-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
QA Report #59
Comments
First 2 were good, went downhill from there |
GalloDaSballo marked the issue as grade-b |
Thank you for the grading. I acknowledge that some of my findings might appear minor or even easy to overlook. I still believe that my report offers greater value to the protocol compared to those that were marked as Grade A. My findings provide meaningful insights and contribute to a deeper level of analysis, which I feel better serves the protocol's objectives. I provided explanations for some findings that clearly fall within the Low-risk category. These findings are intended to highlight potential minor issues while still adding value to the overall assessment. [L-3] setGuardian() Implementation Does Not Enforce Paused State as Intended The comment implies that granting a new guardian resets the pause timer (i.e., unpauses the contract). What the Code Does:
[L-4] Automatic Unpause After pauseDuration elapsed Could Break Core Functionality
[L-5] Accidental ETH Transfers to Timelock Contract Risk Being permanently Locked Yes, there is offchain tracking and emit events but there is no method implemented to recover for [L-7] No Maximum Expiration Period Leads to Indefinite Timelocked Actions Yes, There is mindelay check. But the expirationPeriod is mistakenly set so big values then Indefinite Timelocked Actions . Timelock actions not expired .expirationPeriod is uint256 this can store so big values. [L-10] DoS Risk Due to Unbounded Enumerable Set Growth in getAllProposals() EnumerableSet's values() function returns the entire set in a single call, which means the more proposals in the set, the higher the gas consumption. Even this thing mentioned in DOCS
[L-11] Misleading Comment in isOperation Function This is clearly The comment states the [L-12] Redundant Guardian Reassignment and Potential Governance Manipulation Risk The current implementation not restrict to assign same old guardian [L-13] Critical Immutable Variables Assigned Without Validation in Constructor This is clearly the [L-14] Improper Memory Alignment in Assembly Block This clearly violating the solidity memory assignments. The findings I chose not to elaborate on are, in my view, ones that fall under the category of ignorable findings. I believe they have minimal impact and don’t warrant detailed explanation. Thank you for your time and consideration. |
I have re-checked the report and I maintain my statement, I don't believe it's correct to comingle interesting observations with "padding findigns" Reports with a higher signal to noise will be prioritized | L-1 | L - 2 |
For awarding purposes, C4 staff have marked as tied for |
See the markdown file with the details of this report here.
The text was updated successfully, but these errors were encountered: