Skip to content

Commit 66195ea

Browse files
authored
Merge pull request #297 from SmartContractSecurity/chaals-patch-2
Update SWC-119.md
2 parents a8befc2 + 4783faa commit 66195ea

File tree

2 files changed

+31
-1
lines changed

2 files changed

+31
-1
lines changed

entries/docs/SWC-118.md

+16
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,14 @@
1+
# Please note, this content is no longer actively maintained.
2+
3+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4+
5+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available, that represents the latest work of the group developing the specification.
8+
9+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
10+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).
11+
112
# Title
213

314
Incorrect Constructor Name
@@ -19,6 +30,11 @@ Solidity version 0.4.22 introduces a new `constructor` keyword that make a const
1930

2031
- [SigmaPrime - Constructors with Care](https://blog.sigmaprime.io/solidity-security.html#constructors)
2132

33+
### EEA EthTrust Security Levels Specification
34+
35+
- [**[S] Use a Modern Compiler**](https://entethalliance.org/specs/ethtrust-sl/#req-1-compiler-060)
36+
- [**[Q] Code Linting**](https://entethalliance.org/specs/ethtrust-sl/#req-3-linted)
37+
2238
## Samples
2339

2440
### incorrect_constructor_name1.sol

entries/docs/SWC-119.md

+15-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,14 @@
1-
# Title
1+
# Please note, this content is no longer actively maintained.
2+
3+
The content of the SWC registry has not been thoroughly updated since 2020. It is known to be incomplete and may contain errors as well as crucial omissions.
4+
5+
For currently maintained guidance on known Smart Contract vulnerabilities written primarily as guidance for security reviewers, please see the
6+
[EEA EthTrust Security Levels specification](https://entethalliance.org/specs/ethtrust-sl). As well as the latest release version, an
7+
[Editor's draft](https://entethalliance.github.io/eta-registry/security-levels-spec.html) is available,
8+
that represents the latest work of the group developing the specification.
9+
10+
General guidance for developers on what to consider to ensure security, that is currently maintained, is also available through the
11+
[Smart Contract Security Verification Standard (SCSVS)](https://github.com/ComposableSecurity/SCSVS).# Title
212

313
Shadowing State Variables
414

@@ -21,6 +31,10 @@ Review storage variable layouts for your contract systems carefully and remove a
2131
- [Issue on Solidity's Github - Shadowing of inherited state variables should be an error (override keyword)](https://github.com/ethereum/solidity/issues/2563)
2232
- [Issue on Solidity's Github - Warn about shadowing state variables](https://github.com/ethereum/solidity/issues/973)
2333

34+
### EEA EthTrust Security Levels Specification
35+
36+
- [**[Q] Implement as Documented**](https://entethalliance.org/specs/ethtrust-sl/#req-3-implement-as-documented)
37+
2438
## Samples
2539

2640
### ShadowingInFunctions.sol

0 commit comments

Comments
 (0)