Asmx Smart Contracts Audit Report

Table of Contents

Read Time: 5 minutes

We’ve been asked by the ASMX team to review and audit their smart contracts.

We at QuillAudits are a team of blockchain developers, consultants, and security auditors, trying to build a more secure and safe community in the Blockchain space. QuillAudits, QuillHash Smart Contracts Security Audit platform ensures the reliability of your smart contract by complete assessment of your system’s architecture and your smart contract codebase.

by QuillAudits, October 2018


This Audit Report highlights the overall security of Coalichain’s Smart Contract. With this report, we have tried to ensure the reliability of their smart contract by complete assessment of their system’s architecture and the smart contract codebase.

Auditing Approach and Methodologies applied –

QuillAudit team has performed thorough testing of the project starting with analyzing the code design patterns in which we reviewed the smart contract architecture to ensure it is structured and safe use of third-party smart contracts and libraries.

Our team then performed a formal line by line inspection of the Smart Contract in order to find any potential issue like race conditions, transaction-ordering dependence, timestamp dependence, and denial of service attacks.

In the Unit testing Phase we coded/conducted Custom unit tests written for each function in the contract to verify that each function works as expected. In Automated Testing, We tested the Smart Contract with our in-house developed tools to identify vulnerabilities and security flaws.

The code was tested in collaboration of our multiple team members and this included –

  1. Testing the functionality of the Smart Contract to determine proper logic has been followed throughout.
  2. Analyzing the complexity of the code by thorough, manual review of the code, line-by-line.
  3. Deploying the code on testnet using multiple clients to run live tests.
  4. Analyzing failure preparations to check how the Smart Contract performs in case of bugs and vulnerabilities.
  5. Checking whether all the libraries used in the code are on the latest version.
  6. Analyzing the security of the on-chain data.

Summary of ASMX Smart Contract –

The ASMX contract is functionally an ERC-20 Smart Contract. The smart contract has all the functions of an ERC20 standard with the addition of a function to distribute tokens manually.

Security Level references

Every issue in this report was assigned a severity level from the following:

  • High severity issues will probably bring problems and should be fixed.
  • Medium severity issues could potentially bring problems and should eventually be fixed.
  • Low severity issues are minor details and warnings that can remain unfixed but would be better fixed at some point in the future.

Asmx Smart Contracts Audit Report

High severity issues:

1.) INITIAL_SUPPLY in contract ASMX is having 380831804 tokens and in your white paper figure is 380831803.

Status: Not yet Fixed.

2.) Change the name of send() function to sendTokens(). sendTokens() will be more accurate and verbose. It can be an issue if you will be using web3 or truffle for making creating any dapp or dashboard to call function of your contract, because truffle has predefined send() function for sending either to contract.

instance.send(web3.toWei(1, “ether”)).then(function(result) {
 // Same result object as above.

Web3 also has a predefined send function for the following purpose:

Function — send: Will send a transaction to the smart contract and execute its method (Can alter the smart contract state).

So it can be dangerous if you will use web3 or truffle to interact with your contract.

Also in unit testing we are not able to test this function through truffle.

Note:- We are using sendTokens() as function name to test send() function because we are not able to call send() function from web3 or truffle so we have to change the name for testing purpose and we strongly recommend that you should change the name of this function as well.

Status: Not yet Fixed.

Medium Severity Issues:

1. Approval racing condition: The standard ERC20 implementation contains a widely-known racing condition in its approve function, wherein a spender is able to witness the token owner broadcast a transaction altering their approval, and quickly sign and broadcast a transaction using transferFrom to move the current approved amount from the owner’s balance to the spender. If the spender’s transaction is validated before the owner’s, the spender is able to spend their entire approval amount twice.

Line no 155:- approve() has a race condition problem.

approve() doesn’t check if the value of allowance is equal to 0 before performing operation.

We recommend disabling users from calling this function if the value of allowance is not equal to 0.

We also recommend adding this code before performing operation:

require((_value == 0) || (allowed[msg.sender][_spender] == 0));

Status: Not yet Fixed.

2. Negative tokens decrease approval: Contract should not be able to decrease tokens with negative value passed in decreaseApproval(address _spender, uint _subtractedValue) function arguments.

This test is failing. You should add require(_subtractedValue > 0) in the beginning of decreaseApproval(address _spender, uint _subtractedValue) function body.

Status: Not yet Fixed.

Low Severity Issues:

1.) Solidity version must be fixed(Always use Fixed Version).

It should not pragma solidity ^0.4.19;

It should be pragma solidity 0.4.19;

Status: Not yet Fixed.

2.) Function Ownable in contract Ownable should be named as constructor according to the latest standards of Ethereum.

Status: Not yet Fixed.

3.) Unit test Failed: should revert if someone if the user tries to transfer zero tokens. It will lead to wastage of gas if the user sends 0 tokens by mistake so it is better to revert the transaction.

Status: Not yet Fixed.

4.) Event and Function name must be different.

Refers to: Transfer function and Event.

Status: Not yet Fixed.

5.) Function order is incorrect, fallback function cannot go after public function.

Status: Not yet Fixed.

3. Unit Testing

Test Suite Result

✓ Should correctly initialize Constructor values.
✓ Should correctly initialize totalSupply balance.
✓ Should transfer right tokens.
✓ Should Mint right token.
✓ Should Mint and Burn right token.
✓ Should revert if the user tries to transfer zero token.
✓ Should revert if the user tries to transfer negative tokens.
✓ Should not be able to mint negative tokens.
✓ Should Approve address to spend a specific token.
✓ Should Mint right token and get approval.

Implementation Recommendations

Contract does not have much functionality to get information about ether present in contract.There is sendEther() function to send ether from contract to other address but there is no way to know how much ether is present in contract.


Overall, the code is clearly written and demonstrates effective use of abstraction, separation of concerns, and modularity. ASMX development team demonstrated high technical capabilities, both in the design of the architecture and in the implementation.

We found some critical issue and several additional issues that require the attention of the ASMX team. Given the subjective nature of some assessments, it will be up to the ASMX team to decide whether any changes should be made.

You can request for Audit by filling a form :

Thanks for reading. Also, do check out our earlier blog posts.

At QuillHash, we understand the Potential of Blockchain and have a good team of developers who can develop any blockchain applications like Smart Contracts, dApps,Smart Coins, DeFi, DEX on the any Blockchain Platform like EthereumEOS and Hyperledger.

To be up to date with our work, Join Our Community :-

Telegram | Twitter | Facebook | LinkedIn


Related Articles

View All



Description: This type of security vulnerability can occur when untrusted data is used in a smart contract without proper validation or sanitization, allowing an attacker to execute unauthorized functions or modify the state of the contract.


QuillAudits 🤝 Lovely Launchpad

We are pleased to extend our #partnership with Lovely Launchpad and await great possibilities to secure the #Web3 ecosystem & beyond.

More About Lovely Launchpad:

#web3community #collaboration

As Web3 developers, it's critical to prioritize smart contract security to protect users' funds and maintain the integrity of the blockchain.

Threat modelling and Risk assessment are two key processes that can help identify potential risks and…


@safemoon has been exploited due to a public burn issue with around ~$8.9 M loss.

With the exploited public burn bug, the upgrade was initiated by the official SafeMoon: Deployer.

Load More

Amidst FTX Saga, Hacker Swept More Than $25 Million in 2nd week of November

The contract reinvested (the earn function was not called) before the user pledged (depositAll function) without settling the reward, which means that when the user pledged, the contract did not settle the previous reward and instead conducted a new investment.

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:


Refer QuillAudits to Web3 projects for audits.


Earn rewards as we conclude the audits.


Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $190K+