
Payouts

1st Places

3rd Places

Top 10
All
Sherlock
Code4rena
Cantina
Jan '26
Findings not publicly available for private contests.
Nov '25
high
medium
Sep '25
high
`TokenRewardInfo::lastRewardIndex` is also updated in the `SuperDCAStaking::stake(...)` along with the global index without minting the rewards for that period.
high
Protocol does not support ETH as a pool token
high
`SuperDCAGuage` can be used in the different pool to steal the rewards of the listed NFP's pool
medium
`SuperDCACashback` does not support USDC with different decimals than 6
medium
New mint rate is set in the `SuperDCAStaking` without updating the global `rewardIndex`
May '25
high
high
high
medium
medium
Apr '25
Mar '25
medium
Feb '25
Jan '25
high
The calculation of `totalAssets()` could be wrong if `operatorFeeAmount` > 0, this can cause potential loss for the new depositors
medium
User can earn rewards by frontrunning the new rewards accumulation in Ron staking without actually delegating his tokens
medium
Incorrect Logic in onlyOperator Modifier Leading to Denial-of-Service for Authorized Operators Across Critical Functions
high
high
high
high
high
high
high
high
medium
high
high
high
medium
medium
Nov '24
94.59 USDC • 1 total finding • Sherlock • Aamirusmani1552

Aug '24
high
medium
medium
medium
medium
Jul '24
May '24
medium
medium
Apr '24
high
Design flaw and mismanagement in vault licensing leads to double counting in collateral ratios and positions collateralized entirely with kerosine
high
Kerosene collateral is not being moved on liquidation, exposing liquidators to loss
high
User can get their Kerosene stuck because of an invalid check on withdraw
high
Unable to withdraw Kerosene from `vaultmanagerv2::withdraw` as it expects a `vault.oracle()` method which is missing in Kerosene vaults
medium
No incentive to liquidate small positions could result in protocol going underwater
medium
Incorrect deployment / missing contract will break functionality
Mar '24
Feb '24
high
Malicious user can stake an amount which causes zero curStakeAtRisk on a loss but equal rewardPoints to a fair user on a win
high
A locked fighter can be transferred; leads to game server unable to commit transactions, and unstoppable fighters
high
Since you can reroll with a different fighterType than the NFT you own, you can reroll bypassing maxRerollsAllowed and reroll attributes based on a different fighterType
high
Players have complete freedom to customize the fighter NFT when calling `redeemMintPass` and can redeem fighters of types Dendroid and with rare attributes
high
Fighters cannot be minted after the initial generation due to uninitialized `numElements` mapping
high
Non-transferable `GameItems` can be transferred with `GameItems::safeBatchTransferFrom(...)`
Jan '24
high
When `DecentBridgeExecutor.execute` fails, funds will be sent to a random address
high
Users will lose their cross-chain transaction if the destination router do not have enough WETH reserves.
high
Anyone can update the address of the Router in the DcntEth contract to any address they would like to set.
high
`StakingRewardsManager::topUp(...)` Misallocates Funds to `StakingRewards` Contracts
high
`CouncilMember::burn()` does not update states correctly leading to the loss of tokens to the council members.
medium
Sablier stream update in `CouncilMember.sol` can cause loss of funds if the streamed balance is not withdrawn.
Dec '23
Nov '23
Sep '23
Aug '23