Skip to content

Latest commit

 

History

History
9 lines (7 loc) · 1.27 KB

avoiding_common_attacks.md

File metadata and controls

9 lines (7 loc) · 1.27 KB

Avoiding Common Attacks

The following measures were applied in Item.sol and Market.sol contracts to avoid common security pitfalls:

  • Proper setting of visibility for functions: Functions are specified as being external, public, internal or private to reduce the attack surface of a contract system. - SWC-100
  • Using Specific Compiler Pragma: Solidity 0.8.3 is used in both Item and Market contracts and not floating pragma. - SWC-103
  • Using Openzeppelin's ReentrancyGuard in createMarketItem and createItemSale functions in Market contract to safeguard against reentrancy attack. - SWC-107
  • Proper Use of Require, Assert and Revert: Using require to check the listing price and the amount of eth send by the user to buy or list an item in Market contract.
  • Include fallback() and receive() functions in Market contract to receive force-sending of ETH and add the amount to the contract balances.