-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit: fix low severity issues #874
Comments
Just to clarify @gitcoindev @molecula451 because of:
I think it makes sense to:
This is to keep things in sync. After our adjustments are completed, we can mirror the issues back to the You guys should delete the mirrored issues on this repository now. Footnotes
|
Yeah, i think it makes sense, all the mirroed issues were taken down, point to PR to resolve to the Resolves |
I don't think we should reopen them since those closed issues are considered invalid/low priority in terms of sherlock rules so the medium/high issues are only opened. |
Cross-referencing them is a good practice. I am also not sure if Sherlock will keep this available forever, so we can mirror the issues back as @pavlovcik suggested, and skip reopening. |
By the sherklock repo it looks like they "archive" the whole judging repo, so i think we're fine with either way, mirroring now or mirroring later |
Recapping this one this issue posted here were closed specifically by the lead judge, i reopened one (to recheck) and he gave a reason to re-closed |
I am going to look into those issues and try to gradually fix them one by one starting tomorrow onward. |
I should be able to enable payouts directly in their repository once I make time to figure out the permit wallet situation. |
If some issue is marked as invalid by the Sherlock team it doesn't mean that we shouldn't fix it. Sherlock has pretty strict rules so only medium and high severity issues are considered valid hence the current "Audit: fix low severity issues" task was created specifically for low severity issues. |
All right, thank you for clarifying this, I update the description. |
rndqnuu the diamond it's not subceptible to reentraacy, i've seen others implementation live and they are working very well so sherlock-audit/2023-12-ubiquity-judging#119 not need to be overlook |
I don't think so, diamond does susceptible to reentrancy. Could you share some articles where it is stated that diamond is "reentrancy free"? |
in the fallback function where this watson pointed that it's prone to reentrant, doesn't look like, basically he's poiting that we lack the nonReetrant here on the fallback https://etherscan.io/address/0x32400084c286cf3e17e7b677ea9583e60a000324#code for instance there is this diamond with a couple$ without this modifier, looks highly debuggged, you'd jack that pot if you reentrant the fallback there and to me this submission was from an automated tool without manually check after so it looks as false positive no modifier on the fallback deployed on chain either: https://github.com/aavegotchi/aavegotchi-contracts/blob/7db9b732466f9b6e9b22d669f313f495750935b1/contracts/Aavegotchi/ForgeDiamond/ForgeDiamond.sol#L30 |
As a part of sherlock-audit/2023-12-ubiquity-judging#119 we don't need to add the |
@gitcoindev Why did you mark sherlock-audit/2023-12-ubiquity-judging#71 as invalid? Don't we need the |
Hi @rndquu ! I was guided by this comment sherlock-audit/2023-12-ubiquity-judging#71 (comment) In the library we have already
My understanding was that this mechanism shall be used but theoretically, if you think it makes sense, we could add |
yeah this would be code redundancy, let's re-check tests on this requires and if they're good then no need for |
Yes, you're right, I've totally forgotten that https://github.com/ubiquity/ubiquity-dollar/blob/development/packages/contracts/src/dollar/libraries/LibUbiquityPool.sol has its own pause mechanic. It's ok then to mark sherlock-audit/2023-12-ubiquity-judging#71 as invalid. |
Marking sherlock-audit/2023-12-ubiquity-judging#160 as invalid because: |
! No price label has been set. Skipping permit generation. |
There are a bunch of low severity issues caught by auditors which are nice to fix. This is a low priority issue.
diamondCut
by accident)collectRedemption()
if collateral is disabled)redemptionDelayBlocks
Requirement sherlock-audit/2023-12-ubiquity-judging#33 (more strictredemptionDelayBlocks
)rvierdiiev - When contract is paused, then users still can use it sherlock-audit/2023-12-ubiquity-judging#71(missingwhenNotPaused
) - issue invalid due to different pause mechanism used. Marked asSponsor Disputed
,Won't Fix
notReentrant modifier
, not sure that it should be placed in the diamon's fallback, but worth to check all facet methods)transferFrom(receiver)
in deprecated contract, we can't leave it this way even if the contract is not used)Bauchibred - Diamond.sol's(passfallback()
seems to be erroneously implemented sherlock-audit/2023-12-ubiquity-judging#160msg.value
in diamond'sdelegatecall
, update: invalid)msg.data.length < 4 bytes
)P.S. The list may be updated
The text was updated successfully, but these errors were encountered: