Audit Report

Furucombo is composed of Proxy Contract & Handler Contracts. We keep conducting audits for all of our Smart Contracts and Handler Contracts to enhance the security of the Furucombo system.

Furucombo Audits

Website & API Audit

The Furucmobo website and API have been audited by cure53. There were no major or critical issues detected.

Furucombo Main Contract

Peckshield

Peckshield has formally verified the Proxy, Registry, and handlers of the Furucombo system. Some minor issues were detected which have all been addressed. The full report can be viewed here.

Certora

Certora has formally verified the Proxy, Registry, and handlers of the Furucombo system. Some minor issues were detected which have all been addressed. The full report can be viewed here.

COMBO token and Vesting contracts

Chainsulting

The COMBO token and Vesting contracts have been audited by Chainsulting. There were no major or critical issues detected. The full report can be viewed here.

Hacken

The COMBO token and Vesting contracts have been audited by Hacken. There were no major or critical issues detected. The full report can be viewed here.

Certik

The COMBO token and Vesting contracts have been audited by Certik. There were no major or critical issues detected. The full report can be viewed here.

rCOMBO token contract

Chainsulting

The rCOMBO token contract has been audited by Chainsulting. There were no major or critical issues detected. The full report can be viewed here.

Hacken

The rCOMBO token contract has been audited by Hacken. There were no major or critical issues detected. The full report can be viewed here.

Certik

The rCOMBO token contract has been audited by Certik. There were no major or critical issues detected. The full report can be viewed here.

Compound smart wallet handler and Synthetix staking handler

Haechi

Compound smart wallet handler and Synthetix staking handler have been audited by Haechi with zero critical issues found.

Furucombo's system DOES NOT hold user's funds right now, so the risk of being hack is relatively low compare to other money protocols. We send user's funds directly to those protocols s/he is using, and we send all funds back to the user's wallet after her/his transaction is done.