Omniscia Sheesha Finance Audit
Mozik Manual Review Findings
Mozik Manual Review Findings
MOZ-01M: Improper Configuration Sanitization
| Type | Severity | Location |
|---|---|---|
| Input Sanitization | Minor | Mozik.sol:L9-L39 |
Description:
The Mozik contract improperly sanitizes the configurational values that are meant to be assigned to the AdvanceVesting and BaseVesting contract implementations.
Example:
17require(token_ != address(0), "Invalid reward token address");18require(startDate_ != 0, "TGE timestamp can't be 0");19require(20 vestingDuration_ > 0 && tgePercentage_ > 0,21 "The vesting duration and tgePercentage cannot be 0"22);23require(24 totalAllocatedAmount_ != 0,25 "The number of tokens for distribution cannot be 0"26);Recommendation:
We advise additional checks to be imposed, such as the tgePercentage to be less than the maximum percentage, the amount unlocked between firstRelease and vestingTimeEnd to be below the total percentage when added to the LGE and other similar logic checks.
Alleviation:
The configurational values of AdvanceVesting are now assigned by the contract's constructor instead of being done so on the contract level. Additionally, the AdvanceVesting constructor as well as inherited BaseVesting implementation apply the necessary sanitization checks in their respective constructor functions thus alleviating this exhibit.