Code Monkey home page Code Monkey logo

gammaprotocol's Issues

Improve Oracle module

Currently the Oracle module store one price for each batch at a specific time, if we have multiple ETH-USDC put options with different strike prices, we will only need to push the underlying asset price once to settle them all.
In case we have ETH put options with different collateral(USDC and DAI) we will need to push the price twice at expiry time as the batch for those two options is different. Also as the Oracle store an asset price, I think it will be better to map price directly by asset rather than by batch.

MarginAccount._clearVault uses a variable after it was deleted

https://crytic.io/opynfinance/GammaProtocol/54/security_checks

Crytic is complaining about our delete syntax on the vault struct. I ignore it for now because it seems fine and we already had test coverage the delete action. But probably need a deeper review before closing this.

MarginAccount._clearVault(MarginAccount.Vault) uses a variable after it was deleted
- Delete: delete _vault.longOtokens
- Use: delete _vault.collateralAssets

Make sure variables that are deleted are not used later.

getExcessCollateral function doesnt always return a properly scaled value.

[Issue] the getExcessCollateral returns a 1e18 number, instead of a scaled value for a long spread which settles ITM, without collateral deposited.
Scenario:
Long Option: $300 Strike Put
Short Option: $200 Strike Put
Collateral: USDC
Long amount: 10
Short amount: 10
Collateral amount: 0
On settle vault will fail because in margin calculator, in the get excessCollateral function, hasCollateral will be false, so it won't convert it into token amount.

[NAMING] - Controller/_exercise()

All of our european options are autoexercised. Should we rename this action as it might be confusing? No one needs to actually exercise anything. They just have to withdraw proceeds.

Some ideas:
WithdrawLongProceeds
WithdrawProceeds
WithdrawOtokenProceeds
RedeemLongProceeds
RedeemLong
Redeem
RedeemOtoken
WithdrawTheMoneys

Update names + grammar

  1. Use otoken series instead of otoken to represent a specific strike-underlying-collateral-strikePrice-expiry combination

[NAMING] - paused vs emergency shutdown

Naming:

variables:
pauser
terminator
systemPaused
systemShutdown

functions:
TerminatorUpdated
PauserUpdated
SystemPaused
EmergencyShutdown

systemShutdown or emergency shutdown is done by terminator
systemPaused is done by pauser

I think we should switch names or change them. I think we should pick emergency shutdown vs system shutdown.

To me emergency shutdown implies that users will be able to unwind positions/remove collateral (kind of like maker, but at some future point in the future).
System paused implies to me that things are temporarily frozen - which I think applies to the entire protocol.

Any thoughts?

Factory expiry check

The current factory will only allow creation of option that expires at 08:00AM UTC.

Should we somehow make it possible to bypass this in case we need it? (Whitelist / admin?)

update MarginPool and tests for standard ERC20 transfers

In the current implementation, we ignore the returned value of transfer and transferFrom. In the ERC20 standard, a failed transfer should return false instead of revert.

May need to do some more research on if there're any tokens that won't return true, and look into other protocols on how they handle it.

Using WETH instead of ETH

In the current spec, there exist multiple checks that require having collateral address different than address zero.
We should decide wether to use WETH token or what specific address for ETH collateral.

Create truffle script to automate tasks

Create truffle script for easier dev experience

  • Whitelist a long Otoken
  • Whitelist a collateral
  • Add a pricer
  • Farm asset from pool
  • Set terminator address
  • Set disputer address
    ...

Fix rounding issue, or have a clear doc on when will it happen

In file test/integration-tests/longCallSpreadExpireItm.test.ts.

get result of getExcessCollateral is wrong

      // Todo: Fix following rounding problem
      assert.equal(
        new BigNumber(vaultStateBeforeSettlement[0]).plus(1).toString(), // -4999999999999999999
        createScaledUint256(collateralPayout, (await weth.decimals()).toNumber()), //+5000000000000000000
      )

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.