H1 2025 Web3 Security Report$3.1B in losses, DeFi hit hardest, AI threats on the rise
Read the full report
  • Hacken
  • Audits
  • toobit
  • [PT] Toobit | iOS | Apr2025

Audit name:

[PT] Toobit | iOS | Apr2025

Date:

Jun 24, 2025

Table of Content

Introduction
Audit Summary
System Overview
Findings
Appendix 1. Severity Definitions
Appendix 2. Scope
Disclaimer

Want a comprehensive audit report like this?

Introduction

We express our gratitude to the Toobit team for the collaborative engagement that enabled the execution of this Mobile Pentest.

Document

NamePentest and Security Analysis Report for Toobit
Audited ByEce Orsel
Approved ByStephen Ajayi
Websitehttps://www.toobit.com/
Changelog09/05/2025 - Preliminary Report
PlatformiOS Mobile
LanguageSwift
Methodologyhttps://hackenio.cc/pentest_methodology

Protect your dApp with insights like these.

Audit Summary

7Total Findings
1Resolved
6Accepted
0Mitigated

The system users should acknowledge all the risks summed up in the risks section of the report

System Overview

Toobit is a centralized cryptocurrency exchange established in 2022. It serves over 3 million users across more than 100 countries, offering a comprehensive suite of trading services, including spot trading, derivatives, copy trading, and automated trading bots.

The Toobit iOS mobile application integrates with the platform’s backend services to facilitate various trading operations. Key functionalities include:

  • Spot Trading API: Enables users to perform spot trading operations, such as market data retrieval, account management, and order execution.

  • USDT Swap Trading API: Allows users to trade perpetual contracts settled in USDT, offering similar features to the Spot Trading API but tailored for derivatives trading.

The application manages several critical asset categories:

  • User Data: Personal information, account balances, and transaction history.

  • Authentication Credentials: API keys, tokens, and secret keys used to access the APIs.

  • Financial Transactions: Order placements, cancellations, and trade executions.

  • Market Data: Real-time and historical price information.

Findings

Code
Title
Status
Severity
F-2025-1020Sensitive Information Stored in NSUserDefaults
accepted

Medium
F-2025-1020 Insecure SSL Pinning Implementation in Flutter
accepted

Medium
F-2025-1019Jailbreak Detection Bypass
accepted

Medium
F-2025-1021Lack of Anti-Hook and Anti-Debug Mechanism
accepted

Low
F-2025-1021Sensitive Data Exposure in iOS Snapshots
fixed

Low
F-2025-1021Information Exposure via iOS Clipboard
accepted

Low
F-2025-1021Third-Party Keyboards Are Allowed
accepted

Low
1-7 of 7 findings

Uncover findings like these to secure your project.

Appendix 1. Severity Definitions

Severity

Description

Critical
These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

High
These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

Medium
These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

Low
These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.
  • Severity

    Critical

    Description

    These issues present a major security vulnerability that poses a severe risk to the system. They require immediate attention and must be resolved to prevent a potential security breach or other significant harm.

    Severity

    High

    Description

    These issues present a significant risk to the system, but may not require immediate attention. They should be addressed in a timely manner to reduce the risk of the potential security breach.

    Severity

    Medium

    Description

    These issues present a moderate risk to the system and cannot have a great impact on its function. They should be addressed in a reasonable time frame, but may not require immediate attention.

    Severity

    Low

    Description

    These issues present no risk to the system and typically relate to the code quality problems or general recommendations. They do not require immediate attention and should be viewed as a minor recommendation.

Appendix 2. Scope

The scope of the project includes the following:

Assets in Scope

iOS - iOS

Disclaimer