This document is a security audit report performed by danbogd, where CreaEther has been reviewed.
In total, 4 issues were reported including:
- 2 low severity issues.
- 2 minor observation
No critical security issues were found.
- It is possible to double withdrawal attack. More details here.
Transfer & transferFrom, approve functions do not prevent from sending tokens to address 0x0.
The contracts use solidity version 0.4.18. It is suggested to use the latest version and fix all compiler warnings that arise.
The function () payable { revert(); } was a pattern used to prevent implicit acceptance of ether in Solidity versions older than 0.4.0, but today this is unneeded.
No critical vulnerabilities were detected,but we highly recommend to complete this bugs before use.