thor
Audited by Socket on Mar 17, 2026
1 alert found:
Obfuscated FileNo explicit malicious code is visible in this specification text. However, built-in native contracts are consensus- and value-critical components implemented in Go outside the EVM, making them high-sensitivity infrastructure. Primary security risks identified: centralized executor privilege enabling arbitrary calls and Params modifications; potential for economic manipulation via Energy/Rewards and Staker/Delegation state changes; complex cross-contract and transition-period logic that increases the chance of subtle bugs; and the elevated blast radius of any bug or malicious change in native Go handlers. Recommended actions: perform a full code audit of the Go native implementations (search for network I/O, hard-coded credentials, privileged backdoors, incorrect auth checks), review governance processes protecting Executor actions, add regression tests for transition logic and gas/revert semantics across contract versions, and apply code review & signed releases for native binaries.