

    In this case, we applied a White-box approach to smart contract auditing, which consisted of dynamic on-chain analysis and static code review. A manual line-by-line check of the code for vulnerability patterns was also performed.

    To detect errors and vulnerabilities in the code and to verify compliance with coding standards, Datami specialists used audit tools Slither, Cloc, Oyente, SolHint. Testing was carried out in Remix, Ropsten testnet, MythX, and Manticore environments.

    White-box
    White-Box
    An audit strategy with full access to the source code, which allows for a detailed logic check and the identification of hidden risks.
    Key stages of work and solutions

    The project was carried out in a well-thought-out sequence. At the initial meeting with the client, all project details were agreed upon, after which the Datami team focused on a detailed smart contract audit.

    After a complete review of all processes, the client received a detailed report with results, explanations, and recommendations.

    • Preparation
      Study of documentation and specifications, analysis of potential threats and vulnerabilities, agreement with the client on audit methods.
       
    • Comprehensive audit
      Conducting dynamic analysis of transactions in a test on-chain environment, static review, and manual line-by-line code revision.
    • Final report
      Summary of results and providing recommendations for the optimization and modernization of smart contracts to meet cybersecurity requirements.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results and recommendations
    Results and recommendations

    Datami verified the quality and security of the smart contract code before the mainnet launch: tested 4 contracts, conducted dynamic and static analysis, and performed a manual line-by-line code review.

    We discovered a number of minor errors and ensured the absence of critical ones that could have caused the system to collapse immediately after launch due to the loss of investors’ assets and control over the contracts themselves.

    As a result of the work, we prepared a detailed report with findings - the client received recommendations and answers to all key questions.

    During the audit, the Datami team:

    • identified 16 non-critical vulnerabilities;

    • recorded outdated functionality and compiler version;

    • provided recommendations for quick issue resolution;

    • reduced the threat level to unlikely;

    • ensured contract resilience to 99% of known vulnerabilities.

    All assigned tasks were completed. The client followed our recommendations and was fully satisfied with the result.

    Our certificates
    Key project results

    In the blockchain sphere, there is no half-protection: either the system works flawlessly and the attack does not occur, or a single vulnerability leads to total losses. That is why an audit before launch is of critical importance.

    As this case study demonstrates, thanks to the comprehensive smart contract audit, it was possible to eliminate potential threats to the blockchain solution. The client received confirmation of the code’s security and the system’s readiness for mainnet launch. Eliminating the identified issues became an important step for obtaining certification and releasing the project.

    Direction
    Before the project
    After implementation
    Security level
    Low
    High, protection against 99% of known threats
    Threat level
    Medium
    Low, threats unlikely
    Risks
    Loss of assets and control over the smart contract
    Minimized
    Vulnerabilities
    Unknown
    16 non-critical issues found
    Exchange standards compliance
    No
    Yes
    More success stories with Datami
    Browse other project case studies
    DDoS Protection and 24/7 Cyber Monitoring

    DDoS Protection and 24/7 Cyber Monitoring

    • Implemented the DataGuard solution based on Cloudflare to protect the website
    • Established reliable protection against DDoS attacks and bot traffic
    Services:
    Implementation of DataGuard and Cloudflare, 24/7 monitoring
    Aug 8, 2025
    Website Protection from DDoS Attacks

    Website Protection from DDoS Attacks

    • Implemented the DataGuard solution for website protection
    • DDoS protection deployed within 3 days
    Services:
    Website protection with DataGuard (Cloudflare), continuous monitoring, Cloudflare infrastructure management
    Aug 8, 2025
    Protection of E-commerce Websites From DDoS via DataGuard

    Protection of E-commerce Websites From DDoS via DataGuard

    • Implemented DataGuard to protect from DDoS attacks
    • Enabled rapid incident response
    Services:
    24/7 cybersecurity monitoring, integration with Cloudflare
     
    Aug 7, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    Microsoft enables email bombing protection Datami Newsroom
    Datami Newsroom

    Microsoft enables email bombing protection

    Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.

    Sep 12, 2025 3 min
    Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Datami Newsroom
    Datami Newsroom

    Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

    Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

    Sep 5, 2025 2 min
    The Myth of HTTPS Reliability: How Encryption Can Mislead Users Datami Newsroom
    Datami Newsroom

    The Myth of HTTPS Reliability: How Encryption Can Mislead Users

    Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co

    Sep 3, 2025 3 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy