This document is a security audit report performed by danbogd, where Diligence has been reviewed.
- smartcontract.sol github commit hash 84cb5318231c8c6c080242ff0519d297c078bb03.
In total, 3 issues were reported including:
- 2 low severity issues.
- 1 minor observation
No critical security issues were found.
-
It is possible to double withdrawal attack. More details here.
-
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here.
The implemented token uses transfer to address 0x0 as basic burn mechanism, however accidental token loss issue can be applied.
The function () payable { revert(); } was a pattern used to prevent implicit acceptance of ether in Solidity versions older than 0.4.0, but today this is unneeded.
No critical vulnerabilities were detected,but we highly recommend to complete this bugs before use.