Fractional v2 contest - asutorufos's results

A collective ownership platform for NFTs on Ethereum.

General Information

Platform: Code4rena

Start Date: 07/07/2022

Pot Size: $75,000 USDC

Total HM: 32

Participants: 141

Period: 7 days

Judge: HardlyDifficult

Total Solo HM: 4

Id: 144

League: ETH

Fractional

Findings Distribution

Researcher Performance

Rank: 82/141

Findings: 2

Award: $99.41

🌟 Selected for report: 0

πŸš€ Solo Findings: 0

L-1 UNUSED RECIEVE() FUNCTION WILL LOCK ETHER IN CONTRACT If the intention is for Ether to be used the function should call another function, otherwise it should revert. Vault.sol L#32

L-2 MISSING CHECKS FOR ADDRESS(0X0) WHEN ASSIGNING VALUES TO ADDRESS STATE VARIABLES FERC1155.sol L#199

N-1 NATSPEC IS INCOMPLETE There are couple instances of this issue: that are missing the @return FERC1155.sol L#240 FERC1155.sol L#290 FERC1155.sol L#301 FERC1155.sol L#309 FERC1155.sol L#314 FERC1155.sol L#330 FERC1155.sol L#350

G-1 - Don't Initialize Variables with Default Value Uninitialized variables are assigned with the types default value.

Explicitly initializing a variable with it's default value costs unnecesary gas. Vault.sol L#78 Vault.sol L#104

G-2 ++I COSTS LESS GAS THAN I++, ESPECIALLY WHEN IT’S USED IN FOR-LOOPS (--I/I-- TOO) Vault.sol L#78 Vault.sol L#104

G-3 Using Private rather than public for constants save gas. If needed, the value can be read from the verified contract source code. Savings are due to the compiler not having to create non-payable getter functions for deployment calldata, and not adding another entry to the method ID table FERC1155.sol

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax Β© 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter