Seda is programmable oracle infrastructure. Allowing developers to access any data from any L1 or L2. This audit is focussed on the chain and the oracle batch proof accessibility and verification across evm chains.
Scope
On what chains are the smart contracts going to be deployed?
The SEDA protocol involves two types of smart contracts with distinct scopes:
CosmWASM contracts: These implement the core business logic of the protocol and are deployed exclusively on the SEDA Chain.
EVM contracts: These facilitate interoperability between SEDA and other networks. They are deployed on the following EVM-compatible chains:
If you are integrating tokens, are you allowing only whitelisted tokens to work with the codebase or any complying with the standard? Are they assumed to have certain properties, e.g. be non-reentrant? Are there any types of weird tokens you want to integrate?
The SEDA Network operates with the SEDA Chain’s native token (SEDA), which follows coin type 118 and has 18 decimals.
The EVM contracts interact with the chain’s native token, primarily ETH on Ethereum and equivalent native assets on other chains. No additional token standards are integrated at this stage.
Are there any limitations on values set by admins (or other roles) in the codebase, including restrictions on array lengths?
The SEDA protocol is designed for progressive decentralization, but in its early stages, a failsafe mechanism based on roles and admin controls ensures stability, security, and incident response. These controls will be phased out or permanently disabled as the network matures.
SEDA Chain
Governance follows the standard Cosmos SDK governance model, where on-chain proposals and community voting determine module parameter changes and network upgrades. There are no arbitrary admin-controlled limitations beyond what is defined by governance.
A key aspect for the SEDA protocol is that WASM module parameters specify which accounts are authorized to upload and instantiate CosmWasm contracts, ensuring controlled and secure deployment.
CosmWASM Core Contracts
The Core Contracts owner account can:
Are there any limitations on values set by admins (or other roles) in protocols you integrate with, including restrictions on array lengths?
No.
Is the codebase expected to comply with any specific EIPs?
No.
Are there any off-chain mechanisms involved in the protocol (e.g., keeper bots, arbitrage bots, etc.)? We assume these mechanisms will not misbehave, delay, or go offline unless otherwise specified.
There are two off-chain components of the SEDA Network; the SEDA Overlay Network and the decentralized Solver Network.
SEDA Overlay Network
The SEDA Overlay Network is a multi-party computational network built to host tens of thousands of independently operated nodes. The primary responsibility of The Overlay Network is to query data sources as defined by a protocol Oracle Program.
The Oracle Program configuration determines the number of nodes elected, allowing for a customizable replication factor that balances scalability and decentralization. This secret committee independently queries the specified data sources and submits their results using a commit-reveal scheme. This process maintains data integrity and decentralized data querying, while eliminating the need for a single source of truth.
At the time of this audit, the SEDA Overlay Network will be launched in phased roll-out with a subset of allowlisted professional validators. The Overlay Network will be upgraded in the future to a permissionless model, incorporating staking and slashing mechanisms to secure participation and incentivize honest behavior. In the future, when a Data Request is submitted on the SEDA Chain, a randomly selected subset of Overlay Nodes forms a secret committee tasked with executing the data request binaries stored in the Oracle Program. This selection process leverages cryptographic sortition to ensure fairness and unpredictability, enhancing decentralization and security.
Decentralized Solver Network
The Solver Network is responsible for delivering data requests from the SEDA Prover Contract to the SEDA Chain for execution and returning the Data Request results back to the SEDA Prover Contract on the origin network.
To ensure tamper resistance, data results are batched, and each batch is signed by multiple validators using ECDSA signatures. The Solver submits the signed batch to the SEDA Prover Contract, which verifies its integrity and authenticity. When individual results are later submitted, they are verified against the corresponding batch using proofs of inclusion, ensuring they originate from a valid, previously verified batch.
What properties/invariants do you want to hold even if breaking them has a low/unknown impact?
SEDA Chain
CosmWASM Contracts & EVM Contracts
Please discuss any design choices you made.
SEDA Chain
CosmWasm Core Contracts:
EVM Contracts:
Further details are available in the 'SEDA Protocol Audit Overview' document listed below.
Please provide links to previous audits (if any).
SEDA engaged Trail of Bits to review the security of its token migration contracts and the SEDA chain’s staking and vesting modules.
https://github.com/trailofbits/publications/blob/master/reviews/2024-03-seda-chaintokenmigration-securityreview.pdf
Please list any relevant protocol resources.
SEDA Protocol Audit Overview: https://sedaprotocol.notion.site/SEDA-Protocol-Audit-Overview-190a68d575ca807ca2a2d4e232a77781
SEDA Website: https://seda.xyz
Additional Resources
Additional audit information.
The following areas are of particular importance for the audit:
Total Rewards
Contest Pool
Lead Senior Watson
Judging Pool
Lead Judge
51,600 USDC
25,400 USDC
3,000 USDC
10,000 USDC
Status
Scope
Start Time
End Time
Judging Rules