Skip to content

Latest commit

 

History

History
18 lines (18 loc) · 672 Bytes

File metadata and controls

18 lines (18 loc) · 672 Bytes

Access control is typically enforced on functions using modifiers that check if specific addresses/roles are calling these functions. Ensure that such modifiers are present on all relevant functions which require that specific access control.


Slide Screenshot

0150.jpg


Slide Text

  • Access Control Modifiers -> Enforce
  • Modifiers -> Encapsualte
  • Repetitive Checks
  • Functions <-> Modifiers
  • Modularity Vs. Auditability
  • Present & Valid & Correct

References


Tags