This finding focusses on the security of an ERC20 smart contract's the transfer functionalities
ERC20 implementations are not always consistent. Some implementations of transfer and transferFrom could return ‘false’ on failure instead of reverting. It is safer to wrap such calls into require() statements to these failures. Unsafe transfer and transferFrom calls were found in the following locations:
Some of the tokens do not revert on failed transfer and transferFrom calls which could lead to funds insolvency.
Manual review
Consider using OpenZepplin's safeTransfer and safeTransferFrom functions.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.