Checklists/EVM/Uniswap / AMM / DEX

Uniswap / AMM / DEX Security Checklist

45 security checks for decentralized exchanges, automated market makers, and Uniswap-style protocols. Covering swap mechanics, oracle security, liquidity management, MEV protection, and common DeFi vulnerabilities.

Critical Threat Landscape

AMMs and DEXs are among the most targeted DeFi protocols:

$1B+ lost to DEX/AMM exploits including flash loan attacks and oracle manipulation

1,084 findings analyzed from Uniswap-related protocol audits on Code4rena and other platforms

45 vulnerability patterns identified across swap, oracle, liquidity, and fee categories

Price manipulation remains the #1 attack vector for AMM protocols

MEV & sandwich attacks cause millions in user losses annually

📄
Want this as a PDF? DM me on Telegram →
Showing 45 of 45 vulnerabilities
#1

Swap Oracle Price Manipulation

High

Uniswap-based oracles are vulnerable to price manipulation attacks via flash loans and liquidity changes

#2

Pool Liquidity Calculation Errors

High

Incorrect liquidity calculations in AMM pools cause fund loss or stuck assets

#3

Router Token Approval Issues

High

Missing or incorrect token approvals for router operations cause transaction failures

#4

Position NFT Manipulation

High

Attackers can manipulate V3 position NFTs to steal funds or cause undercollateralization

#5

Swap Fee Collection and Distribution

Medium

Incorrect handling of swap fees leads to user losses or protocol insolvency

#6

Pool Cardinality and Configuration

Medium

Hardcoded or missing pool configurations lead to DoS or incorrect pricing

#7

Incorrect Price Calculation Logic

High

Price calculations use wrong formulas or data sources leading to incorrect valuations

#8

Liquidity Manipulation for Price Control

High

Attackers manipulate liquidity to control AMM prices and exploit dependent protocol logic

#9

Oracle Manipulation via Flash Loans

High

Flash loans can manipulate TWAP or spot prices to exploit protocol logic

#10

Rounding Errors in Price Calculations

High

Rounding errors in price calculations lead to fund losses or incorrect valuations

#11

Oracle Data Feed Reliability

Medium

Oracle feeds can be disabled, delayed, or return stale data during volatility

#12

Missing Price Validation and Bounds

Medium

Missing price validation allows extreme or invalid prices in calculations

#13

Admin Pool Parameter Manipulation

High

Admin functions can be exploited to manipulate pool parameters and steal funds

#14

Flash Loan Attacks on LP Rewards

High

Flash loans used to steal accrued LP rewards before proper distribution

#15

Liquidity Operation Slippage Bypass

High

Missing slippage protection on liquidity add/remove enables sandwich attacks

#16

Unsafe External Calls in Liquidity Operations

High

Unsafe external calls during liquidity operations cause reentrancy or fund loss

#17

Liquidity Fee Accounting Errors

Medium

Incorrect fee updates in deposit/withdraw functions lead to protocol losses

#18

Position Range and Tick Handling Flaws

Medium

Improper tick and position range handling leads to stuck funds

#19

Fee Decimal Precision Errors

High

Incorrect decimal handling causes fee miscalculations across different tokens

#20

Fee-on-Transfer Token Accounting

High

Fee-on-transfer tokens cause incorrect balance calculations and supply tracking

#21

Missing Fee Collection on Withdrawal

High

Accumulated fees not included in withdrawal calculations, shortchanging users

#22

Protocol Fee Trapping

Medium

Fees become permanently locked in contracts due to transfer restrictions

#23

Reentrancy in Fee Claiming

Medium

Unprotected fee claiming functions allow double-claiming via reentrancy

#24

Front-Running and Sandwich Attacks

High

Transactions can be front-run or sandwiched, causing financial loss to users

#25

Cross-Contract Reentrancy via MEV

High

External calls before state updates enable recursive attacks and fund theft

#26

Insufficient Slippage Protection

Medium

Missing or inadequate slippage checks lead to unexpected losses on swaps and deposits

#27

Price Arbitrage via Multi-Collateral Systems

Medium

Price discrepancies between collateral types enable arbitrage attacks

#28

ERC777 Reentrancy via Transfer Hooks

High

ERC777 tokens trigger reentrancy via transfer hooks, bypassing checks-effects-interactions

#29

Permit Function Compatibility

Medium

Permit signatures fail with non-standard tokens, breaking gasless approval flows

#30

Non-Standard Token Behavior Assumptions

Medium

Hardcoded assumptions about token decimals, rebasing, and transfer behavior cause failures

#31

Unchecked Transfer Return Values

Medium

Token transfers that don't verify return values allow silent failures and fund loss

#32

Exploitable Rounding Direction

High

Consistent rounding in one direction enables fund drainage through repeated transactions

#33

Arithmetic Overflow and Underflow

Medium

Integer overflow/underflow in token amount and price calculations

#34

Precision Loss in Reward Distribution

Medium

Reward calculations lose precision, causing rewards to round to zero

#35

First Depositor Share Inflation Attack

Medium

First deposit in ERC4626 vaults can manipulate share-to-asset ratio

#36

Flash Loan Reward Theft

High

Staking contracts vulnerable to flash loan attacks that steal accrued rewards

#37

Insufficient Callback Validation

Medium

Callback functions with weak validation enable unauthorized actions

#38

Missing Initiator Context in Flash Actions

Medium

Flash loan functions fail to pass initiator context to callback recipients

#39

Position NFT Access Control Bypass

High

NFT splitting, transfer locks, and ownership checks can be bypassed to steal positions

#40

Unsafe NFT Transfers to Contracts

High

NFT transfers to contracts without ERC721Receiver freeze user assets permanently

#41

Liquidation Threshold and Market Lifecycle

Medium

Insufficient safety margins and deprecated market handling cause incorrect liquidations

#42

Missing Access Control on Critical Functions

High

Automation and admin functions lack proper caller restrictions

#43

Initialization and Deployment Attacks

Medium

Unguarded initializers allow attackers to front-run contract deployment

#44

Owner Self-Revocation and Permission Gaps

Low

Overly broad permissions and self-revocation risks lead to contract lockout

#45

Stuck Funds from Failed Operations

Medium

Failed emergency functions, reverted cross-chain transactions, and edge cases permanently lock user funds

Need a Professional DEX / AMM Audit?

AMMs and DEXs handle billions in daily volume. Get your protocol audited by a team that understands Uniswap-style architectures and DeFi-specific attack vectors.

oog
zealynx

Subscribe to Our Newsletter

Stay updated with our latest security insights and blog posts

© 2024 Zealynx