Skip to content

Potential Risks

DISCLAIMER // NFA // DYOR

This analysis is based on observations of the contract behavior. We are not smart contract security experts. This document aims to explain what the contract appears to do based on the code. It should not be considered a comprehensive security audit or financial advice. Always verify critical information independently and consult with blockchain security professionals for important decisions.

⊙ generated by robots | curated by humans

METADATA
Contract Address 0x000000000000FB114709235f1ccBFfb925F600e4 (etherscan)
Network Ethereum Mainnet
Analysis Date 2026-02-28

Overview

A risk assessment was conducted against the zRouter contract as part of the broader contract analysis. The assessment examined trust assumptions, economic vectors, centralization characteristics, complexity surface area, and external dependencies across 1,659 lines of verified Solidity source code.

The contract integrates five distinct AMM protocols, a generic execution framework for arbitrary DEX routing, transient storage mechanics, and owner-controlled administrative functions. Each of these surfaces was evaluated independently.


Findings Summary

The assessment identified 13 findings across four severity tiers and five risk categories. No critical-severity issues were found. The findings span trust assumptions inherent to the router's design, economic considerations for users interacting with the contract, centralization characteristics of the owner role, and complexity risks arising from the contract's multi-protocol architecture.

SEVERITY COUNT
Critical 0
High 3
Medium 4
Low 3
Informational 3
CATEGORY FINDINGS
Trust Assumption 3
Economic 3
Centralization 1
Complexity 4
External Dependency 2

Report Availability

The detailed findings for this assessment are not publicly available at this time. The full report includes specific descriptions of each finding, affected code paths, severity justification, and suggested questions for contract owners and integrators.

If you are the contract owner, an integrator, or a security researcher with a legitimate interest in the full findings, you are welcome to request this portion of the report (no guarantees).