Folks Smart Contract Library | Aud Comp
Reports by Severity
Low
- #49075 [SC-Low] `SetLib.remove_item()` is not safe on empty Dynamic arrays 
- #49559 [SC-Low] The remove functionality in `UInt64SetLib::remove_item` underflows on empty array 
- #48983 [SC-Low] Potential Underflow in remove_item() on Empty Array 
- #48990 [SC-Low] Integer underflow in remove_item leads to AVM trap and DoS via empty array call 
- #48894 [SC-Low] Underflow in index calculation fails remove_item 
- #49003 [SC-Low] Array Underflow Vulnerability in UInt64SetLib leads to contract failure 
- #49687 [SC-Low] An underflow in `remove_item` function in `Uint64SetLib` Contract. 
- #48885 [SC-Low] No items length check in remove_item leads to a revert with an underflow 
- #48998 [SC-Low] Critical UInt64 underflow in set removal causes permanent denial of service 
- #49938 [SC-Low] Underflow Revert in `remove_item` When Removing from an Empty Array 
- #49390 [SC-Low] `UInt64SetLib#remove_item` would revert if the item is empty 
- #49527 [SC-Low] Invariant breakage , Edge case Integer UInt64SetLib.py::remove_item leads to int underflow 
- #49690 [SC-Low] Integer Underflow in UInt64SetLib.py 
Insight
- #49409 [SC-Insight] Incorrect comment in UInt64SetLib 
- #49250 [SC-Insight] `AccessControl`: unnecessary box usage in `_grant_role` 
- #48747 [SC-Insight] Consider emitting BucketConsumed for infinite buckets in RateLimiter 
- #49970 [SC-Insight] Malicious upgradable admin can permanently brick contract upgradeability 
- #49553 [SC-Insight] program_sha256`, Reducing Auditability and Monitoring Efficiency 
- #48717 [SC-Insight] RateLimiter current capacity can be permanently held at zero 
- #48804 [SC-Insight] TBD 
- #49061 [SC-Insight] The Function `get_current_capacity()` returns wrong value when bucket is infinite 
- #49051 [SC-Insight] Improving and expanding documentation to reduce risks 
- #49437 [SC-Insight] `RateLimiter`: incorrect infinite -> finite bucket transition 
- #49413 [SC-Insight] discrepancy between document and codebase 
- #48718 [SC-Insight] Contract Upgrade Completion DoS/Takeover Risk 
Reports by Type
Smart Contract
- #49075 [SC-Low] `SetLib.remove_item()` is not safe on empty Dynamic arrays 
- #49559 [SC-Low] The remove functionality in `UInt64SetLib::remove_item` underflows on empty array 
- #49409 [SC-Insight] Incorrect comment in UInt64SetLib 
- #48983 [SC-Low] Potential Underflow in remove_item() on Empty Array 
- #48990 [SC-Low] Integer underflow in remove_item leads to AVM trap and DoS via empty array call 
- #49250 [SC-Insight] `AccessControl`: unnecessary box usage in `_grant_role` 
- #48894 [SC-Low] Underflow in index calculation fails remove_item 
- #49003 [SC-Low] Array Underflow Vulnerability in UInt64SetLib leads to contract failure 
- #48747 [SC-Insight] Consider emitting BucketConsumed for infinite buckets in RateLimiter 
- #49970 [SC-Insight] Malicious upgradable admin can permanently brick contract upgradeability 
- #49553 [SC-Insight] program_sha256`, Reducing Auditability and Monitoring Efficiency 
- #48717 [SC-Insight] RateLimiter current capacity can be permanently held at zero 
- #49687 [SC-Low] An underflow in `remove_item` function in `Uint64SetLib` Contract. 
- #48885 [SC-Low] No items length check in remove_item leads to a revert with an underflow 
- #48998 [SC-Low] Critical UInt64 underflow in set removal causes permanent denial of service 
- #48804 [SC-Insight] TBD 
- #49061 [SC-Insight] The Function `get_current_capacity()` returns wrong value when bucket is infinite 
- #49938 [SC-Low] Underflow Revert in `remove_item` When Removing from an Empty Array 
- #49051 [SC-Insight] Improving and expanding documentation to reduce risks 
- #49437 [SC-Insight] `RateLimiter`: incorrect infinite -> finite bucket transition 
- #49413 [SC-Insight] discrepancy between document and codebase 
- #49390 [SC-Low] `UInt64SetLib#remove_item` would revert if the item is empty 
- #49527 [SC-Low] Invariant breakage , Edge case Integer UInt64SetLib.py::remove_item leads to int underflow 
- #48718 [SC-Insight] Contract Upgrade Completion DoS/Takeover Risk 
- #49690 [SC-Low] Integer Underflow in UInt64SetLib.py 
Was this helpful?
