Skip to content

Instantly share code, notes, and snippets.

@yuriy77k
Forked from gorbunovperm/ETH_ExploreCoin_report.md
Created May 4, 2019 09:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save yuriy77k/0e650f3827e33abcd9f45a68e71f03e4 to your computer and use it in GitHub Desktop.
Save yuriy77k/0e650f3827e33abcd9f45a68e71f03e4 to your computer and use it in GitHub Desktop.
ExploreCoin security audit report

ExploreCoin security audit report

Summary

This is the report from a security audit performed on ExploreCoin by gorbunovperm.

ExploreCoin (EPL) is an ERC 20 token, smart contract recently deployed.

https://www.explorecoin.io/

In scope

  1. TokenMintERC20Token.sol

Findings

In total, 2 issues were reported including:

  • 0 high severity issue.

  • 0 medium severity issues.

  • 1 low severity issues.

  • 1 minor observations.

Security issues

1. Known vulnerabilities of ERC-20 token

Severity: low

Description

  • It is possible to double withdrawal attack. More details here

  • Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here

Recommendation

Add into a function transfer(address _to, ... ) following code:

require( _to != address(this) );

2. EPL Token is not Burnable

Severity: minor observation

Code snippet

Description

In this contract, there are _burn and _burnFrom functions implying the burning of tokens. But burning is impossible because both functions are internal.

Conclusion

There is no serious vulnerabilities were found in this contract.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment