Skip to content

SafeL2 (Safe)

Audit Snapshot

  • Status: ✅ pass
  • Source type: npm
  • Source path: third_party/famous-contracts/sources/@safe-global/safe-contracts/contracts/SafeL2.sol
  • Primary issue: No primary issue recorded.
  • Audit corpus size: 98 contracts

Diagnostics

Total diagnostics captured: 270

By Severity

SeverityCount
warning270

Most Common Codes

CodeCountExample
W200248function 'mul' in 'Executor' overrides 'SelfAuthorized::mul' which is not marked 'virtual'
RAW6warning: tx.origin has different semantics on Neo N3. Neo uses multi-signature witnesses instead of a single origin. Consider using msg.sender or Runtime.CheckWitness() instead.
W1116function 'onNEP17Payment' is marked payable, but Neo N3 has no native coin transfer; the modifier is accepted for compatibility but has no effect. Use onNEP17Payment(address, uint256, bytes) to handle incoming NEP-17 token payments.
MANIFEST_WILDCARD_CONTRACT3contract 'GuardManager' requires wildcard contract manifest permissions (contract='*') due to dynamic contract calls. This is riskier than fixed contract hashes; use --deny-wildcard-contracts to make this a hard error.
W1053function 'fallback' has no effect on Neo N3. Use onNEP17Payment(address from, uint256 amount, bytes data) to handle incoming token payments.
W1162function 'execTransaction' has payable modifier which has no effect on Neo N3. Use onNEP17Payment callback to receive token payments.
VALIDATION_WARNING1abstract contract 'ISignatureValidator' has 1 unimplemented function(s): [isValidSignature]
W1061function 'supportsInterface' (EIP-165) is unnecessary on Neo N3. Neo uses the manifest 'supportedstandards' array for interface detection, which the compiler populates automatically.

Source diagnostic payload: docs/data/famous-contracts-audit-results.json.

References

MIT Licensed