update readme

This commit is contained in:
owen05
2021-03-14 10:23:23 +08:00
parent 832f9699ac
commit b1419286ad

106
README.md
View File

@@ -1,35 +1,79 @@
# DODO V2: Help 1 Trillion People Issue Token
# Audit Scope
*IN PROCESS*
## Contract Directory
*IN PROCESS*
- CrowdPooling/
- DODOPrivatePool/
- DODOVendingMachine/
- DODOFee/
- DODOToken/
- Factory/
- helper/
- intf/
- lib/
- SmartRoute/
## Contract Address
*IN PROCESS*
- DODOApprove: 0xCB859eA579b28e02B87A1FDE08d087ab9dbE5149
- DODOApproveProxy: 0x335aC99bb3E51BDbF22025f092Ebc1Cf2c5cC619
- DODOIncentive: 0x989DcAA95801C527C5B73AA65d3962dF9aCe1b0C
- DODOV2Proxy02: 0x1cf4Ae0Fae772B64d83D175d9E3eE06240f6Dc9a
---
- CPFactory: 0xE8C9A78725D0451FA19878D5f8A3dC0D55FECF25
- DPPFactory: 0x6B4Fa0bc61Eddc928e0Df9c7f01e407BfcD3e5EF
- DVMFactory: 0xc9eD9B18e447e600238fe50e944B9062B664DEa4
- ERC20Factory: 0x44D5dF24d5Ef52A791D6436Fa45A8D426f6de34e
- UpCpFactory: 0x0c4b4F1D5F5c989457cdD6f5102308b33c922281
---
- DVMTemplate: 0x8a538751A501A9785F93727d4cB7b7827FAb1ad0
- DPPTemplate: 0xB76de21f04F677f07D9881174a1D8E624276314C
- DPPAdmin Template: 0x5515363c0412AdD5c72d3E302fE1bD7dCBCF93Fe
- CPTemplate: 0x18b0bD918b55f995Fd404B872404378A62cb403b
---
- vDODOToken: 0xc4436fBAE6eBa5d95bf7d53Ae515F8A707Bd402A
- DODOMigrationBSC: 0x02fCB21dc1cf221939C1d4277fB54016b5d32bC7
---
- MtFeeRateModel: 0x5e84190a270333aCe5B9202a3F4ceBf11b81bB01
- PermissionModel: 0x6B208E08dcF6BD51F50C5Da09d15B2D8E5C46Cf2
- FeeRateImpl: 0x4775b1858f1e417C9609D455C3Ad8751ec01daC4
## Audit Report
[Audited by Peckshield](https://github.com/DODOEX/contractV2/blob/main/audit/PeckShield-Audit-DODOV2-v1.0.pdf)
## Bug Bounty 💰
### Rewards
Severity of bugs will be assessed under the [CVSS Risk Rating](https://www.first.org/cvss/calculator/3.0) scale, as follows:
- Critical (9.0-10.0): Up to $100,000
- High (7.0-8.9): Up to $10,000
- Medium (4.0-6.9): Up to $5,000
- Low (0.1-3.9): Up to $1,000
In addition to assessing severity, rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability.
### Disclosure
Any vulnerability or bug discovered must be reported only to the following email: contact@dodoex.io; must not be disclosed publicly; must not be disclosed to any other person, entity or email address prior to disclosure to the contact@dodoex.io email; and must not be disclosed in any way other than to the contact@dodoex.io email. In addition, disclosure to contact@dodoex.io must be made promptly following discovery of the vulnerability. Please include as much information about the vulnerability as possible, including:
- The conditions on which reproducing the bug is contingent.
- The steps needed to reproduce the bug or, preferably, a proof of concept.
- The potential implications of the vulnerability being abused.
A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount.
Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution, if agreed.
## Contact Us
Send E-mail to contact@dodoex.io