Audit overview
The protocol has been audited multiple times across different releases and components:- Core vault system - Multiple audits by top-tier firms
- Market V1 Adapter V2 - Dedicated audits for the updated adapter
- Formal verification - Certora verification for critical components
All audits are stored in the audits folder of the Morpho Vault V2 repository.
Available audit reports
2025 audits
Market V1 Adapter V2
Certora
Date: December 15, 2025
File:
Type: Formal verification
File:
2025-12-15-market-v1-adapter-v2-certora.pdfType: Formal verification
Spearbit
Date: December 4, 2025
File:
Type: Security audit
File:
2025-12-04-market-v1-adapter-v2-spearbit.pdfType: Security audit
Blackthorn
Date: December 4, 2025
File:
Type: Security audit
File:
2025-12-04-market-v1-adapter-v2-blackthorn.pdfType: Security audit
Core vault audits
Spearbit
Date: September 15, 2025
File:
Type: Security audit
File:
2025-09-15-spearbit.pdfType: Security audit
ChainSecurity
Date: September 15, 2025
File:
Type: Security audit
File:
2025-09-15-chainsecurity.pdfType: Security audit
Blackthorn
Date: September 15, 2025
File:
Type: Security audit
File:
2025-09-15-blackthorn.pdfType: Security audit
Spearbit
Date: August 11, 2025
File:
Type: Security audit
File:
2025-08-11-spearbit.pdfType: Security audit
Zellic
Date: July 15, 2025
File:
Type: Security audit
File:
2025-07-15-zellic.pdfType: Security audit
Security Competition
Date: July 15, 2025
File:
Type: Bug bounty competition
File:
2025-07-15-competition.pdfType: Bug bounty competition
Spearbit
Date: May 19, 2025
File:
Type: Security audit
File:
2025-05-19-spearbit.pdfType: Security audit
Audit scope
Core vault components
The audits cover the following critical components:- VaultV2.sol - Main vault contract implementing ERC-4626
- VaultV2Factory.sol - Factory for deploying vault instances
- Adapter interfaces - IAdapter, IAdapterRegistry
- Gate interfaces - All four gate types for access control
- Libraries - MathLib, SafeERC20Lib, ErrorsLib, EventsLib
Key security areas
- Access control - Role-based permissions (owner, curator, allocators, sentinels)
- Timelock mechanism - Submit, execute, and revoke logic
- Asset allocation - Caps system (absolute and relative)
- Share price calculation - Interest accrual and fee computation
- In-kind redemptions -
forceDeallocatepenalty mechanism - Gate enforcement - Four-gate access control system
- ERC-4626 compliance - Standard vault interface implementation
- ERC-2612 compliance - Permit functionality for gasless approvals
The vault uses transient storage (EIP-1153) for gas optimization. Audits verify the correct usage of this feature.
Formal verification
Certora has performed formal verification on critical components:- Invariant verification - Mathematical proofs of key system properties
- Function correctness - Verification of state transitions
- Access control - Proof that only authorized roles can execute privileged functions
- Arithmetic safety - Prevention of overflow/underflow issues
Formal verification provides mathematical guarantees about contract behavior, complementing traditional security audits.
Bug bounty program
In addition to formal audits, Morpho ran a security competition:- Date: July 15, 2025
- Type: Public bug bounty competition
- Report:
2025-07-15-competition.pdf
Security assumptions
The audits validate the following security assumptions:Token requirements
The vault assumes the underlying asset token:- Is ERC-20 compliant (may omit return values on transfer/transferFrom)
- Only decreases vault balance on transfer/transferFrom
- Does not re-enter the vault on transfer/transferFrom
- Has no fees on transfer
- Increases/decreases balances by exact amounts
Adapter requirements
Adapters must:- Only allow the vault to call allocate/deallocate
- Enter/exit markets only in allocate/deallocate
- Return correct IDs without repetition
- Not re-enter the vault (directly or indirectly)
- Make deallocate possible for in-kind redemptions
Liveness requirements
For continued operation:- Adapters must not revert on
realAssets - Token must not revert on valid transfers
totalAssetsandtotalSupplymust stay below ~10^35- Vault must be interacted with at least every 10 years
- Adapters must not revert on deallocate when markets are liquid
Audit findings summary
While specific findings are detailed in each audit report, common themes include:- Gas optimizations - Recommendations for reducing transaction costs
- Edge case handling - Rare scenarios that needed additional safeguards
- Documentation improvements - Clarifications in code comments and specs
- Best practice adherence - Alignment with Solidity and DeFi standards
Accessing audit reports
All audit reports are available in the GitHub repository:Responsible disclosure
If you discover a security vulnerability:- Do not open a public GitHub issue
- Contact Morpho’s security team directly
- Provide detailed information about the vulnerability
- Allow time for the team to investigate and remediate
Morpho takes security seriously and maintains an ongoing relationship with leading audit firms to ensure the protocol remains secure as it evolves.
Continuous security
Security is an ongoing process:- Regular audits - New features and adapters undergo dedicated audits
- Formal verification - Critical components verified mathematically
- Community review - Open-source code enables public scrutiny
- Bug bounties - Incentivized security research
- Immutable contracts - Core vault logic cannot be upgraded