Table of Contents Table of Contents Summary Scope System OverviewPEG-IN Process PEG-OUT Process Security Model and Trust AssumptionsPrivileged Roles High SeverityMalicious Owner Can Mint Wrapped BTC From Arbitrary Bitcoin Transactions Medium SeverityPotential Loss of Wrapped BTC Malicious Owner Can Mint to a Random Recipient Low SeverityFunctions Updating State Without Event Emissions Missing Docstrings Potential Loss of Ownership During Transfers Missing _disableInitializers Notes & Addition...