issues
search
hats-finance
/
Palmera-0x5fee7541ddcd51ba9f4af606f87b2c42eea655be
Palmera hierarchical module
0
stars
1
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
getPreviewModule() Returns Incorrect Data
#78
hats-bug-reporter[bot]
opened
17 hours ago
1
Gas-Report
#77
hats-bug-reporter[bot]
opened
17 hours ago
1
Unauthorized Access Control Due to Retained Root Role When Root Safe Exits and Joins New Org
#76
hats-bug-reporter[bot]
opened
1 day ago
0
The `nonce` should be increment only when use signatures
#75
hats-bug-reporter[bot]
opened
1 day ago
0
`public` functions not used internally could be marked `external`
#74
hats-bug-reporter[bot]
opened
1 day ago
1
Does not emit event after writing into storage
#73
hats-bug-reporter[bot]
opened
2 days ago
1
Missing `disableSafeLeadRoles` Call for Root in `removeWholeTree` Function**
#72
hats-bug-reporter[bot]
opened
2 days ago
0
An attacker can steal reverted transaction signatures and use them to his advantage
#71
hats-bug-reporter[bot]
opened
2 days ago
0
Unauthorized Role Modification Vulnerability in setRole Function
#70
hats-bug-reporter[bot]
opened
2 days ago
0
GAS REPORT
#69
hats-bug-reporter[bot]
opened
2 days ago
0
Code Refactor - Gas Report
#68
hats-bug-reporter[bot]
opened
2 days ago
1
Code Refactor - Gas Report
#67
hats-bug-reporter[bot]
opened
2 days ago
1
Function visibility order does not comply with best practices
#66
hats-bug-reporter[bot]
opened
2 days ago
1
Gas Report
#65
hats-bug-reporter[bot]
opened
2 days ago
1
Event is missing `indexed` fields
#64
hats-bug-reporter[bot]
opened
2 days ago
1
Gas report
#63
hats-bug-reporter[bot]
opened
3 days ago
1
Gas Report
#62
hats-bug-reporter[bot]
opened
3 days ago
4
Potential Vulnerability in `execTransactionOnBehalf` Function Allowing Destruction of `targetSafe` contract
#61
hats-bug-reporter[bot]
opened
3 days ago
1
Inadequate Verification of safe Address in `_executeModuleTransaction` Function Leading to Potential Execution of Malicious Contracts
#60
hats-bug-reporter[bot]
opened
3 days ago
7
processAndSortSignatures Function Fails to Handle Multiple Valid Signatures for Owners, Leading to Reversions in checkNSignatures Function if Threshold is Greater Than 1
#59
hats-bug-reporter[bot]
opened
4 days ago
1
Bypass of isSafe Validation Allows Malicious Contract Registrations and Spam the Palmera Module contracts with System-Wide Exploitation
#58
hats-bug-reporter[bot]
opened
4 days ago
1
Missing Validation in addSafe Function for Enabled Guard and Module
#57
hats-bug-reporter[bot]
opened
4 days ago
0
Super safe can restrict ROOT to change him
#56
hats-bug-reporter[bot]
opened
5 days ago
1
Potential Protocol insolvency in `removeWholeTree` and `disconnectSafe`
#55
hats-bug-reporter[bot]
opened
5 days ago
4
Crucial Functions addOwnerWithThreshold and removeOwner Do Not Emit Events
#54
hats-bug-reporter[bot]
opened
5 days ago
1
removeWholeTree() will run out of gas
#53
hats-bug-reporter[bot]
opened
5 days ago
1
`addSafe` Function Lacks Validation for `superSafeId` State
#52
hats-bug-reporter[bot]
opened
5 days ago
2
Safe owner/s can prevent being removed from organization by indefinitely increasing their child array
#51
hats-bug-reporter[bot]
opened
5 days ago
2
Malicious users can front-run host users safe management actions and add those safes as root for wrong org
#50
hats-bug-reporter[bot]
opened
5 days ago
0
Creating root safe for organization overrides `depthTreeLimit[org]`
#49
hats-bug-reporter[bot]
opened
6 days ago
0
NO deadline on transactions
#48
hats-bug-reporter[bot]
opened
6 days ago
7
Safe without children cannot become ROOT
#47
hats-bug-reporter[bot]
opened
6 days ago
1
Safes in an org can be stuffed up to the TreeDepthLimitReached by anyone
#46
hats-bug-reporter[bot]
opened
6 days ago
1
Removing a safe with LEAD role do not remove all LEAD roles
#45
hats-bug-reporter[bot]
opened
6 days ago
1
No event emissions for critical state changes
#44
hats-bug-reporter[bot]
opened
6 days ago
2
Unused event and errors
#43
hats-bug-reporter[bot]
opened
6 days ago
2
Wrong FALLBACK_HANDLER on some chains
#42
hats-bug-reporter[bot]
opened
6 days ago
2
`setRole` Function Incorrectly Assigns `_safe.lead` without Validating `enabled` Parameter
#41
hats-bug-reporter[bot]
opened
6 days ago
0
Incorrect access control on removeSafe()
#40
hats-bug-reporter[bot]
opened
6 days ago
3
Off-by-One Error in Loop Condition in `PalmeraGuard` Contract
#39
hats-bug-reporter[bot]
opened
6 days ago
1
`isSafeLead` Function Lacks Role Authorization Check, Leading to Unauthorized Access
#38
hats-bug-reporter[bot]
opened
6 days ago
0
Ineffective Revocation of Multiple Roles in `disableSafeLeadRoles` Function
#37
hats-bug-reporter[bot]
opened
6 days ago
1
Hardcoded level inside of `_seekMember` causes discrepancy
#36
hats-bug-reporter[bot]
opened
6 days ago
1
Signature Malleability in processAndSortSignatures
#35
hats-bug-reporter[bot]
opened
6 days ago
2
processAndSortSignatures is missing case for v = 1
#34
hats-bug-reporter[bot]
opened
6 days ago
1
DomainSeparator is missing name and version
#33
hats-bug-reporter[bot]
opened
6 days ago
2
Missing Guard functions will block the execTransactionFromModule
#32
hats-bug-reporter[bot]
opened
6 days ago
1
Insufficient Access Control in execTransactionOnBehalf Due to Broad Lead Role Check
#31
hats-bug-reporter[bot]
opened
6 days ago
3
Unauthorized Transaction Execution On Behalf
#30
hats-bug-reporter[bot]
opened
6 days ago
1
Missing Revocation of SafeLead Role
#29
hats-bug-reporter[bot]
opened
6 days ago
3
Next