Lido – Security Review of Oracle V5 update
Lido partnered with Composable Security to conduct a thorough security review of the Oracle V5 update to prepare for upcoming Pectra hard fork. Basic […]
Composable Security partnered with Othentic to conduct a thorough security review of the Rewards V2 smart contract module. The project aimed to verify the robustness of a new rewards distribution mechanism integrated with EigenLayer and ensure secure cross-chain operations across multiple Layer 2 networks.
Project type: Web3 infrastructure protocol that allows building Actively Validated Services (AVS).
Service: Smart contract security review, including retest and advisory support.
Results: All identified vulnerabilities – spanning high, medium, and low severity – were fixed. The review provided actionable insights for strengthening the cross-chain reward logic and improving resilience against real-world threat scenarios. Composable Security remained engaged post-review to support long-term improvements.
Othentic Stack is a library of production-ready components to build distributed services, infrastructures, and applications. Their flexible architecture supports deep customization, cross-chain communication, and token-based coordination.
The Rewards V2 update introduced a new flow that allows AVS managers to direct rewards through EigenLayer. This release was critical to enhancing the protocol’s usability and scalability across multiple chains.
Visit website: https://www.othentic.xyz/
The security review focused on Othentic’s new reward distribution logic, particularly how it interfaces with LayerZero and EigenLayer. The assessment included both an initial review and a full retest to verify fixes.
The subjects of the test were selected contracts from the Othentic repository.
GitHub repository: https://github.com/Othentic-Labs/contracts
CommitID: 9a405548df489a489d6344242577f7ac50ff4bc3
Initial challenges and constraints:
Defined objectives:
As before every smart contract audit, thorough threat modeling was performed. The results were made available to the client for joint analysis.
Key assets that require protection:
Potential attackers goals:
Potential scenarios to achieve the indicated attacker’s goals:
More can be found in the report.
A comprehensive security review outlined six vulnerabilities (1 high, 2 medium, 3 low) and one additional recommendation.
Key findings:
The team started improving the codebase immediately during the audit and we verified during the retest that all identified vulnerabilities had been properly remediated.
Security enhancements:
Knowledge transfer:
Othentic’s team received guidance not only through written reports but also through ongoing discussions that clarified implementation strategies, explored edge cases, and ensured long-term security maturity.
Meet Composable Security
Get throughly tested by the creators of Smart Contract Security Verification Standard
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard