-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
QA Report #1124
Comments
11 l 6 r 9 nc | QA‑01 | extendedAccountVersion() should not return AccountAbstractionVersion.Version1 for addresses in the kernel space | | QA‑02 | storeBatchHash should in no instance return reverted batches | | QA‑03 | The additional check for mainnet in proveBatches() should consider that after a hard fork assert block.chaindId != 1 would no longer be a valid protection. | | QA‑04 | executeInstant() would fail for operations scheduled in the future due to _checkPredecessorDone() | | QA‑05 | Setting a pending admin in AdminFacets actually emits an event for setting a governor instead which leads to issues for any one listening off-chain | | QA‑06 | forceDeployOnAddressshould be modified to ensure that the newAddress always receives the funds allocated to it regardles of callConstructor's value | | QA‑07 | Allowlist is not being implemented as is supposed to after the Alpha period. | | QA‑08 | Forced deployments should be restricted | | QA‑09 | Processing of L2 to L1 withdrawal messages with additional Data should be efficiently done and correctly documented | | QA‑10 | Make the fallback a payable prefixed function to ensure that calls don't fail from the bootloader | | QA‑11 | Add transaction.signature to _encodeHashEIP712Transaction to ensure compliance with EIP712 | | QA‑12 | maxFeePerGas been hardcoded to 0 which leads to not providing any incentives for validators | | QA‑13 | Interface specifications mismatch with actual functions | | QA‑14 | Multiple fixes for typos/Docs & wrong naming | | QA‑15 | Deviation from Solidity best styling practices in scoped contracts | | QA‑16 | L2EthToken::transferFromTo should be stopped from emmiting dummy events and also protect users from wasting unnecessary gas | | QA‑17 | System hang if validators neglect cross-chain transactions | | QA‑18 | Multiple issue attached with _Isvalidsignature does not follow the specification in the EIP | | QA‑19 | Setters should always have equality checkers | | QA‑20 | BOOTLOADER_MEMORY_FOR_TXS allocation reduction is risky | | QA‑21 | OperationState.Waiting should be considered the case even when timestamp == block.timestamp | | QA‑22 | Compatibility issues could arise for pure ERC20 | | QA‑23 | AllowList could use a blacklisting mechanism | | QA‑24 | The interface ILegacyGetters only provides availability of deprecated functions instead of the currently accepted ones | | QA‑25 | If Changes are made to L2ContractHelper/Config.sol then redeployments of facets should be hastily done | | QA‑26 | Presence of non-production-ready code | | QA‑27 | Add the verifyingContract to the TYPEHASH for EIP-712 | | QA‑28 | Redundant v == 27 & v == 28 check | |
Hey, I've read some issues and some of them are, imho, invalid QA‑02 - this is exactly the same issue as QA-13 in my report - #544 which was evaluated as R. It should either be evaluated as R here, or increased to L in my report (I stick with increasing it to L in my report :P). QA‑03 - this had been disputed by the sponsor, should not be considered as Low, please check my similar issue which was rejected: #543 QA-05 - aren't incorrect event emissions considered as r/nc? Project does not describe any additional off-chain infrastructure, which is related to this event, so the whole description is much more an assumption than a real threat? Thus it should be classified as Refactoring instead of Low. QA-06, QA-08 - shoudn't these two be merged into one issue? QA-10 - this affects a mock contract, shoudn't it be evaluated as 'nc'? QA-15 - already reported in bot as [N‑85] Style guide: Lines are too long QA-16 - this is invalid, according to EIP, ERC-20: "Transfers of 0 values MUST be treated as normal transfers and fire the Transfer event.". Your recommendation violates EIP-20! QA-21 - comments state: QA‑23 - the current implementation uses whitelist approach. Whitelist approach is much more restrictive then the blacklist approach, I don't see any reason how suggesting a change from more restrictive to less restrictive access control, may improve the security of the contract, imho it's invalid QA‑24 - this is incorrect, as name Legacy suggests, this is the interface for all deprecated functions, QA-28 - this should be in a gas report, instead of QA Report |
Hi @GalloDaSballo, thanks for judging, I'd like to draw your attention to a few findings that might have been missed by the lookouts from this QA report and would appreciate if you could give this another look. QA-02 should be considered a duplicate of #739, now depending on the outcome of this comment made by @HE1M. which should be validated since a similar issue was validated for QA-04 is a duplicate of #439, since you've relayed to the warden that you'd double check this issue via this comment, I'd appreciate if you could also take this report into consideration before making a final decision, thanks. QA-07 seems to be worthy of a re-evaluation in my opinion, being that sponsors have confirmed previously that this setting is only allowed in the alpha release period and that this would change in the future. QA-18 is a duplicate to #504, under this report I explained to potential issues of this implementation and even clarifying the second case to be pure QA but otherwise should be said for the first case, where I stated that the second section of impact could be considered as a refactoring case, but the first part and a mixture of both could stand out as a medium pending final decision from judge. Now following the disucussion that's been had on #504 and this comment by @VagnerAndrei26 and the fact that this bug case is about in-compliance to an EIP it should be validated as a medium severity finding following Code4rena's rules. Apologies if the comments on this report is too much, I guess this was cause unlike other contests Code4rena tried something new on this one that led to two lookouts judging QA reports which I only found out during the PJQA period for this contest, this essentially means that, it'd be right to guess, you the judge didn't look at these files, i.e the QA reports due to that you might have missed some of the borderline issues I submitted and requested to look if possible to make an upgrade so as not to spam the judging repo.(If I knew this would be done, I'd have just submitted them as Thank you for your time. |
GalloDaSballo marked the issue as grade-a |
See the markdown file with the details of this report here.
The text was updated successfully, but these errors were encountered: