-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixes for minor audit issues #116
Conversation
… empty string as a curve name
Summary of Test Results if Merged To Main:
✅ All 107 tests passed! (0 skipped, Total: 107) Test Results for Merge
🔒 Security AnalysisHigh Severity Issuesarbitrary-send-ethImpact: AtomWallet._call(address,uint256,bytes) (src/AtomWallet.sol#214-221) sends eth to arbitrary user Dangerous calls: - (success,result) = target.call{value: value}(data) (src/AtomWallet.sol#215) Affected Files:
View Detailed Findings
Medium Severity IssuesView Medium Severity Issues##### incorrect-equality **Impact**: EthMultiVault._validateTimelock(bytes32) (src/EthMultiVault.sol#2215-2227) uses a dangerous strict equality: - timelock.readyTime == 0 (src/EthMultiVault.sol#2218)Affected Files:
Recommended Actions
⛽ Gas Analysis📊 First gas snapshot created |
Summary of Test Results if Merged To Main:
✅ All 107 tests passed! (0 skipped, Total: 107) Test Results for Merge
🔒 Security AnalysisHigh Severity Issuesarbitrary-send-ethImpact: AtomWallet._call(address,uint256,bytes) (src/AtomWallet.sol#214-221) sends eth to arbitrary user Dangerous calls: - (success,result) = target.call{value: value}(data) (src/AtomWallet.sol#215) Affected Files:
View Detailed Findings
Medium Severity IssuesView Medium Severity Issues##### incorrect-equality **Impact**: EthMultiVault._validateTimelock(bytes32) (src/EthMultiVault.sol#2215-2227) uses a dangerous strict equality: - timelock.readyTime == 0 (src/EthMultiVault.sol#2218)Affected Files:
Recommended Actions
⛽ Gas Analysis📊 First gas snapshot created |
Issues fixed in this PR: