Platform: Code4rena
Start Date: 14/09/2022
Pot Size: $50,000 USDC
Total HM: 25
Participants: 110
Period: 5 days
Judge: hickuphh3
Total Solo HM: 9
Id: 162
League: ETH
Rank: 47/110
Findings: 2
Award: $89.45
🌟 Selected for report: 0
🚀 Solo Findings: 0
🌟 Selected for report: Respx
Also found by: 0x1f8b, 0xDecorativePineapple, 0xNazgul, 0xPanas, 0xSmartContract, 0xc0ffEE, 0xmuxyz, Aymen0909, Bahurum, Bnke0x0, CodingNameKiki, Deivitto, Jeiwan, Lambda, Picodes, PwnPatrol, R2, RaymondFam, Rolezn, Ruhum, Saintcode_, SooYa, Tointer, V_B, ajtra, ak1, async, auditor0517, brgltd, c3phas, carrotsmuggler, cccz, csanuragjain, datapunk, djxploit, durianSausage, eierina, erictee, gogo, imare, joestakey, jonatascm, kv, ladboy233, leosathya, lukris02, oyc_109, pashov, pauliax, rbserver, robee, rokinot, rvierdiiev, scaraven, simon135, unforgiven, wagmi, zzzitron
36.6223 USDC - $36.62
Block timestamps have historically been used for a variety of applications, such as entropy for random numbers (see the Entropy Illusion for further details), locking funds for periods of time, and various state-changing conditional statements that are time-dependent. Miners have the ability to adjust timestamps slightly, which can prove to be dangerous if block timestamps are used incorrectly in smart contracts.
2022-09-y2k-finance/src/Controller.sol::102 => vault.idEpochBegin(epochEnd) > block.timestamp) 2022-09-y2k-finance/src/Controller.sol::106 => block.timestamp > epochEnd 2022-09-y2k-finance/src/Controller.sol::189 => block.timestamp, 2022-09-y2k-finance/src/Controller.sol::203 => block.timestamp < epochEnd) 2022-09-y2k-finance/src/Controller.sol::245 => block.timestamp, 2022-09-y2k-finance/src/Controller.sol::283 => uint256 timeSinceUp = block.timestamp - startedAt; 2022-09-y2k-finance/src/Vault.sol::88 => if(block.timestamp > idEpochBegin[id] - timewindow) 2022-09-y2k-finance/src/Vault.sol::96 => if((block.timestamp < id) && idDepegged[id] == false) 2022-09-y2k-finance/src/rewards/StakingRewards.sol::156 => return block.timestamp < periodFinish ? block.timestamp : periodFinish; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::189 => if (block.timestamp >= periodFinish) { 2022-09-y2k-finance/src/rewards/StakingRewards.sol::192 => uint256 remaining = periodFinish.sub(block.timestamp); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::207 => lastUpdateTime = block.timestamp; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::208 => periodFinish = block.timestamp.add(rewardsDuration); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::227 => block.timestamp > periodFinish,
Code architecture, incentives, and error handling/reporting questions/issues should be resolved before deployment
2022-09-y2k-finance/src/Vault.sol::196 => @notice Withdraw entitled deposited assets, checking if a depeg event //TODO add GOV token rewards
decimals() is not part of the official ERC20 standard and might fail for tokens that do not implement it. While in practice it is very unlikely, as usually most of the tokens implement it, this should still be considered as a potential issue.
2022-09-y2k-finance/src/Controller.sol::299 => uint256 decimals = 10**(18-(priceFeed.decimals())); 2022-09-y2k-finance/src/oracles/PegOracle.sol::29 => (priceFeed1.decimals() == priceFeed2.decimals()), 2022-09-y2k-finance/src/oracles/PegOracle.sol::36 => decimals = priceFeed1.decimals(); 2022-09-y2k-finance/src/oracles/PegOracle.sol::73 => int256 decimals10 = int256(10**(18 - priceFeed1.decimals()));
Use abi.encode() instead which will pad items to 32 bytes, which will prevent hash collisions (e.g. abi.encodePacked(0x123,0x456) => 0x123456 => abi.encodePacked(0x1,0x23456), but abi.encode(0x123,0x456) => 0x0...1230...456). Unless there is a compelling reason, abi.encode should be preferred. If there is only one argument to abi.encodePacked() it can often be cast to bytes() or bytes32() instead.
2022-09-y2k-finance/src/Vault.sol::388 => keccak256(abi.encodePacked(symbol)) == 2022-09-y2k-finance/src/Vault.sol::389 => keccak256(abi.encodePacked("rY2K")) 2022-09-y2k-finance/src/VaultFactory.sol::278 => keccak256(abi.encodePacked(_marketVault.index, _marketVault.epochBegin, _marketVault.epochEnd)),
require() should be used for checking error conditions on inputs and return values while assert() should be used for invariant checking
2022-09-y2k-finance/src/Vault.sol::190 => assert(IWETH(address(asset)).transfer(msg.sender, msg.value));
Some tokens do not implement the ERC20 standard properly but are still accepted by most code that accepts ERC20 tokens. For example Tether (USDT)'s transfer() and transferFrom() functions do not return booleans as the specification requires, and instead have no return value. When these sorts of tokens are cast to IERC20, their function signatures do not match and therefore the calls made, revert. Use OpenZeppelin’s SafeERC20's safeTransfer()/safeTransferFrom() instead
2022-09-y2k-finance/src/Vault.sol::167 => asset.transferFrom(msg.sender, address(this), shares); 2022-09-y2k-finance/src/Vault.sol::190 => assert(IWETH(address(asset)).transfer(msg.sender, msg.value)); 2022-09-y2k-finance/src/Vault.sol::228 => asset.transfer(treasury, feeValue); 2022-09-y2k-finance/src/Vault.sol::231 => asset.transfer(receiver, entitledShares); 2022-09-y2k-finance/src/Vault.sol::365 => asset.transfer(_counterparty, idFinalTVL[id]);
When changing state variables events are not emitted. Emitting events allows monitoring activities with off-chain monitoring tools.
2022-09-y2k-finance/src/Vault.sol::350 => function setClaimTVL(uint256 id, uint256 claimTVL) public onlyController {
Some tokens do not implement the ERC20 standard properly but are still accepted by most code that accepts ERC20 tokens. For example Tether (USDT)'s transfer() and transferFrom() functions do not return booleans as the specification requires, and instead have no return value. When these sorts of tokens are cast to IERC20, their function signatures do not match and therefore the calls made, revert. Use OpenZeppelin’s SafeERC20's safeTransfer()/safeTransferFrom() instead
2022-09-y2k-finance/src/SemiFungibleVault.sol::96 => _mint(receiver, id, shares, EMPTY); 2022-09-y2k-finance/src/Vault.sol::169 => _mint(receiver, id, shares, EMPTY);
Use (e.g. 1e6) rather than decimal literals (e.g. 1000000), for better code readability
2022-09-y2k-finance/src/oracles/PegOracle.sol::68 => nowPrice = (price2 * 10000) / price1; 2022-09-y2k-finance/src/oracles/PegOracle.sol::70 => nowPrice = (price1 * 10000) / price2; 2022-09-y2k-finance/src/oracles/PegOracle.sol::78 => nowPrice / 1000000,
Each event should use three indexed fields if there are three or more fields
2022-09-y2k-finance/src/rewards/StakingRewards.sol::51 => event RewardAdded(uint256 reward); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::55 => event RewardsDurationUpdated(uint256 newDuration); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::56 => event Recovered(address token, uint256 amount);
Code should include NatSpec
2022-09-y2k-finance/src/rewards/StakingRewards.sol::1 => // SPDX-License-Identifier: MIT
Contracts are allowed to override their parents' functions and change the visibility from external to public.
2022-09-y2k-finance/src/Controller.sol::198 => function triggerEndEpoch(uint256 marketIndex, uint256 epochEnd) public { 2022-09-y2k-finance/src/SemiFungibleVault.sol::237 => function maxDeposit(address) public view virtual returns (uint256) { 2022-09-y2k-finance/src/SemiFungibleVault.sol::244 => function maxMint(address) public view virtual returns (uint256) { 2022-09-y2k-finance/src/Vault.sol::277 => function changeTreasury(address _treasury) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::287 => function changeTimewindow(uint256 _timewindow) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::295 => function changeController(address _controller) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::350 => function setClaimTVL(uint256 id, uint256 claimTVL) public onlyController { 2022-09-y2k-finance/src/VaultFactory.sol::295 => function setController(address _controller) public onlyAdmin { 2022-09-y2k-finance/src/VaultFactory.sol::366 => function changeOracle(address _token, address _oracle) public onlyAdmin { 2022-09-y2k-finance/src/oracles/PegOracle.sol::89 => function getOracle1_Price() public view returns (int256 price) {
It is not necessary to have both a named return and a return statement.
2022-09-y2k-finance/src/Controller.sol::264 => returns (int256 nowPrice) 2022-09-y2k-finance/src/Vault.sol::162 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::185 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::213 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::263 => returns (uint256 feeValue) 2022-09-y2k-finance/src/Vault.sol::381 => returns (uint256 entitledAmount) 2022-09-y2k-finance/src/Vault.sol::441 => returns (uint256 nextEpochEnd) 2022-09-y2k-finance/src/oracles/PegOracle.sol::89 => function getOracle1_Price() public view returns (int256 price) { 2022-09-y2k-finance/src/oracles/PegOracle.sol::112 => function getOracle2_Price() public view returns (int256 price) { 2022-09-y2k-finance/src/rewards/RewardsFactory.sol::148 => returns (bytes32 hashedIndex)
Emitting events after sensitive changes take place, to facilitate tracking and notify off-chain clients following changes to the contract.
2022-09-y2k-finance/src/Vault.sol::350 => function setClaimTVL(uint256 id, uint256 claimTVL) public onlyController {
Usually lines in source code are limited to 80 characters. Today's screens are much larger so it's reasonable to stretch this in some cases. Since the files will most likely reside in GitHub, and GitHub starts using a scroll bar in all cases when the length is over 164 characters, the lines below should be split when they reach that length
2022-09-y2k-finance/src/Vault.sol::198 => @param assets uint256 of how many assets you want to withdraw, this value will be used to calculate how many assets you are entitle to according to the events; 2022-09-y2k-finance/src/Vault.sol::304 => @param epochEnd uint256 in UNIX timestamp, representing the end date of the epoch and also the ID for the minting functions. Example: Epoch ends in 30th June 2022 at 00h 00min 00sec: 1656630000 2022-09-y2k-finance/src/Vault.sol::346 => @notice Function to be called after endEpoch, by the Controller only, this function stores the TVL of the counterparty vault in a mapping to be used for later calculations of the entitled withdraw 2022-09-y2k-finance/src/Vault.sol::356 => @notice Function to be called after endEpoch and setClaimTVL functions, respecting the calls in order, after storing the TVL of the end of epoch and the TVL amount to claim, this function will allow the transfer of tokens to the counterparty vault 2022-09-y2k-finance/src/VaultFactory.sol::245 => @param epochEnd uint256 in UNIX timestamp, representing the end date of the epoch and also the ID for the minting functions. Example: Epoch ends in 30th June 2022 at 00h 00min 00sec: 1656630000
#0 - HickupHH3
2022-11-05T15:51:27Z
barely scrapping satisfactory, meets my minimum threshold for generic issues reported.
🌟 Selected for report: pfapostol
Also found by: 0x040, 0x1f8b, 0x4non, 0xNazgul, 0xSmartContract, 0xc0ffEE, 0xkatana, Aymen0909, Bnke0x0, Deivitto, Diana, JAGADESH, KIntern_NA, Lambda, MiloTruck, R2, RaymondFam, Respx, ReyAdmirado, Rohan16, RoiEvenHaim, Rolezn, Ruhum, Saintcode_, Samatak, Sm4rty, SnowMan, Tomio, Tomo, WilliamAmbrozic, _Adam, __141345__, ajtra, ak1, async, c3phas, ch0bu, cryptostellar5, d3e4, delfin454000, dharma09, djxploit, durianSausage, eierina, erictee, fatherOfBlocks, gianganhnguyen, gogo, ignacio, imare, jag, jonatascm, leosathya, lukris02, malinariy, oyc_109, pashov, pauliax, peanuts, peiw, prasantgupta52, robee, rokinot, rotcivegaf, rvierdiiev, seyni, simon135, slowmoses, sryysryy, tnevler, zishansami
52.8286 USDC - $52.83
Uninitialized variables are assigned with the types default value. Explicitly initializing a variable with it's default value costs unnecesary gas.
2022-09-y2k-finance/src/Vault.sol::443 => for (uint256 i = 0; i < epochsLength(); i++) {
When dealing with unsigned integer types, comparisons with != 0 are cheaper then with > 0. This change saves 6 gas per instance
2022-09-y2k-finance/src/Vault.sol::187 => require(msg.value > 0, "ZeroValue"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::98 => require(price1 > 0, "Chainlink price <= 0"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::121 => require(price2 > 0, "Chainlink price <= 0"); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::119 => require(amount > 0, "Cannot withdraw 0");
Shortening revert strings to fit in 32 bytes will decrease gas costs for deployment and gas costs when the revert condition has been met.
If the contract(s) in scope allow using Solidity >=0.8.4, consider using Custom Errors as they are more gas efficient while allowing developers to describe the error in detail using NatSpec.
2022-09-y2k-finance/src/oracles/PegOracle.sol::23 => require(_oracle1 != address(0), "oracle1 cannot be the zero address"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::24 => require(_oracle2 != address(0), "oracle2 cannot be the zero address");
If needed, the value can be read from the verified contract source code. Savings are due to the compiler not having to create non-payable getter functions for deployment calldata, and not adding another entry to the method ID table
2022-09-y2k-finance/src/Controller.sol::11 => address public immutable admin; 2022-09-y2k-finance/src/Controller.sol::12 => VaultFactory public immutable vaultFactory; 2022-09-y2k-finance/src/SemiFungibleVault.sol::19 => ERC20 public immutable asset; 2022-09-y2k-finance/src/Vault.sol::34 => address public immutable tokenInsured; 2022-09-y2k-finance/src/Vault.sol::36 => int256 public immutable strikePrice; 2022-09-y2k-finance/src/VaultFactory.sol::12 => address public immutable Admin; 2022-09-y2k-finance/src/VaultFactory.sol::13 => address public immutable WETH; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::34 => ERC20 public immutable rewardsToken; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::35 => IERC1155 public immutable stakingToken;
If a function modifier such as onlyOwner is used, the function will revert if a normal user tries to pay the function. Marking the function as payable will lower the gas cost for legitimate callers because the compiler will not include checks for whether a payment was provided. The extra opcodes avoided are CALLVALUE(2),DUP1(3),ISZERO(3),PUSH2(3),JUMPI(10),PUSH1(3),DUP1(3),REVERT(0),JUMPDEST(1),POP(2), which costs an average of about 21 gas per call to the function, in addition to the extra deployment cost
2022-09-y2k-finance/src/Vault.sol::277 => function changeTreasury(address _treasury) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::287 => function changeTimewindow(uint256 _timewindow) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::295 => function changeController(address _controller) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::350 => function setClaimTVL(uint256 id, uint256 claimTVL) public onlyController { 2022-09-y2k-finance/src/VaultFactory.sol::295 => function setController(address _controller) public onlyAdmin { 2022-09-y2k-finance/src/VaultFactory.sol::366 => function changeOracle(address _token, address _oracle) public onlyAdmin { 2022-09-y2k-finance/src/rewards/StakingRewards.sol::225 => function setRewardsDuration(uint256 _rewardsDuration) external onlyOwner {
The code should be refactored such that they no longer exist, or the block should do something useful, such as emitting an event or reverting.
2022-09-y2k-finance/src/SemiFungibleVault.sol::280 => ) internal virtual {} 2022-09-y2k-finance/src/SemiFungibleVault.sol::286 => ) internal virtual {}
When using elements that are smaller than 32 bytes, your contract’s gas usage may be higher. This is because the EVM operates on 32 bytes at a time. Therefore, if the element is smaller than that, the EVM must use more operations in order to reduce the size of the element from 32 bytes to the desired size.
2022-09-y2k-finance/src/oracles/PegOracle.sol::13 => uint8 public decimals;
Booleans are more expensive than uint256 or any type that takes up a full word because each write operation emits an extra SLOAD to first read the slot's contents, replace the bits taken up by the boolean, and then write back. This is the compiler's defense against contract upgrades and pointer aliasing, and it cannot be disabled. Use uint256(1) and uint256(2) for true/false instead
2022-09-y2k-finance/src/Vault.sol::52 => mapping(uint256 => bool) public idDepegged; 2022-09-y2k-finance/src/Vault.sol::54 => mapping(uint256 => bool) public idExists;
The unchecked keyword is new in solidity version 0.8.0, so this only applies to that version or higher, which these instances are. This saves 30-40 gas per loop
2022-09-y2k-finance/src/Vault.sol::443 => for (uint256 i = 0; i < epochsLength(); i++) {
use <x> = <x> + <y> or <x> = <x> - <y> instead to save gas
2022-09-y2k-finance/src/VaultFactory.sol::195 => marketIndex += 1;
use abi.encodePacked() where possible to save gas
2022-09-y2k-finance/src/rewards/RewardsFactory.sol::118 => bytes32 hashedIndex = keccak256(abi.encode(_marketIndex, _epochEnd)); 2022-09-y2k-finance/src/rewards/RewardsFactory.sol::150 => return keccak256(abi.encode(_index, _epoch));
Custom errors are available from solidity version 0.8.4. Custom errors save ~50 gas each time they're hitby avoiding having to allocate and store the revert string. Not defining the strings also save deployment gas
2022-09-y2k-finance/src/SemiFungibleVault.sol::91 => require((shares = previewDeposit(id, assets)) != 0, "ZERO_SHARES"); 2022-09-y2k-finance/src/Vault.sol::165 => require((shares = previewDeposit(id, assets)) != 0, "ZeroValue"); 2022-09-y2k-finance/src/Vault.sol::187 => require(msg.value > 0, "ZeroValue"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::23 => require(_oracle1 != address(0), "oracle1 cannot be the zero address"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::24 => require(_oracle2 != address(0), "oracle2 cannot be the zero address"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::25 => require(_oracle1 != _oracle2, "Cannot be same Oracle"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::98 => require(price1 > 0, "Chainlink price <= 0"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::103 => require(timeStamp1 != 0, "Timestamp == 0 !"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::121 => require(price2 > 0, "Chainlink price <= 0"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::126 => require(timeStamp2 != 0, "Timestamp == 0 !"); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::96 => require(amount != 0, "Cannot stake 0"); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::119 => require(amount > 0, "Cannot withdraw 0");
++i costs less gas than i++, especially when it's used in for-loops (--i/i-- too) Saves 5 gas PER LOOP
2022-09-y2k-finance/src/Vault.sol::443 => for (uint256 i = 0; i < epochsLength(); i++) {
The extran comparison wastes gas if (<x> == true) => if (<x>), if (<x> == false) => if (!<x>)
2022-09-y2k-finance/src/Vault.sol::314 => if(idExists[epochEnd] == true)
Between solc 0.4.10 and 0.8.0, require() used REVERT (0xfd) opcode which refunded remaining gas on failure while assert() used INVALID (0xfe) opcode which consumed all the supplied gas. require() should be used for checking error conditions on inputs and return values while assert() should be used for invariant checking (properly functioning code should never reach a failing assert statement, unless there is a bug in your contract you should fix).
2022-09-y2k-finance/src/Vault.sol::190 => assert(IWETH(address(asset)).transfer(msg.sender, msg.value));
Contracts are allowed to override their parents' functions and change the visibility from external to public and can save gas by doing so.
2022-09-y2k-finance/src/Controller.sol::198 => function triggerEndEpoch(uint256 marketIndex, uint256 epochEnd) public { 2022-09-y2k-finance/src/SemiFungibleVault.sol::237 => function maxDeposit(address) public view virtual returns (uint256) { 2022-09-y2k-finance/src/SemiFungibleVault.sol::244 => function maxMint(address) public view virtual returns (uint256) { 2022-09-y2k-finance/src/Vault.sol::277 => function changeTreasury(address _treasury) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::287 => function changeTimewindow(uint256 _timewindow) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::295 => function changeController(address _controller) public onlyFactory { 2022-09-y2k-finance/src/Vault.sol::350 => function setClaimTVL(uint256 id, uint256 claimTVL) public onlyController { 2022-09-y2k-finance/src/VaultFactory.sol::295 => function setController(address _controller) public onlyAdmin { 2022-09-y2k-finance/src/VaultFactory.sol::366 => function changeOracle(address _token, address _oracle) public onlyAdmin { 2022-09-y2k-finance/src/oracles/PegOracle.sol::89 => function getOracle1_Price() public view returns (int256 price) {
It is not necessary to have both a named return and a return statement.
2022-09-y2k-finance/src/Controller.sol::264 => returns (int256 nowPrice) 2022-09-y2k-finance/src/Vault.sol::162 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::185 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::213 => returns (uint256 shares) 2022-09-y2k-finance/src/Vault.sol::263 => returns (uint256 feeValue) 2022-09-y2k-finance/src/Vault.sol::381 => returns (uint256 entitledAmount) 2022-09-y2k-finance/src/Vault.sol::441 => returns (uint256 nextEpochEnd) 2022-09-y2k-finance/src/oracles/PegOracle.sol::89 => function getOracle1_Price() public view returns (int256 price) { 2022-09-y2k-finance/src/oracles/PegOracle.sol::112 => function getOracle2_Price() public view returns (int256 price) { 2022-09-y2k-finance/src/rewards/RewardsFactory.sol::148 => returns (bytes32 hashedIndex)
Saves a storage slot for the mapping. Depending on the circumstances and sizes of types, can avoid a Gsset (20000 gas) per mapping combined. Reads and subsequent writes can also be cheaper when a function requires both values and they both fit in the same storage slot. Finally, if both fields are accessed in the same function, can save ~42 gas per access due to not having to recalculate the key's keccak256 hash (Gkeccak256 - 30 gas) and that calculation's associated stack operations.
2022-09-y2k-finance/src/rewards/StakingRewards.sol::43 => mapping(address => uint256) public userRewardPerTokenPaid; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::44 => mapping(address => uint256) public rewards; 2022-09-y2k-finance/src/rewards/StakingRewards.sol::47 => mapping(address => uint256) private _balances;
Saves 6 gas per instance if using assembly to check for address(0)
e.g.
assembly { if iszero(_addr) { mstore(0x00, "zero address") revert(0x00, 0x20) } }
instances:
2022-09-y2k-finance/src/oracles/PegOracle.sol::23 => require(_oracle1 != address(0), "oracle1 cannot be the zero address"); 2022-09-y2k-finance/src/oracles/PegOracle.sol::24 => require(_oracle2 != address(0), "oracle2 cannot be the zero address"); 2022-09-y2k-finance/src/rewards/StakingRewards.sol::63 => if (account != address(0)) {
When fetching data from a storage location, assigning the data to a memory variable causes all fields of the struct/array to be read from storage, which incurs a Gcoldsload (2100 gas) for each field of the struct/array. If the fields are read from the new memory variable, they incur an additional MLOAD rather than a cheap stack read.
Instead of declearing the variable with the memory keyword, declaring the variable with the storage keyword and caching any fields that need to be re-read in stack variables, will be much cheaper, only incuring the Gcoldsload for the fields actually read. The only time it makes sense to read the whole struct/array into a memory variable, is if the full struct/array is being returned by the function, is being passed to a function that requires memory, or if the array/struct is being read from another memory array/struct
2022-09-y2k-finance/src/VaultFactory.sol::313 => address[] memory vaults = indexVaults[_marketIndex]; 2022-09-y2k-finance/src/VaultFactory.sol::331 => address[] memory vaults = indexVaults[_marketIndex]; 2022-09-y2k-finance/src/VaultFactory.sol::352 => address[] memory vaults = indexVaults[_marketIndex];
Version 0.8.0 introduces internal overflow checks, so using SafeMath is redundant and adds overhead
2022-09-y2k-finance/src/rewards/StakingRewards.sol::4 => import {SafeMath} from "@openzeppelin/contracts/utils/math/SafeMath.sol";
Avoids a Gsset (20000 gas) in the constructor, and replaces each Gwarmacces (100 gas) with a PUSH32 (3 gas).
2022-09-y2k-finance/src/SemiFungibleVault.sol::71 => name = _name; 2022-09-y2k-finance/src/SemiFungibleVault.sol::72 => symbol = _symbol; 2022-09-y2k-finance/src/oracles/PegOracle.sol::36 => decimals = priceFeed1.decimals();