Payouts
1st Places
3rd Places
Top 10
All
Sherlock
Code4rena
Cantina
CodeHawks
Feb '25
Jan '25
medium
Dec '24
Nov '24
Oct '24
high
medium
medium
Sep '24
Aug '24
Jul '24
high
`mintToken()`, `mintWithBudget()`, and `forge()` in the `TraitForgeNft` Contract Will Fail Due to a Wrong Modifier Used in `EntropyGenerator.initializeAlphaIndices()`
high
The maximum number of generations is infinite
high
Wrong minting logic based on total token count across generations
medium
A dev will lose rewards if after claiming his rewards he mints an NFT
medium
Forger Entities can forge more times than intended
medium
Pause and unpause functions are inaccessible
medium
Lack of ability to make an some external function calls makes the DAO stage unreachable.
medium
Incorrect check against golden entropy value in the first two batches
May '24
Apr '24
high
Attacker can make 0 value deposit() calls to deny user from redeeming or withdrawing collateral
high
Design flaw and mismanagement in vault licensing leads to double counting in collateral ratios and positions collateralized entirely with kerosine
high
User can get their Kerosene stuck because of an invalid check on withdraw
high
Unable to withdraw Kerosene from `vaultmanagerv2::withdraw` as it expects a `vault.oracle()` method which is missing in Kerosene vaults
medium
No incentive to liquidate small positions could result in protocol going underwater
medium
Incorrect deployment / missing contract will break functionality
Mar '24
Feb '24
high
A locked fighter can be transferred; leads to game server unable to commit transactions, and unstoppable fighters
high
Since you can reroll with a different fighterType than the NFT you own, you can reroll bypassing maxRerollsAllowed and reroll attributes based on a different fighterType
high
Players have complete freedom to customize the fighter NFT when calling `redeemMintPass` and can redeem fighters of types Dendroid and with rare attributes
high
Non-transferable `GameItems` can be transferred with `GameItems::safeBatchTransferFrom(...)`
medium
Fighter created by mintFromMergingPool can have arbitrary weight and element
Jan '24
Dec '23
Oct '23
Sep '23
Jul '23
high
During refinance() new Pool balance debt is subtracted twice
high
[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control
high
Using forged/fake lending pools to steal any loan opening for auction
low
Zero address leads to transaction reverts
low
Buying a loan always reverts at the start of an auction
gas
Multiple accesses of a mapping/array should use a local variable cache.
63.35 USDC • 2 total findings • CodeHawks • 0xlemon
#34