Genesis Vision smart contract security audit report performed by Callisto Security Audit Department
Commit hash 4eca90915580f209e86db8270c4f53d6e645712b.
In total, 6 issues were reported including:
-
3 low severity issues.
-
2 notes.
-
1 owner privileges (the ability of an owner to manipulate contract, may be risky for investors).
No critical security issues were found.
-
It is possible to double withdrawal attack. More details here.
-
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here.
Add the following code to the transfer(_to address, ...)
function:
require( _to != address(this) );
Contract owner allow himself to raise TotalSupply and he will get added amount.
It is possible to remain out of contract control by accidentally calling function without parameter.
In ManagerToken.sol, according to the ERC20 standard, the variable decimals should be declared as uint8.
According to ERC20 standard, when initializing a token contract if any token value is set to any given address a transfer event should be emitted.
In the ManagerToken.sol, the developers didn't use SafeMath to prevent overflow by the owner.
The audited smart contract can be deployed. Only low severity issues were found during the audit.
https://gist.github.com/yuriy77k/113a182dbe2742936d548b8217d59482
https://gist.github.com/yuriy77k/f51540e6dd89019c991c85fbe829163d
https://gist.github.com/yuriy77k/3be27844e8b3a408b16454926db88c08