This finding focusses on the security of an ERC20 smart contract's the transfer functionalities
ERC20 implementations are not always consistent. Some implementations of transfer
and transferFrom
could return ‘false’ on failure instead of reverting. It is safer to wrap such calls into require()
statements to these failures. Unsafe transfer
and transferFrom
calls were found in the following locations:
Some of the tokens do not revert on failed transfer
and transferFrom
calls which could lead to funds insolvency.
Manual review
Consider using OpenZepplin's safeTransfer
and safeTransferFrom
functions.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.