Lido – Security Review of Oracle V5 update
Lido partnered with Composable Security to conduct a thorough security review of the Oracle V5 update to prepare for upcoming Pectra hard fork. Basic […]
YieldNest partnered with Composable Security to evaluate the security of its Max Vault integration with the Kernel protocol on BNB Chain. The goal was to ensure safe yield generation and optimize protocol robustness before launch.
Project type: DeFi protocol with Liquid Restaking Token infrastructure
Service: Smart contract security review, including retest and advisory support.
Results: Identified and resolved 1 high-risk and 8 medium-risk vulnerabilities; verified integration security with Kernel; improved architectural resilience and code quality.
YieldNest is a DeFi protocol focused on creating structured yield products through Liquid Restaking Tokens (LRTs). Their products, such as ynBNBk and ynBTCk, allow users to earn yield on restaked assets while maintaining liquidity. YieldNest operates across chains, with a strong emphasis on scalable integrations and user-focused product design.
The project evaluated in this case study centered around integrating the Kernel protocol into YieldNest’s Max Vault architecture on the BNB Chain, enabling streamlined yield access through composable DeFi strategies.
Visit website: https://www.yieldnest.finance/
The engagement focused on reviewing the smart contracts behind the Max Vault integration and ensuring their compliance with DeFi standards and security best practices. This integration enables managing yield strategies on the BNB chain using the Kernel protocol. This partnership aims to integrate Kernel’s infrastructure with YieldNest’s Liquid Restaking Tokens (LRTs), specifically ynBNBk and ynBTCk.
The Max Vault Architecture is designed to give users streamlined access to yield opportunities across multiple DeFi protocols. The system design involves ERC4626 compatible Vaults (deposit vaults) and downstream Strategies that handle further allocation of assets to e.g. restaking connectors.
Architecture consists of the following key components:
Initial challenges and constraints:
Defined objectives:
Composable Security performed the audit over a one-week period with two dedicated smart contract security experts, followed by a retest two weeks later.
As before every smart contract audit, thorough threat modeling was performed. The results are made available to the client for joint analysis.
Key assets that require protection:
Potential attackers goals:
Potential scenarios to achieve the indicated attacker’s goals:
More can be found in the report.
A comprehensive security review outlined six vulnerabilities (1 high, 8 medium, 5 low) and four additional recommendations.
Key findings:
unstake
required assets from KernelmaxWithdraw
functionThe team started improving the codebase immediately during the audit and we verified during the retest that most identified vulnerabilities had been properly remediated. Two vulnerabilities with medium impact on risk were acknowledged by the team with detailed justification.
Security enhancements:
Knowledge transfer:
The YieldNest team was highly engaged throughout the process. They independently identified some of the vulnerabilities and collaborated closely during remediation. Their readiness to address security concerns contributed significantly to the robustness of the final implementation.
Meet Composable Security
Get throughly tested by the creators of Smart Contract Security Verification Standard
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard