You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: entries/docs/SWC-101.md
+18-2
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,26 @@
1
+
# Please note, this content is no longer actively maintained.
2
+
3
+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4
+
5
+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6
+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7
+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available,
8
+
that represents the latest work of the group developing the specification.
9
+
10
+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
11
+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).
As of August 2023 the current version of the compiler is 0.8.21. There are several dozen compiler bugs that have been fixed between that and version 0.4.13,
55
-
each of which can lead to data being corrupted, contracts not functioning as expected, or unexpected vulnerabilities in contracts.
55
+
each of which can lead to data being corrupted, contracts not functioning as expected, or unexpected vulnerabilities in contracts.
56
56
There have also been significant improvements in compiler capabilities to protect against errors.
57
57
58
58
See also the sections [**Level [S]** Compiler Security Bugs](https://entethalliance.org/specs/ethtrust-sl/#sec-1-compiler-bugs),
59
59
[**Level [S]** Improved Compilers](https://entethalliance.org/specs/ethtrust-sl/#sec-1-compile-improvements), and
60
60
[**Level [M]** Compiler Bugs and Overriding Requirements](https://entethalliance.org/specs/ethtrust-sl/#sec-level-2-compiler-bugs)
Copy file name to clipboardExpand all lines: entries/docs/SWC-103.md
+18-1
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,27 @@
1
+
# Please note, this content is no longer actively maintained.
2
+
3
+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4
+
5
+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6
+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7
+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available,
8
+
that represents the latest work of the group developing the specification.
9
+
10
+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
11
+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).
12
+
1
13
# Title
2
14
3
15
Floating Pragma
4
16
5
17
## Relationships
6
18
7
-
[CWE-664: Improper Control of a Resource Through its Lifetime](https://cwe.mitre.org/data/definitions/664.html)
19
+
-[CWE-664: Improper Control of a Resource Through its Lifetime](https://cwe.mitre.org/data/definitions/664.html)
Copy file name to clipboardExpand all lines: entries/docs/SWC-104.md
+15-1
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,24 @@
1
+
# Please note, this content is no longer actively maintained.
2
+
3
+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4
+
5
+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6
+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7
+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available,
8
+
that represents the latest work of the group developing the specification.
9
+
10
+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
11
+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).
Copy file name to clipboardExpand all lines: entries/docs/SWC-105.md
+37-22
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,25 @@
1
+
# Please note, this content is no longer actively maintained.
2
+
3
+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4
+
5
+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6
+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7
+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available,
8
+
that represents the latest work of the group developing the specification.
9
+
10
+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
11
+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).
0 commit comments