TRUST Summit | Nov 3, 2025 | NYCWhere decision-makers define the next chapter of secure blockchain adoption.
Learn more

Audit name:

[L1] Gunzilla | Code Comparison | Mar2025

Date:

Mar 31, 2025

Table of Content

Introduction
Audit Summary
System Overview
Appendix 1. Severity Definitions
Appendix 2. Scope
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the Gunzilla team for the collaborative engagement that enabled the execution of this Blockchain Protocol Security Assessment.

GUNZ is a Layer 1 blockchain platform developed by Gunzilla Games, designed to enhance gaming experiences by offering players true ownership of in-game assets. Built on an Avalanche Subnet, GUNZ enables players to convert their in-game items into tradable NFTs, allowing secure transactions within the game's marketplace or on external platforms. This integration empowers players with tangible value for their in-game achievements, fostering a community-driven economy.

Document

NameBlockchain Protocol Review and Security Analysis Report for Gunzilla
Audited ByTanuj Soni, Hamza Sajid
Approved ByNino Lipartiia
Websitehttps://gunbygunz.com/
PlatformAvalanche
LanguageGo
TagsAvalanche
Methodologyhttps://hackenio.cc/blockchain_methodology

Audit Summary

0Total Findings
0Resolved
0Accepted
0Mitigated

Audit Summary

This audit confirms the security and integrity of the GUNZ Avalanche Subnet, ensuring that its deployment remains uncompromised. The evaluation verifies that the validator network, node configurations, and key security parameters adhere to Avalanche's best practices. Additionally, the integrity of executable binaries has been validated. The report provides a comprehensive summary of the verified checks and other pertinent details.

Subnet Setup & Verifications:

  • Verified Binary Hashes: Cross-checked the integrity of the executable binaries Avalanchego v1.12.2 & Subnet-evm v0.7.2 mentioned in the Linux service unit file against the official hashes provided in the corresponding GitHub repositories (Avalanchego v1.12.2 Release, Subnet-evm v0.7.2 Release) to ensure no modifications or tampering. Confirmed the exact binaries mentioned in unit services are running by manual server login.

  • Verified Node Service Status: Confirmed that the node services are running as expected, with all services active and logs indicating smooth operations.

  • Validated Validator Network: Checked that no unauthorized or unknown validators were connected at the time of verification,

  • Confirmed GUNZ's P-Chain Ownership: Verified that the GUNZ network is associated with and operating under P-Chain, ensuring proper blockchain governance and that the GUNZ chain is listed on the P-Chain.

  • Verified Native Minter Configuration: Cross-checked node configurations to ensure the native minter is disabled, aligning with documentation stating the native GUN coin supply should remain fixed.

  • Verified Subnet Validation Details: Confirmed that only one blockchain (GUNZ) is being validated by the subnet, as expected.

  • Confirmed Correct Subnet Validation: Ensured that the blockchain is being validated by the correct subnet with proper validation parameters, validating the consistency of the validation set.

  • Verified Staking on GUNZ Subnet: Checked the total amount staked (24,000 AVAX across 12 nodes, 2,000 AVAX each) to ensure it meets expected requirements and security thresholds.

  • Verified BLS Key and Proof of Possession (PoP): Validated each node's BLS public key and corresponding PoP to confirm ownership of the private keys, ensuring the security and integrity of the node's validator identity.

  • Verified Security Precompiles: Confirmed that contractDeployerAllowList, feeManager, and rewardManager precompiles are correctly configured with no unauthorized precompiles.

  • Verified Network Connectivity: Ensured all validator nodes maintain proper peer connections for network stability and consensus.

  • Verified Chain Configuration: Confirmed that Chain ID 0xa99b (43419) is consistently validated across all validators with proper block processing parameters.

System Overview

System Overview

The GUNZ Chain operates as an Avalanche subnet. It comprises 12 validator nodes: 8 managed directly by Gunzilla and 4 sponsored by trusted partners. The system utilizes the Snowman consensus mechanism. GUN serves as the native currency for the chain. The GUNZ subnet is configured as a permissioned network, meaning external validator nodes cannot be added without approval. Avalanche validates the integrity of the subnet.

Gunzilla Validator NodeIDs:

  • C6b58cQGYSqm1FeQyvXKXUgZ3R7Q9D9es

  • Fd4DMc88ELLiTHHSLVZ7L4MB3Z7jbDEAy

  • GuTDsR1tBFgQUbKqCf7J29yBo8ofudHEZ

  • 2pNQqfaBqMqwWgeJiqPbmHZk1cUtWcjqb

  • Q5xvrPQSjHhJX8eLKbBnZMWbS648NqnsZ

  • F5sBP4yNA2YXHbD6FJUjsZJ5zhoMqMi6g

  • CosZvo7bLiPF8XWNnd5Ctgktfv8b288h9

  • 5B2Uyysf1nWcRbiCYdKwXzevVF5a7sN6T

Key System Characteristics & Configurations:

  • Platform: Avalanche Subnet

  • Consensus: Snowman

  • Native Currency: GUN

  • Network Type: Permissioned

  • Validator Count: 12 (8 Gunzilla, 4 Partner)

  • Chain ID: 0xa99b (43419)

  • Binaries: Uses Avalanchego v1.12.2 and Subnet-evm v0.7.2.

Key Precompiles: Includes FeeManager, contractDeployerAllowListConfig, RewardManager, WarpMessenger.

Appendix 1. Severity Definitions

Severity

Description

Critical
Vulnerabilities that can lead to a complete breakdown of the blockchain network's security, privacy, integrity, or availability fall under this category. They can disrupt the consensus mechanism, enabling a malicious entity to take control of the majority of nodes or facilitate 51% attacks. In addition, issues that could lead to widespread crashing of nodes, leading to a complete breakdown or significant halt of the network, are also considered critical along with issues that can lead to a massive theft of assets. Immediate attention and mitigation are required.

High
High severity vulnerabilities are those that do not immediately risk the complete security or integrity of the network but can cause substantial harm. These are issues that could cause the crashing of several nodes, leading to temporary disruption of the network, or could manipulate the consensus mechanism to a certain extent, but not enough to execute a 51% attack. Partial breaches of privacy, unauthorized but limited access to sensitive information, and affecting the reliable execution of smart contracts also fall under this category.

Medium
Medium severity vulnerabilities could negatively affect the blockchain protocol but are usually not capable of causing catastrophic damage. These could include vulnerabilities that allow minor breaches of user privacy, can slow down transaction processing, or can lead to relatively small financial losses. It may be possible to exploit these vulnerabilities under specific circumstances, or they may require a high level of access to exploit effectively.

Low
Low severity vulnerabilities are minor flaws in the blockchain protocol that might not have a direct impact on security but could cause minor inefficiencies in transaction processing or slight delays in block propagation. They might include vulnerabilities that allow attackers to cause nuisance-level disruptions or are only exploitable under extremely rare and specific conditions. These vulnerabilities should be corrected but do not represent an immediate threat to the system.
  • Severity

    Critical

    Description

    Vulnerabilities that can lead to a complete breakdown of the blockchain network's security, privacy, integrity, or availability fall under this category. They can disrupt the consensus mechanism, enabling a malicious entity to take control of the majority of nodes or facilitate 51% attacks. In addition, issues that could lead to widespread crashing of nodes, leading to a complete breakdown or significant halt of the network, are also considered critical along with issues that can lead to a massive theft of assets. Immediate attention and mitigation are required.

    Severity

    High

    Description

    High severity vulnerabilities are those that do not immediately risk the complete security or integrity of the network but can cause substantial harm. These are issues that could cause the crashing of several nodes, leading to temporary disruption of the network, or could manipulate the consensus mechanism to a certain extent, but not enough to execute a 51% attack. Partial breaches of privacy, unauthorized but limited access to sensitive information, and affecting the reliable execution of smart contracts also fall under this category.

    Severity

    Medium

    Description

    Medium severity vulnerabilities could negatively affect the blockchain protocol but are usually not capable of causing catastrophic damage. These could include vulnerabilities that allow minor breaches of user privacy, can slow down transaction processing, or can lead to relatively small financial losses. It may be possible to exploit these vulnerabilities under specific circumstances, or they may require a high level of access to exploit effectively.

    Severity

    Low

    Description

    Low severity vulnerabilities are minor flaws in the blockchain protocol that might not have a direct impact on security but could cause minor inefficiencies in transaction processing or slight delays in block propagation. They might include vulnerabilities that allow attackers to cause nuisance-level disruptions or are only exploitable under extremely rare and specific conditions. These vulnerabilities should be corrected but do not represent an immediate threat to the system.

Appendix 2. Scope

Components in Scope

Below is the list of NodeIDs for the validators whose integrity has been reviewed:

  1. C6b58cQGYSqm1FeQyvXKXUgZ3R7Q9D9es

  2. Fd4DMc88ELLiTHHSLVZ7L4MB3Z7jbDEAy

  3. GuTDsR1tBFgQUbKqCf7J29yBo8ofudHEZ

  4. 2pNQqfaBqMqwWgeJiqPbmHZk1cUtWcjqb

  5. Q5xvrPQSjHhJX8eLKbBnZMWbS648NqnsZ

  6. F5sBP4yNA2YXHbD6FJUjsZJ5zhoMqMi6g

  7. CosZvo7bLiPF8XWNnd5Ctgktfv8b288h9

  8. 5B2Uyysf1nWcRbiCYdKwXzevVF5a7sN6T

Disclaimer