Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sprint-2 Audit Report by gafram #3

Open
gafram opened this issue Jul 5, 2023 · 1 comment
Open

Sprint-2 Audit Report by gafram #3

gafram opened this issue Jul 5, 2023 · 1 comment

Comments

@gafram
Copy link

gafram commented Jul 5, 2023

yAcademy Spartan-ECDSA Review

Auditors:

Table of Contents

Review Summary

Spartan-ECDSA

The contracts of the Spartan-ECDSA Repo were reviewed over 16 days. The code review was performed between 19st June and 5th July, 2023. The repository was under active development during the review, but the review was limited to the latest commit at the start of the review. This was commit 3386b30.

Scope

The scope of the review consisted of the following contracts at the specific commit:

Findings Explanation

Findings are broken down into sections by their respective impact:

  • Critical, High, Medium, Low impact
    • These are findings that range from attacks that may cause loss of funds, impact control/ownership of the contracts, or cause any unintended consequences/actions that are outside the scope of the requirements
  • Gas savings
    • Findings that can improve the gas efficiency of the contracts
  • Informational
    • Findings including recommendations and best practices

Critical Findings

None.

High Findings

None.

Medium Findings

None.

Low Findings

None

Informational Findings

1. Informational - Unused bits variable.

The variable - bits is not used in template.

    template EfficientECDSA() {
        var bits = 256;
        signal input s;
        signal input Tx; // T = r^-1 * R
        signal input Ty; 

Recommendation

Remove unused variable

Final remarks

The observed code is written based on well known tested code base. There are no critical, high, medium, low vulnerabilities in the code.

@gafram
Copy link
Author

gafram commented Jul 5, 2023

nothing report(

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant