Payouts
2nd Places
Top 10
Top 25
All
Sherlock
Cantina
CodeHawks
Jul '25
May '25
medium
medium
Apr '25
Jan '25
high
high
high
high
high
Incorrect Credit Capacity Validation in `VaultRouterBranch.redeem` Enables Locked Collateral Drainage
high
Underflow when updating credit delegation will result protocol DoS
high
Vaults weth reward is not distributed correctly
high
Incorrect Debt Check in `CreditDelegationBranch::settleVaultsDebt` Function
high
Total market debt > 0 when credit deposits > netusdissuance which breaks key protocol logic
high
Incorrect calculation in CreditDelegationBranch::withdrawUsdTokenFromMarket allows attacker mint any amount of usdz
high
Incorrect vault debt validation logic in rebalanceVaultsAssets causes reverts
high
UsdTokenSwapConfig::Data::usdcAvailableForEngine Increases but Never Used, Locking USDC Forever
medium
No way to set UsdTokenSwapConfig pd curve parameters
medium
`Market::configureConnectedVaults` Will Always Fail with Array Out of Bounds Error
medium
Incorrect weight assignment in Vault::updateVaultAndCreditDelegationWeight leads to overleveraging vault positions and insolvency
medium
Attacker can manipulate the amount of output tokens of users in ZlpVault
medium
CreditDelegationBranch::depositCreditForMarket cannot update market realized debt properly
medium
FeeConversionKeeper::performUpkeep May Exceed Gas Limit Due to Vault Updates
low
BaseAdapter::__BaseAdapter_init Should Use onlyInitializing, Not initializer
low
ZlpVault Does Not Fully Implement ERC-4626
low
VaultRouterBranch::getVaultCreditCapacity does not take zero return into account
low
Chainlink Keeper Cannot Process All Swap Logs in a Block
Dec '24
high
Critical: Malicious user can delete all Users Deposited Liquidity.
high
Slight miscalculation in maxAmountsIn for Admin Fee Logic in UpliftOnlyExample::onAfterRemoveLiquidity Causes Lock of All Funds
high
Owner fee will be locked in `UpliftOnlyExample` contract due to incorrect recipient address in `UpliftOnlyExample::onAfterSwap`
medium
Missing initialize Function in UpliftOnlyExample Hook/Router
low
Inconsistent timestamp storage when the LPNFT is transferred.
high
Possible hash collision when creating order
high
A malicious user can steal all funds from `Bracket`, `StopLimit` and `OracleLess` contract
medium
Possible DoS in `AutomationMaster::getExchangeRate`
medium
`SafeERC20.safeApprove` reverts for changing existing approvals
medium
`PythOracle::currentValue` does not work as expected
Nov '24