This is the report from a security audit performed on JarvisPlus by pro100skm.
The audit focused primarily on the security of JarvisPlus contract.
In total, 2 issues were reported including:
-
0 high severity issues.
-
0 medium severity issues.
-
1 low severity issues.
-
1 minor observations.
approve
+ transferFrom
mechanism allows double Withdrawal attack.
'initialAmount' assigns a long number.
Better to change the representation of this number. And write it as below:
uint256 private constant initialAmount = 600000000 * (10 ** uint256(decimals));
There weren't detected any high severity vulnerabilities that can directly hurt the JarvisPlus smart contracts. We highly recommend you to complete other bugbounty before use.