Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

QA Report #747

Open
c4-submissions opened this issue Nov 9, 2023 · 8 comments
Open

QA Report #747

c4-submissions opened this issue Nov 9, 2023 · 8 comments
Labels
bug Something isn't working grade-a high quality report This report is of especially high quality Q-20 QA (Quality Assurance) Assets are not at risk. State handling, function incorrect as to spec, issues with clarity, syntax selected for report This submission will be included/highlighted in the audit report sponsor confirmed Sponsor agrees this is a problem and intends to fix it (OK to use w/ "disagree with severity")

Comments

@c4-submissions
Copy link
Contributor

See the markdown file with the details of this report here.

@c4-submissions c4-submissions added bug Something isn't working QA (Quality Assurance) Assets are not at risk. State handling, function incorrect as to spec, issues with clarity, syntax labels Nov 9, 2023
c4-submissions added a commit that referenced this issue Nov 9, 2023
c4-submissions added a commit that referenced this issue Nov 9, 2023
@c4-pre-sort c4-pre-sort added the high quality report This report is of especially high quality label Nov 25, 2023
@c4-pre-sort
Copy link

141345 marked the issue as high quality report

@141345
Copy link

141345 commented Nov 25, 2023

747 The_Kakers
l r nc
6 3 3

d L-1 NextGenRandomizerVRF randomizer uses Goerli keyHash dup of #1611
l L-2 fulfillRandomWords sets the token hash as the first fulfilled random number instead of calculating a hash
n L-3 Insufficient pseudo-randomness is masked under over-complicated implementation
d L-4 requestRandomWords() is marked as payable in NextGenRandomizerRNG but it can't be called with value dup of https://github.-423n4/2023-10-nextgen-findings/issues/998
d L-5 getWord() returns the same word for different ids dup of #508
d L-6 Predictable pseudo-random values should be proposed by trusted roles dup of https://github.com/code-423n4/nextgen-findings/issues/163
d L-7 returnHighestBidder() doesn't update the highBid attribute on its calculation dup of https://github.com/code-423n4/nextgen-findings/issues/586
d L-8 Auction participants will have their funds locked until NFT is claimed dup of https://github.com/code-423n4/nextgen-findings/issues/362
d L-9 Airdropped minted tokens for auctions should be transfered to a escrow contract dup of https://github.com/code-423n4/nextgen-findings/issues/364
d L-10 The receiver of the funds from claimAuction() should be moved to another function dup of https://github.com/n4/2023-10-nextgen-findings/issues/486
n L-11 Use supportsInterface() from EIP-165 instead of custom-made checks
d L-12 supportsInterface() is incorrectly implemented on NextGenCore dup of https://github.com/code-423n4/nextgen-findings/issues/1310
r L-13 tokenId JavaScript variable in generative scripts should be quoted
l L-14 Collection scripts with indexes 999 and 1000 can't be updated
r L-15 It is not possible to add or remove generative scripts
d L-16 Malicious scripts can be injected on the generative scripts via the token dup of https://github.com/code-423n4/nextgen-findings/issues/1284
l L-17 burnToMint() does not check that minting costs were set
d L-18 Merkle nodes can have 64 bytes length, making internal nodes be reinterpreted as leaf values dup of https://github.-423n4/2023-10-nextgen-findings/issues/1818
l L-19 Merkle proofs from burnOrSwapExternalToMint() could be used in mint() and vicevsersa
r L-20 Lack of check for empty artist signature
l L-21 Artist can't propose new addresses and percentages
d L-22 acceptAddressesAndPercentages() can be frontrunned by artists to change settings dup of https://github.com/n4/2023-10-nextgen-findings/issues/1126
l L-23 acceptAddressesAndPercentages() can approve addresses and percentages that have not been set
n NC-1 Unnecessary address payable conversions

@c4-sponsor
Copy link

a2rocket (sponsor) confirmed

@c4-sponsor c4-sponsor added the sponsor confirmed Sponsor agrees this is a problem and intends to fix it (OK to use w/ "disagree with severity") label Nov 28, 2023
@c4-judge
Copy link

c4-judge commented Dec 8, 2023

alex-ppg marked the issue as grade-a

@c4-judge
Copy link

c4-judge commented Dec 8, 2023

alex-ppg marked the issue as selected for report

@c4-judge c4-judge added the selected for report This submission will be included/highlighted in the audit report label Dec 8, 2023
@alex-ppg
Copy link

alex-ppg commented Dec 8, 2023

As this report has been selected as the best, I will provide additional feedback on the points that were not credited in the original assessment above:

@C4-Staff C4-Staff added the Q-20 label Dec 14, 2023
@thebrittfactor
Copy link
Contributor

Just a note that C4 is excluding the invalid and out of scope entries from the official report.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working grade-a high quality report This report is of especially high quality Q-20 QA (Quality Assurance) Assets are not at risk. State handling, function incorrect as to spec, issues with clarity, syntax selected for report This submission will be included/highlighted in the audit report sponsor confirmed Sponsor agrees this is a problem and intends to fix it (OK to use w/ "disagree with severity")
Projects
None yet
Development

No branches or pull requests

8 participants