Skip to content

Commit

Permalink
Update main.rs
Browse files Browse the repository at this point in the history
  • Loading branch information
yevh committed Jan 27, 2024
1 parent a36c4a9 commit 64bf961
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions l3x/src/main.rs
Original file line number Diff line number Diff line change
Expand Up @@ -592,7 +592,7 @@ fn initialize_vulnerability_checks() -> Vec<VulnerabilityCheck> {
suggested_fix: "Implement checks to verify the depositor's signature and ensure the deposit_account cannot be forged by validating the derived address generated by seeds from reserve.key and depositor.key.".to_string(),
},
VulnerabilityCheck {
id: "SOL029".to_string(),
id: "VULN029".to_string(),
title: "Unchecked Account Deserialization".to_string(),
severity: "High".to_string(),
pattern: r"try_from_slice\(&ctx.accounts.\w+.data.borrow\(\)\?\)".to_string(),
Expand All @@ -601,7 +601,7 @@ fn initialize_vulnerability_checks() -> Vec<VulnerabilityCheck> {
suggested_fix: "Ensure accounts are of the expected type before deserialization.".to_string(),
},
VulnerabilityCheck {
id: "SOL030".to_string(),
id: "VULN030".to_string(),
title: "Log Injection".to_string(),
severity: "Medium".to_string(),
pattern: r"msg!\(.*?\)".to_string(),
Expand All @@ -610,7 +610,7 @@ fn initialize_vulnerability_checks() -> Vec<VulnerabilityCheck> {
suggested_fix: "Sanitize all inputs that are logged to prevent log injection attacks.".to_string(),
},
VulnerabilityCheck {
id: "SOL031".to_string(),
id: "VULN031".to_string(),
title: "CPI to Unauthorized Programs".to_string(),
severity: "High".to_string(),
pattern: r"invoke\(\[.*?\], &[.*?]\)".to_string(),
Expand Down

0 comments on commit 64bf961

Please sign in to comment.