This document is a security audit report performed by RideSolo, where TerraEco Token has been reviewed.
2 issues were reported :
-
0 high severity issues.
-
0 medium severity issues.
-
1 low severity issue.
-
1 note.
A possible overflow can occure if _addedValue
is too high either by mistake or by intention.
Always use SafeMath
when performing such operations.
function increaseApproval(address _spender, uint _addedValue) public returns (bool) {
allowed[msg.sender][_spender] = allowed[msg.sender][_spender] + _addedValue;
emit Approval(msg.sender, _spender, allowed[msg.sender][_spender]);
return true;
}
- It is possible to double withdrawal attack. More details here
- Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here
The audited contract can be deployed.