This document is a security audit report performed by danbogd, where SymVerse has been reviewed.
Сommit hash d38e09b7c90763c283215c6da043e720b324f98f.
In total, 4 issues were reported including:
- 0 medium severity issues
- 2 low severity issues
- 1 owner privileges (ability of owner to manipulate contract, may be risky for investors)..
- 1 notes.
No critical security issues were found.
Accroding to ERC20 standard, when initializing a token contract if any token value is set to any given address a transfer event should be emited.
-
It is possible to double withdrawal attack. More details here.
-
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here.
Add into a function transfer(address _to, ... )
following code:
require( _to != address(this) );
Contract owner allow himself to:
Lock/unlock all users function here
In SymToken.sol, according to the ERC20 standard, the variable decimals should be declared as uint8.
The review did not show any critical issues, some of low severity issues were found.