Skip to content

Conversation

devtooligan
Copy link

Checklist

Describe the changes you've made:

Adds a missing vuln type under data handling.

Type of change

Select the appropriate checkbox:

  • Bug fix (fixing an issue with existing vulnerability data)
  • New feature (adding a new vulnerability or category)
  • Documentation update (improving existing information)

Copy link
Owner

@kadenzipfel kadenzipfel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great addition! 🙏🙏

Comment on lines +25 to +28
if (blacklisted[_accountFrom.id]) revert();

UserData memory _accountTo = users[to];
if (blacklisted[_accountTo.id]) revert();
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: We should drop these blacklisted checks since they're not relevant to the vulnerability. Could also then drop id from UserData

@@ -0,0 +1,126 @@
## Caching Storage in Memory
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wdyt about instead naming it, "Unsafe storage caching"? IMO the current name seems to imply that it's generally unsafe to cache storage in memory

Note that if we change the name, we should also change the filename and the reference in the readme

@devtooligan
Copy link
Author

great ideas! I'll get on these soon

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants