Payouts
Top 10
Top 25
Top 50
All
Sherlock
Code4rena
CodeHawks
Nov '24
Jul '24
high
Double voting is possible if the user withdraws and reopens a position within the voting duration.
medium
`harvestPositionTo` should always send rewards to owner of NFT.
medium
Loss of reward if `emergencyWithdraw` is called
medium
Malicious users can exploit the bribe mechanism by awarding worthless tokens as a bribe and reaching the max bribe limit.
medium
`BribeRewarder` will not handle fee-on-transfer tokens
Jun '24
Apr '24
high
Rewards in `LenderCommitmentGroup_Smart` is sandwichable.
high
The return value of arbitrary ERC20 tokens transfers is not checked.
high
The liquidator will not receive the collateral after liquidation.
medium
`LenderCommitmentGroup_smart` does not support Fee on Transfer tokens
medium
`OwnableUpgradeable` is not initialized in `LenderCommitmentGroup_Smart`
high
Double counting of the vote is possible in `ZivoeRewardVesting:revokeVestingSchedule` breaking the protocol core invariant.
high
Incorrect Accounting of `_totalSupply` and `_totalSupplyCheckpoints` in `zivoeStakingRewards:revokeVestingSchedule` can cause DOS.
high
Malicious actor can call `ZivoeRewards:depositReward` with 1 wei many times increase the reward’s `periodFinish` making the contract unusable..
medium
`OCL_ZVE:pushToLockerMulti ` will likely revert because of allowance check.
Jan '24
high
When borrowers repay USDS, it is sent to the wrong address, allowing anyone to burn Protocol Owned Liquidity and build bad debt for USDS
high
User can evade `liquidation` by depositing the minimum of tokens and gain time to not be liquidated
medium
Remove Liquidity has missing reserve1 DUST check, which can make reserve1 to be less than DUST
medium
Reusing a SALT that has already been used for voting can allow a malicious proposal to pass and compromise the protocol.
Dec '23
Oct '23
medium
The protocol will mint unnecessary fees if the vault is paused and reopened later.
medium
Wrong hardcoded PnL factor is used in all GMXVault add liquidity operations
low
Unhandled DoS when access to Chainlik oracle is blocked
low
`processDeposit()` can cause a DoS if equityAfter is 0 and equityBefore > 0.
Sep '23
Aug '23
Jul '23
high
Sandwich attack to steal all ERC-20 tokens in the Fees contract
high
Using forged/fake lending pools to steal any loan opening for auction
high
Fee on transfer tokens will cause users to lose funds
high
update() not getting called right after a WETH amount has been sent will cause users to lose staking rewards
high
Rewards can be sabotaged by large deposit and withdraw
medium
The `borrow` and `refinance` functions can be front-run by the pool lender to set high interest rates
gas
Floating pragma in all contracts
gas
Misspelled event in `Lender.sol`