We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cmichel
Some parameters of functions are not checked for invalid values:
BaseVaultAdaptor.constructor
LifeGuard3Pool.constructor
Buoy3Pool.constructor
PnL.constructor
Controllable.setController
newController != controller
A wrong user input or wallets defaulting to the zero addresses for a missing input can lead to the contract needing to redeploy or wasted gas.
Validate the parameters.
The text was updated successfully, but these errors were encountered:
cmichel issue #90
4113363
Low risk/Non critical - Deployment script handles these cases, but good practice to have 0x checks to stop wasting gas and having to redeploy.
Sorry, something went wrong.
No branches or pull requests
Handle
cmichel
Vulnerability details
Vulnerability Details
Some parameters of functions are not checked for invalid values:
BaseVaultAdaptor.constructor
: The addresses should be checked for non-zero valuesLifeGuard3Pool.constructor
: The addresses should be checked for non-zero valuesBuoy3Pool.constructor
: The addresses should be checked for non-zero valuesPnL.constructor
: The addresses should be checked for non-zero valuesControllable.setController
: Does not check thatnewController != controller
Impact
A wrong user input or wallets defaulting to the zero addresses for a missing input can lead to the contract needing to redeploy or wasted gas.
Recommended Mitigation Steps
Validate the parameters.
The text was updated successfully, but these errors were encountered: