TRUST Summit | Nov 3, 2025 | NYCWhere decision-makers define the next chapter of secure blockchain adoption.
Learn more

Audit name:

[PT] MultiBank.io | Web | Feb2024

Date:

Feb 23, 2024

Table of Content

Introduction
Audit Summary
Appendix 1. Severity Definitions
Appendix 2. Scope
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the MultiBank.io team for the collaborative engagement that enabled the execution of this Web Application Security Assessment.

Document

NamePentest and Security Analysis Report for MultiBank.io
Approved ByAndrew Matiukhin
Websitehttps://multibank.io/
Changelog05/07/2023 - Preliminary Report
23/02/2024 - Final Report
PlatformEthereum, Solana, Bitcoin, Polygon
LanguageJava, JavaScript
TagsPentest (Gray Box), Wallet, Governance, Decentralized Finance (DeFi), Liquidity Pool
Methodologyhttps://docs.hacken.io/methodologies/pentesting
  • Document

    Name
    Pentest and Security Analysis Report for MultiBank.io
    Approved By
    Andrew Matiukhin
    Changelog
    05/07/2023 - Preliminary Report
    23/02/2024 - Final Report
    Platform
    Ethereum, Solana, Bitcoin, Polygon
    Language
    Java, JavaScript
    Tags
    Pentest (Gray Box), Wallet, Governance, Decentralized Finance (DeFi), Liquidity Pool

Protect your dApp with insights like these.

Audit Summary

0Total Findings
0Resolved
0Accepted
0Mitigated

Executive Summary

Within limited time of security assessment the auditing team identified security vulnerabilities with various severities assigned. The Client team approached the audit result proactively and provided remediation for all significant vulnerabilities. As a result of activities done within assessment and remediation period no more significant security vulnerabilities were identified in the solution defined in the scope of the assessment.

Upon the request of the Client the list of vulnerabilities remain undisclosed.

Appendix 1. Severity Definitions

Severity

Description

Critical
These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

High
These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

Medium
These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

Low
These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.
  • Severity

    Critical

    Description

    These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

    Severity

    High

    Description

    These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

    Severity

    Medium

    Description

    These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

    Severity

    Low

    Description

    These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.

Appendix 2. Scope

The scope of the project includes the following web applications:

Disclaimer