-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
initialized storage variables are set again in the initializer function #45
Comments
This could be even worse @0xScotch , please note that for upgradeable contracts, default values set inline will default to 0 / false / 0x as the proxy you'll be using won't go through setting those default values |
@0xScotch after careful review, I believe you need to urgently change the |
The warden didn't catch the higher severity finding so am leaving this as gas |
Hey @GalloDaSballo sorry for the late reply. The contracts are not meant to be upgradeable, the use of |
Yes we are aware of the frontrunning issue too. We will absolutely be switching to constructors. |
Handle
sabtikw
Vulnerability details
Impact
storage variables are initialized in the contract and overwritten in the initializer function.
Proof of Concept
Auction.sol L#89 L#164 auctionLength
AuctionBurnReserveSkew.sol L#25 auctionAverageLookback
MaltDataLab.sol L#69 priceTarget
Tools Used
manual review
Recommended Mitigation Steps
remove initialization outside of initializer function
The text was updated successfully, but these errors were encountered: