Lido Finance · Smart Contract Security AssessmentLido Finance Client Hub

Lido Community Staking Module

Zealynx audited Lido Finance's Community Staking Module (CSM), the permissionless validator on-ramp into the Lido protocol. The review was conducted in collaboration with Shieldify across approximately 3,000 nSLOC, focusing on bond-lock accounting and asset-recovery flows. Two Low severity findings were identified: a potential arithmetic overflow in the bond-lock accumulation path, and a fee-on-transfer token accounting issue in the asset recovery library.

EthereumSoliditySmart Contract Code Review2024-08-31github.com/lidofinance/community-staking-moduleZealynx methodology
Total findings
2
0 fixed · 2 acknowledged
Critical
00
High
00
Medium
00
Low + Info
02
02

Scope

2 files · 3,000 SLOC
Repository
Initial commit
8ce9441dce10
Platform
Ethereum · Solidity
Methodology
File
src/abstract/CSBondLock.sol
src/lib/AssetRecovererLib.sol
03

Findings

click any row for the full write-up
04

Key Findings

  • Potential overflow in _lock() accumulation path. The unchecked block in CSBondLock._lock() adds new amounts to any existing locked amount; over repeated calls this can theoretically overflow even though access is restricted to onlyCSM. Recommended either an explicit overflow check or an upper bound on lockable amounts.
  • Fee-on-transfer tokens can desync recoverERC20() accounting. AssetRecovererLib.recoverERC20() emits the requested amount in ERC20Recovered and assumes the full transfer succeeds; for fee-on-transfer tokens the actual transferred amount is lower, leading to misleading event data and potential off-chain reconciliation issues. Recommended a balance-delta check around the safeTransfer to record the true amount.
05

Team & approval

Lead Auditor
Sergio Corrales (Secoalba)
@Seecoalba
Auditor
Carlos (Bloqarl)
@TheBlockChainer
Co-auditor
Shieldify
06

Disclaimer

This audit is not an endorsement and does not constitute investment advice. Zealynx reviewed the codebase at the commits listed in section 02 over the engagement window. Findings are limited to issues identified within that scope and do not preclude the existence of other vulnerabilities. Subsequent code changes are not covered by this report unless the engagement is explicitly extended.

Download PDF (9p)
ZEALYNX SECURITY · published 2024-08-31
2 findings · Solidity

oog
zealynx

Smart Contract Security Digest

Monthly exploit breakdowns, audit checklists, and DeFi security research — straight to your inbox

© 2026 Zealynx