This is the report from a security audit performed on ETHERC by MrCrambo.
The audit focused primarily on the security of ETHERC smart contracs.
- https://github.com/ETHERCIO/smart_contract/blob/master/contracts/TokenStandard.sol
- https://github.com/ETHERCIO/smart_contract/blob/master/contracts/ETHERCToken.sol
- https://github.com/ETHERCIO/smart_contract/blob/master/contracts/ETHERCFeeModifiers.sol
- https://github.com/ETHERCIO/smart_contract/blob/master/contracts/ETHERCExchange.sol
- https://github.com/ETHERCIO/smart_contract/blob/master/contracts/test/TokenTemplate.sol
In total, 2 issues was reported including:
-
0 high severity issues.
-
0 medium severity issues.
-
2 low severity issues.
Modifier onlyAdmin
will works even if msg.sender
is owner.
Change the modifier name to onlyAdminOrOwner
or remove owner checking.
- It is possible to double withdrawal attack. More details here
- Lack of transaction handling mechanism issue. More details here
Add into a function transfer(address _to, ... )
following code:
require( _to != address(this) );
Smart contracts are free of critical issues.