From b1419286adbcf1a75d7486abf9b695e5ada9f622 Mon Sep 17 00:00:00 2001 From: owen05 Date: Sun, 14 Mar 2021 10:23:23 +0800 Subject: [PATCH] update readme --- README.md | 106 ++++++++++++++++++++++++++++++++++++++---------------- 1 file changed, 75 insertions(+), 31 deletions(-) diff --git a/README.md b/README.md index e14aed9..4fa3c22 100644 --- a/README.md +++ b/README.md @@ -1,35 +1,79 @@ -# DODO V2: Help 1 Trillion People Issue Token +# Audit Scope + +*IN PROCESS* + +## Contract Directory + +*IN PROCESS* + +- CrowdPooling/ + +- DODOPrivatePool/ + +- DODOVendingMachine/ + +- DODOFee/ + +- DODOToken/ + +- Factory/ + +- helper/ + +- intf/ + +- lib/ + +- SmartRoute/ + +## Contract Address + +*IN PROCESS* + +- DODOApprove: 0xCB859eA579b28e02B87A1FDE08d087ab9dbE5149 + +- DODOApproveProxy: 0x335aC99bb3E51BDbF22025f092Ebc1Cf2c5cC619 + +- DODOIncentive: 0x989DcAA95801C527C5B73AA65d3962dF9aCe1b0C + +- DODOV2Proxy02: 0x1cf4Ae0Fae772B64d83D175d9E3eE06240f6Dc9a + +--- + +- CPFactory: 0xE8C9A78725D0451FA19878D5f8A3dC0D55FECF25 + +- DPPFactory: 0x6B4Fa0bc61Eddc928e0Df9c7f01e407BfcD3e5EF + +- DVMFactory: 0xc9eD9B18e447e600238fe50e944B9062B664DEa4 + +- ERC20Factory: 0x44D5dF24d5Ef52A791D6436Fa45A8D426f6de34e + +- UpCpFactory: 0x0c4b4F1D5F5c989457cdD6f5102308b33c922281 + +--- + +- DVMTemplate: 0x8a538751A501A9785F93727d4cB7b7827FAb1ad0 + +- DPPTemplate: 0xB76de21f04F677f07D9881174a1D8E624276314C + +- DPPAdmin Template: 0x5515363c0412AdD5c72d3E302fE1bD7dCBCF93Fe + +- CPTemplate: 0x18b0bD918b55f995Fd404B872404378A62cb403b + +--- + +- vDODOToken: 0xc4436fBAE6eBa5d95bf7d53Ae515F8A707Bd402A + +- DODOMigrationBSC: 0x02fCB21dc1cf221939C1d4277fB54016b5d32bC7 + +--- + +- MtFeeRateModel: 0x5e84190a270333aCe5B9202a3F4ceBf11b81bB01 + +- PermissionModel: 0x6B208E08dcF6BD51F50C5Da09d15B2D8E5C46Cf2 + +- FeeRateImpl: 0x4775b1858f1e417C9609D455C3Ad8751ec01daC4 ## Audit Report -[Audited by Peckshield](https://github.com/DODOEX/contractV2/blob/main/audit/PeckShield-Audit-DODOV2-v1.0.pdf) - -## Bug Bounty 💰 - -### Rewards - -Severity of bugs will be assessed under the [CVSS Risk Rating](https://www.first.org/cvss/calculator/3.0) scale, as follows: - - - Critical (9.0-10.0): Up to $100,000 - - High (7.0-8.9): Up to $10,000 - - Medium (4.0-6.9): Up to $5,000 - - Low (0.1-3.9): Up to $1,000 - -In addition to assessing severity, rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability. - -### Disclosure - -Any vulnerability or bug discovered must be reported only to the following email: contact@dodoex.io; must not be disclosed publicly; must not be disclosed to any other person, entity or email address prior to disclosure to the contact@dodoex.io email; and must not be disclosed in any way other than to the contact@dodoex.io email. In addition, disclosure to contact@dodoex.io must be made promptly following discovery of the vulnerability. Please include as much information about the vulnerability as possible, including: - - - The conditions on which reproducing the bug is contingent. - - The steps needed to reproduce the bug or, preferably, a proof of concept. - - The potential implications of the vulnerability being abused. - -A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount. - -Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution, if agreed. - -## Contact Us - -Send E-mail to contact@dodoex.io