Potential Risks
DISCLAIMER // NFA // DYOR
This analysis is based on decompiled bytecode — the contract source code is not verified on Etherscan. Function names, parameter types, and internal logic are inferred from selector matching, transaction input decoding, and event log analysis. We are not smart contract security experts. This document should not be considered a comprehensive security audit or financial advice. Always verify critical information independently.
⊙ generated by robots | curated by humans
| METADATA | |
|---|---|
| Contract Address | 0x99c96efF...Ab2dCC (etherscan) |
| Network | Ethereum Mainnet |
| Analysis Date | 2026-03-29 |
Risk Summary Matrix
| SEVERITY | COUNT | CATEGORIES |
|---|---|---|
| ☒ Critical | 4 | Custodial Fund Risk, Unverified Source, Keeper Authority, No Audit |
| △ High | 4 | Centralized Control, No Timelock, Self-Reported Profit, Withdrawal Uncertainty |
| △ Medium | 3 | No Multisig, Young Contract, Fee Opacity |
| ☑ Low | 2 | Uniswap Dependency, Event Coverage |
| ◇ Informational | 2 | Unknown Functions, SENT Token Relationship |
Critical Risks
☒ CRITICAL: Custodial Fund Risk
Description: The contract holds user ETH directly. Users deposit funds and trust the keeper to trade and manage them. There is no escrow, no insurance fund, and no mechanism for users to control how their funds are traded.
Impact:
- Keeper can execute any trade, including unprofitable ones
- No on-chain constraint prevents trading all user funds at a loss
- Keeper controls slippage tolerance (minTokenOut parameter)
- If keeper private key is compromised, all pooled funds are at risk
- No mechanism to prevent keeper from setting unfavorable trade parameters
Current Exposure: ~4.84 ETH across 85 user vaults
Affected Functions:
executeTrade(0xea0ccfae) — trades user fundscloseTrade(0xd86938ba) — closes positionswithdraw/withdrawPartial— fund retrieval (subject to restrictions)
Comparison to Industry:
- Legitimate DeFi vaults (Yearn, Aave) use audited on-chain strategies with no single-party discretion
- Managed funds in traditional finance require regulatory licensing, segregated accounts, and insurance
- This contract has none of these protections
☒ CRITICAL: Unverified Source Code
Description: The contract source code is not verified on Etherscan. All analysis is based on bytecode decompilation, function selector matching, and transaction pattern observation.
Impact:
- Cannot independently audit the implementation logic
- Hidden functions or backdoors may exist in the 16 unidentified function selectors
- Compiler optimizations may obscure actual behavior
- No guarantee that observed behavior matches intended design
Affected Functions: All — especially the 16 unmatched selectors:
0x06e20080,0x1a519533,0x553a9a93,0x5b451dff,0x6f747452,0x8b4c6df1,0x8c07635a,0xa0aca335,0xae1e9118,0xb3051d6e,0xbda962d5,0xc84d5389,0xc9b6e079,0xda91a291,0xe7ba4fe5,0xe87ce5ee,0xf1cb0216
Mitigation:
- Request contract owner verify source code on Etherscan
- Use transaction simulation before interacting
- Limit exposure until verification is available
☒ CRITICAL: Unrestricted Keeper Authority
Description: The keeper has complete discretion over all trade parameters with no on-chain constraints beyond MAX_TRADE_ETH (0.5 ETH per trade).
Impact:
- Keeper chooses which token to buy (could select illiquid or worthless tokens)
- Keeper sets slippage tolerance (minTokenOut) — could set to 0 allowing maximum slippage
- Keeper controls trade timing — could front-run market movements
- Keeper decides when to close positions — could close at a loss
- No user approval mechanism for individual trades
- No stop-loss or take-profit automation on-chain
Affected Functions:
executeTrade— 7 parameters all controlled by keepercloseTrade— 5 parameters all controlled by keeper
Attack Scenarios:
- Keeper executes trades to illiquid tokens with 0 minOutput, extracting value via Sandwich Attacks
- Keeper trades into tokens they or associates hold, creating artificial volume
- Keeper delays trade execution to capture adverse price movements
- Keeper executes many small trades to generate fees while net-zero for users
☒ CRITICAL: No Independent Audit
Description: No audit report is available for this contract. Combined with unverified source code, the contract represents an entirely trust-based system.
Impact:
- No third-party verification of fund safety
- No review of access control implementation
- No validation of trade execution logic
- No assessment of potential exploits
High Risks
△ HIGH: Centralized Owner/Keeper Control
Description: Owner and keeper are the same single Externally Owned Account (EOA) (0x9fBcc72A...63eA03). This address has:
- Full administrative control (setKeeper, setFeeRecipient, transferOwnership)
- Full trade execution authority (executeTrade, closeTrade)
- Deployed the contract
Impact:
- Single point of failure — private key compromise = total fund loss
- No checks and balances between roles
- No governance or community oversight
- Owner can change fee recipient, keeper, and ownership at will
Industry Standards:
- Legitimate DeFi protocols separate admin from operational roles
- Critical operations require Multisig (3-of-5, 4-of-7)
- timelock delays allow community review before changes
- This contract has none of these
△ HIGH: No timelock Protection
Description: All administrative and trade execution functions execute immediately. No delay period exists for any operation.
Impact:
- Owner can change keeper, fee recipient, and ownership instantly
- No advance warning for parameter changes
- Community cannot react to adverse changes
- No opportunity to withdraw before harmful trades
△ HIGH: Self-Reported Profit
Description: The totalProfitGenerated value (~0.018 ETH) is maintained by the contract's own logic during trade execution. There is no independent verification mechanism.
Impact:
- Profit calculations may not reflect actual realized gains
- Closed positions may show "profit" even if the round-trip trade lost value
- Users relying on getStats() for performance evaluation may be misled
- No way to verify profit calculations without source code
Verification Difficulty:
- Would require tracing every trade, calculating actual swap rates, and comparing to reported profit
- Token amounts received vs sold back must be compared at market rates
- Fee deductions may not be reflected in profit numbers
△ HIGH: Withdrawal Uncertainty
Description: Only 2 withdrawal transactions were observed in the contract's short history. The withdrawal mechanism's constraints are not fully understood from bytecode alone.
Impact:
- Unclear whether users can withdraw at any time or only when no active trade exists
- Unclear whether withdrawal requires keeper approval
- Unclear whether partial withdrawals return proportional profit
- Cannot verify fund availability guarantees
Observed:
0x2e1a7d4d(withdraw) — 2 calls0x66c91379(withdrawPartial) — 0 calls observed
Medium Risks
△ MEDIUM: No Multisig Protection
Description: Single EOA owner controls all administrative functions with no multi-signature requirement.
Current Owner: 0x9fBcc72A...63eA03
Impact:
- No distributed trust model
- Single point of compromise for all admin functions
- No way for users to prevent unilateral owner actions
△ MEDIUM: Extremely Young Contract
Description: The contract was deployed on 2026-03-28 — approximately 1 day before this analysis. It has not undergone the test of time and usage that older protocols have.
Impact:
- No Lindy Effect — unproven durability
- Potential for undiscovered bugs in complex trade logic
- Limited transaction history to analyze behavioral patterns
- 85 users depositing into a day-old unverified contract represents elevated risk
△ MEDIUM: Fee Structure Opacity
Description: A flat 0.005 ETH fee is sent to the fee recipient on each deposit, but the stored fee value in slot 7 shows 0.01 ETH. The discrepancy is unclear.
Impact:
- Fee calculations may not be transparent
- Fee amount could be changed by owner (if settable via unidentified function)
- Users may not fully understand fee structure before depositing
- Additional hidden fees may exist in trade execution
Low Risks
☑ LOW: Uniswap V3 Dependency
Description: All trades execute through Uniswap V3 SwapRouter at 0xe592427A...861564. This is a well-audited, battle-tested protocol.
Assessment: Low risk — Uniswap V3 is one of the most used and audited DeFi protocols. The dependency itself is not a concern; the risk is in how the keeper uses it.
☑ LOW: Event Coverage
Description: The contract emits events for deposits, trades, and administrative changes. This enables off-chain monitoring.
Events Observed:
- VaultDeposit (28 occurrences)
- TradeExecuted (13 occurrences)
- TopUpOrWithdraw (8 occurrences)
- OwnershipTransferred (1 occurrence)
Assessment: Good practice for transparency. Users can monitor keeper actions via event logs.
Informational
◇ INFO: 16 Unknown Function Selectors
Description: Of 44 function selectors in the dispatch table, 16 could not be matched to known signatures via 4byte.directory or cast 4byte. These represent custom functions whose purpose is unknown.
Questions:
- Do any of these functions allow fund extraction?
- Are any of these admin functions with additional powers?
- Could they represent emergency/backdoor functionality?
- Are they view functions or state-changing?
Recommendation: Source code verification would resolve these unknowns.
◇ INFO: SENT Token Relationship
Description: The contract references the Sentinel SENT token (0xe88BaAB9...aDc304) for eligibility/tier purposes. Users declare a SENT amount during deposit, but the contract does not appear to transfer or lock SENT tokens.
Observations:
- Users can deposit with sentAmount = 0 (no SENT required)
- getEligibility checks the user's SENT balance via the token contract
- Tier system appears to reward higher SENT holders with potential benefits
- The actual benefit of holding SENT for this vault is unclear from bytecode alone
Risk Mitigation Checklist
For users considering interaction with this contract:
- Understand this is a custodial system — you are trusting the keeper with your ETH
- Accept that the keeper has full discretion over trade execution
- Accept risk of unverified source code with 16 unknown functions
- Verify withdrawal functionality works before depositing significant amounts
- Monitor TradeExecuted events to track what trades the keeper makes
- Keep exposure small — the contract is 1 day old with no audit
- Monitor for ownership or keeper changes via events
- Understand the 0.005 ETH flat fee on each deposit
- Accept that reported profits are self-calculated by the contract
For the contract owner:
- Verify source code on Etherscan
- Separate owner and keeper roles to different addresses
- Transfer ownership to a Multisig
- Implement timelock for administrative functions
- Commission an independent security audit
- Publish documentation explaining the trading strategy
- Implement on-chain safeguards (max loss per trade, daily trade limits)
- Add user consent mechanism for trade execution
- Document fee structure transparently
Disclaimer
This risk analysis is based on bytecode decompilation and transaction pattern observation of an unverified contract. It should not be considered a comprehensive security audit. Professional blockchain security auditors should review the contract before any critical decisions or significant value interactions. The observations in this document may not capture all risks, and the actual contract behavior could differ from the analysis.