Skip to content

Instantly share code, notes, and snippets.

@yuriy77k
Forked from MrCrambo/ETH_Holo_report.md
Created June 1, 2019 05:56
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save yuriy77k/dcea1e26ba3e6e73e5e51a77e5d241d3 to your computer and use it in GitHub Desktop.
Save yuriy77k/dcea1e26ba3e6e73e5e51a77e5d241d3 to your computer and use it in GitHub Desktop.

Summary

This is the report from a security audit performed on Holo by MrCrambo.

The audit focused primarily on the security of Holo smart contracts.

In scope

  1. https://etherscan.io/address/0x6c6ee5e31d828de241282b9606c8e98ea48526e2#contracts

Findings

In total, 3 issues were reported including:

  • 0 high severity issues.

  • 0 medium severity issues.

  • 1 owner privilegies issues.

  • 2 low severity issues.

Security issues

1. Zero addres checking

Severity: low

Description

There are no zero address checking in functions setMinter at line 239, setDestroyer at line 269 and mint at line 243.

2. Known vulnerabilities of ERC-20 token

Severity: low

Description

  1. It is possible to double withdrawal attack. More details here
  2. Lack of transaction handling mechanism issue. More details here

Recommendation

Add into a function transfer(address _to, ... ) following code:

require( _to != address(this) );

3. Owner privilegies

Severity: owner privilegies

Description

  1. Owner can mint any amount of tokens and for a long period of time, because he can not finish minting and can set himself as minter.

Conclusion

Smart contract contains only low severity issues.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment