This document is a security audit report performed by danbogd, where LCX2 has been reviewed.
Сommit hash 1021bf8e087d1c3bd56ddc9f7f117e5d94a727ca.
In total, 5 issues were reported including:
- 0 medium severity issues
- 3 low severity issues
- 2 owner privileges (ability of owner to manipulate contract, may be risky for investors).
- 0 notes.
No critical security issues were found.
Incoming addresses should be checked for an empty value(0x0 address).
Contract owner allow himself to:
Upgrade the token contract and implement any logic in the new contract:
function setTokenAddress(IERC20 token) public onlyOwner returns(bool){
LCXToken = token;
return true;
}
Revoke the vesting, and take users tokens for himself even if the tokens were bought by the users using ETH or a different asset.
function revoke(address account) public onlyOwner {
VestedToken storage vested = vestedUser[account];
require(!vested.revoked);
uint256 balance = vested.totalToken;
uint256 vestedAmount = _vestedAmount(account);
uint256 refund = balance.sub(vestedAmount);
require(refund > 0);
vested.revoked = true;
vested.totalToken = vestedAmount;
LCXToken.safeTransfer(owner(), refund);
emit VestingRevoked(account);
}
There are no checks that the beneficiary address can be a contract address.
Example:
The user was able to divest himself of his interest even though the tokens never moved. He didn’t sell the timelocked tokens itself. He sold the future ownership of the tokens. The user is asked by the deployer of the LCX vesting contract for the address where he’d like to receive his tokens after the releaseTime expires in 3 years. User deploys the “Bypasser” contract and gives its address to the deployer of the LCX vesting contract. The Bypasser contract didn’t magically make the timelocked tokens transferable — it made the future ownership of the timelocked tokens transferable.
More details here.
function _setVesting(address account, uint256 amount, uint256 cliff, uint256 duration, uint256 startAt) internal {
require(account!=address(0));
require(cliff<=duration);
VestedToken storage vested = vestedUser[account];
vested.cliff = cliff;
vested.start = startAt;
vested.duration = duration;
vested.totalToken = amount;
vested.releasedToken = 0;
vested.revoked = false;
}
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here.
Add the following code to the transfer(_to address, ...) function:
require( _to != address(this) );
The review did not show any critical issues, some of low severity issues were found.