Payouts
2nd Places
Top 10
Top 25
All
Sherlock
Cantina
CodeHawks
Jan '25
high
high
high
high
high
Incorrect Credit Capacity Validation in `VaultRouterBranch.redeem` Enables Locked Collateral Drainage
high
Underflow when updating credit delegation will result protocol DoS
high
Vaults weth reward is not distributed correctly
high
Incorrect Debt Check in `CreditDelegationBranch::settleVaultsDebt` Function
high
Total market debt > 0 when credit deposits > netusdissuance which breaks key protocol logic
high
Incorrect calculation in CreditDelegationBranch::withdrawUsdTokenFromMarket allows attacker mint any amount of usdz
high
Incorrect vault debt validation logic in rebalanceVaultsAssets causes reverts
high
UsdTokenSwapConfig::Data::usdcAvailableForEngine Increases but Never Used, Locking USDC Forever
medium
No way to set UsdTokenSwapConfig pd curve parameters
medium
`Market::configureConnectedVaults` Will Always Fail with Array Out of Bounds Error
medium
Incorrect weight assignment in Vault::updateVaultAndCreditDelegationWeight leads to overleveraging vault positions and insolvency
medium
Attacker can manipulate the amount of output tokens of users in ZlpVault
medium
CreditDelegationBranch::depositCreditForMarket cannot update market realized debt properly
medium
FeeConversionKeeper::performUpkeep May Exceed Gas Limit Due to Vault Updates
low
BaseAdapter::__BaseAdapter_init Should Use onlyInitializing, Not initializer
low
ZlpVault Does Not Fully Implement ERC-4626
low
VaultRouterBranch::getVaultCreditCapacity does not take zero return into account
low
Chainlink Keeper Cannot Process All Swap Logs in a Block
Dec '24
high
Critical: Malicious user can delete all Users Deposited Liquidity.
high
Slight miscalculation in maxAmountsIn for Admin Fee Logic in UpliftOnlyExample::onAfterRemoveLiquidity Causes Lock of All Funds
high
Owner fee will be locked in `UpliftOnlyExample` contract due to incorrect recipient address in `UpliftOnlyExample::onAfterSwap`
medium
Missing initialize Function in UpliftOnlyExample Hook/Router
low
Inconsistent timestamp storage when the LPNFT is transferred.
high
Possible hash collision when creating order
high
A malicious user can steal all funds from `Bracket`, `StopLimit` and `OracleLess` contract
medium
Possible DoS in `AutomationMaster::getExchangeRate`
medium
`SafeERC20.safeApprove` reverts for changing existing approvals
medium
`PythOracle::currentValue` does not work as expected
Nov '24