Assessment reports>Yeet>Threat Model>unstake

Function: unstake(uint256 index)

This is the actual unstake function. The unstaking process is carried out, and tokens are subsequently disbursed to the caller.

Inputs

  • index

    • Control: Fully controlled by the caller.

    • Constraints: N/A.

    • Impact: Index of vestings.

Branches and code coverage

Intended branches

  • Check if vesting period has ended.

Negative behavior

  • Vesting period has not ended.

Zellic © 2025Back to top ↑