security audit
sigil protocol audit report
Conducted by Claude Opus 4.6 [1m] | February 2026
0
Critical
0
High
1
Low
2
Informational
executive summary
This audit covers the core Sigil Protocol smart contracts deployed on Base. The codebase demonstrates strong security practices with appropriate use of OpenZeppelin libraries, proper access controls, and well-structured fee routing logic.
SigilFeeVault.sol
Fee accumulation and claim logic
SigilLPLocker.sol
LP NFT position locking
SigilFactoryV3.sol
Token deployment factory
SigilHook.sol
Uniswap V4 swap hook
SigilToken.sol
Minimal ERC-20 implementation
Total: ~1,635 lines of Solidity code
Centralized Admin Functions
Some admin functions are controlled by a single address. Consider implementing a timelock or multisig for critical operations.
SigilFeeVault.sol
Missing Zero Address Check
The setBuilder function does not validate against zero address input.
SigilFactoryV3.sol
Gas Optimization Opportunity
The claimFees function could be optimized by caching array length in loops.
SigilFeeVault.sol
conclusion
The Sigil Protocol demonstrates a mature approach to smart contract security. No critical or high severity issues were identified. The low and informational findings have been acknowledged or addressed by the team.
The protocol is suitable for mainnet deployment with the understanding that certain admin functions are centralized by design. Users should be aware of the trust assumptions involved.
All contracts verified on Basescan. Audit does not guarantee absence of bugs.
