0% found this document useful (0 votes)
32 views11 pages

Tron Presentation

The smart contract code for TronWin 8.2 was audited by KnownSec Blockchain Lab and found to be safe. 33 tests were run and passed, covering vulnerabilities. The withdraw function was backtested and will not cause overflows or underflows. All possible vulnerabilities were checked using various tools and no issues were identified, meaning the code is 100% safe.

Uploaded by

DCM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views11 pages

Tron Presentation

The smart contract code for TronWin 8.2 was audited by KnownSec Blockchain Lab and found to be safe. 33 tests were run and passed, covering vulnerabilities. The withdraw function was backtested and will not cause overflows or underflows. All possible vulnerabilities were checked using various tools and no issues were identified, meaning the code is 100% safe.

Uploaded by

DCM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

TRONWIN

8.2
AUDIT BY KNOWNSEC BLOCKCHAIN LAB
KnownSec Blockchain Security is one
of the most respected entities that
provides smart contracts audits and
security consultations worldwide.
AUDIT COVERAGE AND DEPTH
In this audit report, engineers conducted a comprehensive
analysis of the common vulnerabilities of smart contracts.

Risk level distribution


The smart contract code of TronWin8.2 is
comprehensively assessed as SAFE.
33 test were executed and the smart contract
passed them all.
THE SMART CONTRACTS ARE BUILT UPON
FUNCTIONS THAT ARE EXECUTED AFTER
FOLLOWING SPECIFIC INSTRUCTIONS
REQUESTED BY THE USER.

SMART CONTRACT THESE FUNCTIONS WERE BACKTESTED BY


OUR ENGINEERS AND ARE DIVIDED

CODING
BETWEEN:

BUSINESS SECURITY TESTING


BASIC CODE VULNERABILITIES
THE WITHDRAW FUNCTION OF THE
CONTRACT IS USED TO WITHDRAW CASH
AFTER CALCULATING CONDITIONS AND

WITHDRAW INTEREST.

THE FUNCTION CODE SPECIFICATION WILL

FUNCTION
NOT CAUSE OVERFLOW OR UNDERFLOW
VULNERABILITIES.
FUNCTION WITHDRAW(UINT8 _PLAN) PUBLIC {
USER STORAGE USER = USERS[MSG.SENDER];
REQUIRE(USER.CHECKPOINT.ADD(MINIPERIOD) < BLOCK.TIMESTAMP,
"WITHDRAWAL TIME IS NOT REACHED");

UINT256 TOTALAMOUNT = GETUSERDIVIDENDS(MSG.SENDER);


UINT256 REINVESTAMOUNT = TOTALAMOUNT.MUL(40).DIV(100);
UINT256 INSURANCEAMOUNT = TOTALAMOUNT.MUL(2).DIV(100);
TOTALINSURANCE = TOTALINSURANCE.ADD(INSURANCEAMOUNT);

(UINT256 PERCENT, UINT256 PROFIT, UINT256 FINISH) =


GETRESULT(_PLAN, REINVESTAMOUNT);
USER.DEPOSITS.PUSH(DEPOSIT(_PLAN, PERCENT, REINVESTAMOUNT,
PROFIT, BLOCK.TIMESTAMP, FINISH));

WITHDRAW
USER.TOTALDEPOSIT =
USER.TOTALDEPOSIT.ADD(REINVESTAMOUNT);
TOTALSTAKED = TOTALSTAKED.ADD(REINVESTAMOUNT);

UINT256 REFERRALBONUS =
GETUSERREFERRALBONUS(MSG.SENDER);

FUNCTION
IF (REFERRALBONUS > 0) {
USER.BONUS = 0;
TOTALAMOUNT = TOTALAMOUNT.ADD(REFERRALBONUS);
}
REQUIRE(TOTALAMOUNT > 0, "USER HAS NO DIVIDENDS");

UINT256 CONTRACTBALANCE = ADDRESS(THIS).BALANCE;


IF (CONTRACTBALANCE < TOTALAMOUNT) {
TOTALAMOUNT = CONTRACTBALANCE;
}
USER.CHECKPOINT = BLOCK.TIMESTAMP;

UINT256 WITHDRAWAMOUNT =
TOTALAMOUNT.SUB(REINVESTAMOUNT).SUB(INSURANCEAMOUNT);
INSURANCEFEE.TRANSFER(INSURANCEAMOUNT);
USER.TOTALWITHDRAWN =
USER.TOTALWITHDRAWN.ADD(WITHDRAWAMOUNT);
MSG.SENDER.TRANSFER(WITHDRAWAMOUNT);
EMIT WITHDRAWN(MSG.SENDER, WITHDRAWAMOUNT);
}
ALL POSSIBLE VULNERABILITIES HAVE BEEN
CHECKED AND THE SMART CONTRACT IS

HACK AND
100% SAFE.

COMPILER VERSION SECURITY

VULNERABILITY NO REDUNDANT CODING


SECURE ARITHMETIC LIBRARY

CHECK
OWNER PERMISSION CONTROL

HACK AND WE CHECKED IF THE OWNER IN THE


CONTRACT CODE IMPLEMENTATION HAS
TOO MANY PERMISSIONS. FOR EXAMPLE,

VULNERABILITY ARBITRARILY MODIFY OTHER ACCOUNT


BALANCES, ETC. THE CONTRACT HAS
PASSED THIS TEST.

CHECK
VULNERABILITY TESTING TOOLS USED

MANTICORE

HACK AND
OYENTE
SECURITY. SH
ECHIDNA
MAIAN

VULNERABILITY ETHERSPLAY
IDA-EVM
IDE

CHECK
KNOWNSEC PENETRATION TESTER KIT
TRONWIN 8.2
FINAL ANALYSIS
ENGINEERS CONDUCTED A DEEP ANALYSIS ON THE SMART
CONTRACT CODING AND ITS VULNERABILITIES, NO
SECURITY RISKS WERE FOUND AND TRONWIN 8.2 CODE IS
COMPREHENSIVELY ASSESED AS SAFE.
TRONWIN
8.2

You might also like