Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Attention needed on reentrancy issues #18

Open
Dvisacker opened this issue Jun 22, 2018 · 0 comments
Open

Attention needed on reentrancy issues #18

Dvisacker opened this issue Jun 22, 2018 · 0 comments

Comments

@Dvisacker
Copy link
Member

Although we removed calls to external transferFrom have been wrapper in require statements in commit [20e6637], I still think reentrancy issues need to be looked at more closely.

In particular, does using require guarantee that there is no possibility for reentrancy ?
All the reentrancy examples I have seen seemed to involve 'call()' and do not really go with standard solidity programming practices.

A clear explanation on why this line of code is safe would be helpful to me:

require(ERC20(order.tokenSell).transferFrom(order.maker, trade.taker, filledAmountSell))

Any thoughts on this ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant