Payouts
2nd Places
3rd Places
Top 10
All
Sherlock
Code4rena
CodeHawks
Jan '25
Nov '24
Oct '24
medium
Platform fees withdrawal will sweep oracle agents earned fees
medium
Users can list assets with price < 1 ERC20 (ETH, WETH), leading to potential DoS vulnerability.
medium
Update state requests or Purchase requests occurring at the end of the phase will not process
medium
BuyerAgent Batch Purchase Failure Due to Asset Transfer or Approval Revocation
Sep '24
Aug '24
May '24
Apr '24
Mar '24
Feb '24
high
Holders array can be manipulated by transferring or burning with amount 0, stealing rewards or bricking certain functions
medium
Withdrawal from NFTs can be temporarily blocked
medium
Distribution can be bricked, and double claims by a few holders are possible when owner calls `LiquidInfrastructureERC20::setDistributableERC20s`
high
Non-transferable `GameItems` can be transferred with `GameItems::safeBatchTransferFrom(...)`
medium
Minter / Staker / Spender roles can never be revoked`..,
medium
Burner role can not be revoked
medium
DoS in `MergingPool::claimRewards` function and potential DoS in `RankedBattle::claimNRN` function if called after a significant amount of rounds passed.
Jan '24
high
Attack to make ````CurveSubject```` to be a ````HoneyPot````
high
Unrestricted claiming of fees due to missing balance updates in `FeeSplitter`
high
Unauthorized Access to setCurves Function
medium
Protocol and referral fee would be permanently stuck in the Curves contract when selling a token
medium
onBalanceChange causes previously unclaimed rewards to be cleared
medium
Curves::_buyCurvesToken(), Excess of Eth received is not refunded back to the user.
medium
Withdrawing with amount = 0 will forcefully set name and symbol to default and disable some functions for token subject
medium
If a user sets their curve token symbol as the default one plus the next token counter instance it will render the whole default naming functionality obsolete
Dec '23
high
Looping over unbounded `pendingStakes` array can lead to permanent DoS and frozen funds
medium
Fees are hardcoded to 3000 in ExactInputSingleParams
low
Removal of approved token from token manager can lead to unintended liquidation of vaults
low
Users with Negligible TST Holdings Might Not Receive Their Share of EUROs Fees
Nov '23
Oct '23
high
Attacker can drain all ETH from AuctionDemo when block.timestamp == auctionEndTime
high
Attacker can reenter to mint all the collection supply
high
Adversary can block `claimAuction()` due to push-strategy to transfer assets to multiple bidders
medium
Auction payout goes to AuctionDemo contract owner, not the token owner
high
Lenders can escape the blacklisting of their accounts because they can move their MarketTokens to different accounts and gain the WithdrawOnly Role on any account they want
high
Borrower has no way to update `maxTotalSupply` of `market` or close market.
high
Borrower can drain all funds of a sanctioned lender
Sep '23
high
Users Lose Funds and Market Functionality Breaks When Market Reachs 65k Id
medium
Division before multiplication results in lower `dittoMatchedShares` distributed to users
low
Loss of precision in `twapPriceInEther` due to division before multiplication
low
Unlimited Approval Risk in BridgeSteth Contract
Jul '23
Jun '23
May '23
Apr '23
Feb '23
Jan '23