Skip to main content

Executive Summary

Bug Hunter examined AAVE's yield farming contracts for vulnerabilities and implementation risks. This page summarizes the analysis.

Engagement Overview and Scope

A codebase from project AAVE was reviewed for security vulnerabilities by Bug Hunter with the following details:

Bug Hunter reviewed the following files:

  • LendingPoolAddressesProvider.sol
  • LendingPoolAddressesProviderRegistry.sol
  • IAaveIncentivesController.sol
  • IChainlinkAggregator.sol
  • IERC20.sol
  • IERC20Detailed.sol
  • IExchangeAdapter.sol
  • ILendingPool.sol
  • ILendingPoolAddressesProvider.sol
  • ILendingPoolAddressesProviderRegistry.sol
  • ILendingRateOracle.sol
  • IPriceOracle.sol
  • IPriceOracleGetter.sol
  • IReserveInterestRateStrategy.sol
  • ISwapAdapter.sol
  • IUniswapExchange.sol
  • DefaultReserveInterestRateStrategy.sol
  • LendingPool.sol
  • LendingPoolCollateralManager.sol
  • LendingPoolConfigurator.sol
  • LendingPoolStorage.sol
  • ReserveConfiguration.sol
  • UserConfiguration.sol
  • GenericLogic.sol
  • ReserveLogic.sol
  • ValidationLogic.sol
  • Errors.sol
  • Helpers.sol
  • MathUtils.sol
  • PercentageMath.sol
  • Context.sol
  • IERC20DetailedBytes.sol
  • AToken.sol
  • IncentivizedERC20.sol
  • StableDebtToken.sol
  • VariableDebtToken.sol
  • DebtTokenBase.sol
  • IAToken.sol
  • IScaledBalanceToken.sol
  • IStableDebtToken.sol
  • IVariableDebtToken.sol

Summary of Findings

The uncovered vulnerabilities in the codebase during the security review are summarized in the table below:

SeverityCount
High0
Medium4
Low21