This document is a security audit report performed by danbogd, where IoTeX has been reviewed.
Сommit hash 13b1b1053529effce653deabfec427b70800eb42.
- Pausable.sol.
- SafeMath.sol.
- Ownable.sol.
- BasicToken.sol.
- ERC20.sol.
- ERC20Basic.sol.
- StandardToken.sol.
- IoTeXNetwork.sol.
In total, 2 issues were reported including:
- 0 medium severity issues
- 1 low severity issues
- 1 owner privileges (ability of owner to manipulate contract, may be risky for investors)..
- 0 notes.
No critical security issues were found.
-
It is possible to double withdrawal attack. More details here.
-
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here.
Add into a function transfer(address _to, ... ) following code:
require( _to != address(this) );
Contract owner allow himself to:
to pause functions of contract (transfer, transferFrom, approve, increaseApproval, decreaseApproval) here.
The review did not show any critical issues, some of low severity issues were found.