Security Researcher
contract DemoreXTess is SR { bool public DMsOpen; constructor() { DMsOpen = true; } }
High
Total
Medium
Total
Total Earnings
#236 All Time
Payouts
1st Places
2nd Places
Top 10
All
Sherlock
Code4rena
Cantina
CodeHawks
Mar '25
medium
medium
medium
medium
Feb '25
Jan '25
high
Some pod token transfers can be reverted unexpectedly
medium
Utilization rate change can be sandwiched in lending vault for profit
medium
Incorrect calculation of vault utilization value may cause loss of funds for the lending vault users in bad debt scenario
medium
Incorrect `minAnswer` check doesn't protect the protocol from massive price drops
medium
Malicious liquidator can intentionally leave dust amount of collateral and won't trigger bad debt handling
medium
Transaction may revert unexpectedly due to missing allowance for the lending pair asset
medium
Last position's liquidation price is incorrectly calculated
medium
All the burn and mint functions are impacted from incorrect _update handling if there is a fee
medium
aspToken price is incorrectly calculated when `hasSelfLendingPod` = true
Findings not publicly available for private contests.
Dec '24
Findings not publicly available for private contests.
Nov '24
Findings not publicly available for private contests.
Findings not publicly available for private contests.
Findings not publicly available for private contests.
Oct '24
Sep '24
medium
Aug '24
high
Wrong conversion from liquidity shares to assets causing loss of funds
high
Interest rate is not updated correct after debt repayment, it can cause higher borrowing rate
high
Incorrect Variable Usage in Liquidation Logic Can Prevent Positions from Being Fully Liquidated
high
Borrowing rate is dropping significantly due to wrong interest rate update
high
Vault's `totalAssets()` implementation causing wrong amount of share minting
high
Liquidated positions which is borrowed from NFT position manager can still earn rewards
medium
Inflation/donation attack is possible in current Vault implementation
high
TokenManager - Unlimited withdraw
high
Native token withdrawal fails until manually approved
high
Malicious user can drain protocol by bypassing `ASK` offer abortion validation in `Turbo` mode
medium
Unnecessary balance checks and precision issues in TokenManager::_transfer
low
[Low-01] Missing Access Control in `CapitalPool::approve()` Function Allows any User to call it to set Allowance Amount `TokenContract` to `type(uint256).max`.
low
3 `OfferStatus` are never used, and code seems to have contradicting intentions
Jul '24
Jun '24
Apr '24