Payouts
3rd Places
Top 10
Top 25
All
Sherlock
Code4rena
Cantina
May '25
medium
high
medium
high
high
high
high
high
high
high
high
medium
Apr '25
medium
Mar '25
high
Feb '25
Dec '24
Nov '24
high
Oct '24
medium
medium
Aug '24
Jul '24
May '24
Apr '24
high
`executeWithdraw` may be blocked if any of the users are blacklisted from the `baseToken`
medium
Attacker can increase the length of `withdrawQueue` by withdrawing 0 amount of tokens frequently
medium
AccountingManager has no correct implementations of the core ERC-4626 functions `deposit`, `mint`, `withdraw` and `redeem`
medium
Missing calls to `_updateTokenInRegistry` leads to incorrect state of tokens in registry
medium
First depositor can make subsequent depositor lose all of her or his deposit
medium
Lack of Slippage Controls in retrieveTokensForWithdraw Function
medium
`maxDeposit`, `maxMint`, `maxWithdraw`, and `maxRedeem` functions do not return 0 when they should
medium
`depositQueue.queue` in `AccountingManager` can be flooded causing a DoS
medium
Using the same heartbeat for multiple price feeds
high
Attacker can make 0 value deposit() calls to deny user from redeeming or withdrawing collateral
high
Design flaw and mismanagement in vault licensing leads to double counting in collateral ratios and positions collateralized entirely with kerosine
high
Kerosene collateral is not being moved on liquidation, exposing liquidators to loss
medium
Incorrect deployment / missing contract will break functionality
Mar '24
high
Owner of a position can prevent liquidation due to the 'onERC721Received' callback
medium
Dangerous use of deadline parameter
medium
Repayments and liquidations can be forced to revert by an attacker that repays miniscule amount of shares
medium
V3Vault is not ERC-4626 compliant
medium
No `minLoanSize` means liquidators will have no incentive to liquidate small positions
medium
Protocol can be repeatedly gas griefed in `AutoRange` external call
Feb '24
Jan '24
medium
Adversary can prevent updating price feed addresses by creating poisonous proposals ending in `_confirm`
medium
Unwhitelisting does not clear _arbitrageProfits, so re-whitelisting may result in an unfair distribution of liquidity rewards.
medium
Reusing a SALT that has already been used for voting can allow a malicious proposal to pass and compromise the protocol.
medium
Creation of token whitelisting proposals can be DOS'd
Dec '23
Nov '23
Oct '23