<!-- ghit#filepath: /Users/jagadeesh/boss/drips/credence --> # Standardize SafeERC20 usage for non-compliant tokens ## Description - Direct `transfer`/`transferFrom` calls can fail silently on non-standard tokens. ## Requirements and context - Cover all token movement paths. - Preserve existing allowance and approval logic where possible. ## Suggested execution - Replace direct ERC20 calls with `SafeERC20` wrappers. - Handle `safeIncreaseAllowance`/`forceApprove` patterns as needed. ## Test and commit - Add tests using mock token without boolean return values. - Validate failures revert consistently. ## Example commit message - `refactor(contracts): migrate token flows to SafeERC20` ## Guidelines - Avoid unsafe blanket approvals. - Keep token address validation in place.
Standardize SafeERC20 usage for non-compliant tokens
Description
transfer/transferFromcalls can fail silently on non-standard tokens.Requirements and context
Suggested execution
SafeERC20wrappers.safeIncreaseAllowance/forceApprovepatterns as needed.Test and commit
Example commit message
refactor(contracts): migrate token flows to SafeERC20Guidelines