Open hats-bug-reporter[bot] opened 1 year ago
Hello, Thanks a lot for your attention.
We are aware of this and we won't take this into consideration as it is assumed on our side. In addition to that, we won't use any ERC20 that are not compatible with this standard on the IBO or the Vesting.
We have so to consider this issue as Invalid.
Github username: @goheesheng Submission hash (on-chain): 0x446cb46b124596ec6673fcbed77a2bd521e243ed528d34555d24b30885cfcb7e Severity: medium
Description: Description\ Unsafe ERC20 Operation(s)
Attack Scenario\ ERC20 operations can be unsafe due to different implementations and vulnerabilities in the standard.
It is therefore recommended to always either use OpenZeppelin's SafeERC20 library or at least to wrap each operation in a require statement.
To circumvent ERC20's approve functions race-condition vulnerability use OpenZeppelin's SafeERC20 library's safe{Increase|Decrease}Allowance functions.
Attachments