The Hacken 2025 Yearly Security ReportCovers major Web3 breaches, their root causes, prevention insights, and key regulatory trends for 2026.
Learn more

Audit name:

[PT] Extsy | Web+API | Dec2024

Date:

Mar 25, 2025

Table of Content

Introduction
Audit Summary
System Overview
Findings
Appendix 1. Severity Definitions
Appendix 2. Scope
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the Extsy team for the collaborative engagement that enabled the execution of this Pentest.

Extsy is a comprehensive cryptocurrency platform that enables users to swap, trade, buy and sell digital assets, and participate in raffles. Extsy offers features such as P2P trading, virtual cards, and the option to upgrade to Extsy Premium for enhanced services.

Document

NamePentest and Security Analysis Report for Extsy
Audited ByFaizan Nehal
Approved ByStephen Ajayi
Websitehttps://extsy.com
Changelog17/03/2025 - Preliminary Report
Changelog21/03/2025 - Final Report
Changelog25/03/2025 - Final Report II
Changelog26/03/2025 - Final Report III
Methodologyhttps://hackenio.cc/pentest_methodology
  • Document

    Name
    Pentest and Security Analysis Report for Extsy
    Audited By
    Faizan Nehal
    Approved By
    Stephen Ajayi
    Changelog
    17/03/2025 - Preliminary Report
    Changelog
    21/03/2025 - Final Report
    Changelog
    25/03/2025 - Final Report II
    Changelog
    26/03/2025 - Final Report III

Review Scope

Web URLhttps://extsy.com

Protect your dApp with insights like these.

Audit Summary

20Total Findings
20Resolved
0Accepted
0Mitigated

The system users should acknowledge all the risks summed up in the risks section of the report

Threat Model Overview

This model highlights key attack vectors and security concerns identified through both manual and automated penetration testing of Extsy’s staging web platform, APIs, authentication systems, and network architecture.

Manual Testing Highlights

Broken Access Control:

Scenario: Modifying user or account identifiers within API requests to gain unauthorized access to restricted data, possibly leading to unauthorized fund movements.

Authentication Issues:

Scenario: Weak password enforcement, absence of multi-factor authentication (MFA), and the use of outdated authentication libraries.

Sensitive Information Disclosure:

Scenario: API responses leaking private keys, wallet addresses, or personally identifiable information (PII) related to KYC processes.

Rate Limiting Weaknesses:

Scenario: Insufficient request rate restrictions, making the system susceptible to brute-force attacks or denial-of-service (DoS) attacks, such as repeated OTP request abuse.

Security Misconfigurations:

Scenario: Publicly accessible admin panels, default login credentials, and overly verbose error messages that disclose critical system information.

Injection Attacks:

Scenario: Failure to properly sanitize input fields, leaving the system vulnerable to SQL/NoSQL injection attacks and remote code execution.

XSS & CSRF Vulnerabilities:

Scenario: Malicious script injection or forged requests leading to unauthorized actions, session hijacking, or privilege escalation.

Race-Condition Exploits:

Scenario: Timing-based attack techniques used to manipulate transaction execution, potentially enabling double-spending or unauthorized fund withdrawals..

Automated Testing Highlights

Directory & File Enumeration:

Scenario: Tools like Dirsearch and FFuF revealing unprotected directories or configuration files containing sensitive information.

API Security Testing:

Scenario: Automated vulnerability scanning (e.g., using Burp Suite) exposing weak access controls and a lack of rate-limiting mechanisms.

Web Application Scanning:

Scenario: Security scanners such as Nessus and Nikto detecting injection flaws (SQLi, XSS) and improper security configurations.

Security Header & Port Analysis:

Scenario: Nmap scans uncovering absent security headers (e.g., X-Frame-Options, HSTS), increasing exposure to attacks like clickjacking.

Injection Testing:

Scenario: Tools such as SQLmap and Ghauri identifying injection vulnerabilities across multiple API endpoints.

System Overview

Extsy is a comprehensive cryptocurrency platform that enables users to swap, trade, buy and sell digital assets, and participate in raffles. Extsy offers features such as P2P trading, virtual cards, and the option to upgrade to Extsy Premium for enhanced services.

Extsy provides a comprehensive range of other services, including P2P trading, AML checks, virtual card management, and participation in raffles. Users can enhance their experience by upgrading to Extsy Elite, which unlocks premium features such as increased cashback.

Extsy provides a user-friendly platform where users can seamlessly buy, sell, swap, and trade cryptocurrencies. It allows you to manage your wallet, track transactions, and access the best market rates.

Findings

Code
Title
Status
Severity
F-2025-9157Account Deletion Without Password or 2FA Verification
fixed

High
F-2025-9022Insufficient Access Control Allows Unauthorized P2P Order Cancellations
fixed

High
F-2025-9021Improper Access Control in Ad Posting Allows Unauthorized Listings Under Victim Accounts
fixed

High
F-2025-9016Unauthorized Deletion of Ads via Manipulated API Requests
fixed

High
F-2025-9014Unauthorized Payment Method Addition to Victim’s Account
fixed

High
F-2025-9117Insufficient Rate Limiting on OTP Verification for Device Authentication
fixed

Medium
F-2025-9113Persistent Active Sessions After Password Change
fixed

Medium
F-2025-9024Improper File Upload Validation Allows Malicious SVG Files to be Stored
fixed

Medium
F-2025-9023Exposure of Sensitive User Information in Raffle Update Response
fixed

Medium
F-2025-9015Unauthorized Deletion of Victim’s Payment Method via ID Parameter Manipulation
fixed

Medium
1-10 of 20 findings

Uncover findings like these to secure your project.

Appendix 1. Severity Definitions

Severity

Description

Critical
These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

High
These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

Medium
These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

Low
These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.
  • Severity

    Critical

    Description

    These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

    Severity

    High

    Description

    These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

    Severity

    Medium

    Description

    These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

    Severity

    Low

    Description

    These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.

Appendix 2. Scope

The testing was conducted in the staging environment but all the fixes were deployed to production as well. Scope of the project includes the following.

Disclaimer

Extsy audit by Hacken