The audit focused primarily on the security of BAT smart contract.
In total, 3 issues was reported including:
0 critical severity issues.
0 high severity issues.
1 medium severity issues.
2 low severity issues.
1. Wrong event
refund there is event comes before sending tokens at line 171, and if sending will be failed event log will be written to the blockchain.
Add event after tokens sending.
2. No time checking
constructor there is no checking that
_fundingStartBlock is less than
_fundingEndBlock, so the dates could be wrong.
3. Known vulnerabilities of ERC-20 token
- It is possible to double withdrawal attack. More details here
- Lack of transaction handling mechanism issue. More details here
Add into a function
transfer(address _to, ... ) following code:
require( _to != address(this) );
Smart contract contains medium severity issue.