High
Total
Medium
Solo
Total
Total Earnings
#430 All Time
Payouts
2nd Places
Top 10
Top 25
All
Sherlock
CodeHawks
Feb '25
Oct '24
Sep '24
medium
Remove splitter will always revert if there are some rewards left on splitter contract
medium
Removed vaults still remain valid in `OperatorVCS`
medium
[WithdrawalPool.sol] Prevent efficient return of data in getBatchIds() by blocking updateWithdrawalBatchIdCutoff() update of newWithdrawalIdCutoff
medium
Principal amount of removed operator get's stuck in Chainlink's Staking Contract forever
low
No way to update unbonding and claim periods
low
The total amount to be distributed can be manipulated
low
Attacker Can Reset the Unbonding Period for Vaults in `globalState.curUnbondedVaultGroup`, Preventing User Withdrawals
low
Incorrect `nextGroupTotalUnbonded` Calculation in `FundFlowController::_getVaultUpdateData` Includes Non-grouped Vaults, Leading to Potential Withdrawal and Deposit Errors
Aug '24
high
Incorrect set up and logic of `referralInfoMap` in `SystemConfig::updateReferrerInfo` function
high
Taker of bid offer will loss assets without any benefit if he calls the DeliveryPlace::settleAskMaker() for partial settlement.
high
Formulaic Error Rounds Down Causing Total Loss Of Funds For Bid Takers During Abort
high
Malicious user can drain protocol by bypassing `ASK` offer abortion validation in `Turbo` mode
high
The `DeliveryPlace::settleAskTaker()` function mistakenly uses `makerInfo.tokenAddress` to update the `TokenBalanceType.PointToken` in the `userTokenBalanceMap` mapping, leading to a critical error.
high
Fund Withdrawal Flaw in preMarket Allows Users to Avoid Settlement Obligations
medium
Unnecessary balance checks and precision issues in TokenManager::_transfer
medium
`mulDiv()` can round down to 0 in realistic cases, allowing for tax avoidance
Jul '24
high
Inadequate Checking of `isIncreasing` when trader adjusts position size
high
`SettlementBranch._fillOrder` does not guarantee the collateral of a position is enough to pay the future liquidation fee.
high
Incorrect logic for checking isFillPriceValid
high
Market Disruption and Financial Loss Post-Liquidation
low
QA Report - 0xStalin - Low Severities
low
Attacker can abuse the system by modifying the collateral of pending orders
low
payable Modifier in TradingAccountBranch::createTradingAccountAndMulticall
low
When transfering the NFT associated to a TradingAccount, the old owner can grief the new owner by leaving an opened MarketOrder that will be executed even though the old owner is not the owner of the TradingAccount.
low
Users can be overcharged for orderFees
May '24
high
Loss of Funds to Protocol Due Incorrect Report of Repaid Borrowed Margin
high
Incorrect Margin Balance Update Leads to Loss of Funds
high
Sybil attacker to claim more reward fee
high
Insufficient input validation allows attacker to steal funds by increasing the value of their account
high
Accounting error due to Execution fee being charged to wrong vault
medium
collateralUserCap is Broken Due Incorrect check
medium
Use of outdated liability value in decreasePosition leads to account error
Dec '23