Summary: Missing 0 value check for immutable variables
Contract:OptimismPortal2.sol
Vulnerability Detail
Both of these variables are critical for messages sent from L2 to L1 via the OptimismPortal2 contract.
The message can be executed PROOF_MATURITY_DELAY_SECONDS after the withdrawal has been proven and DISPUTE_GAME_FINALITY_DELAY_SECONDS after its corresponding proposal (located within a FaultDisputeGame) was finalized.
Impact
Considering the significance of protocol integrity, despite the low probability of risk, it is essential to adhere to the protocol's precautionary principles, adding an essential layer of safety. To this end, it is imporant to implement checks for two immutable variables to guarantee that delays are appropriately enforced within the protocol. Specifically, these checks should verify that PROOF_MATURITY_DELAY_SECONDS is applied to the finalization of withdrawals, and DISPUTE_GAME_FINALITY_DELAY_SECONDS is utilized for the resolution and finalization of proposals. By implementing a check that a 0 value is not attributed to either of the varaibles upon deployment of the contract
QA/Low report
Low/Info issue submitted by TheSeraphs
Summary: Missing 0 value check for immutable variables
Contract:
OptimismPortal2.sol
Vulnerability Detail
Both of these variables are critical for messages sent from L2 to L1 via the
OptimismPortal2
contract.