Payouts
1st Places
2nd Places
3rd Places
All
Sherlock
Code4rena
Aug '23
high
The settle feature will be broken if attacker arbitrarily transfer collateral tokens to the PerpetualAtlanticVaultLP
high
Put settlement can be anticipated and lead to user losses and bonding DoS
medium
User can avoid paying high premium price by correctly timing his bond call
medium
Change of `fundingDuration` causes "time travel" of `PerpetualAtlanticVault.nextFundingPaymentTimestamp()`
May '23
high
`ethOracle` in `StableOracleDAI` is `addr(0)`
high
No access control on `mintRebalancer()/burnRebalancer()`
high
Extra 1e18 scaling in `BuyUSSDSellCollateral()`
high
Need slippage control for rebalance swap
high
Spot price in `getOwnValuation()` could be manipulated
medium
`latestRoundData()` has no check for stale price and round completeness
medium
WBTC depeg risk
Apr '23
high
CHALLENGER_REWARD can be used to drain reserves and free mint
high
transfer position ownership to `addr(0)` to DoS `end()` challenge
medium
need alternative ways for fund transfer in `end()` to prevent DoS
medium
Challengers and bidders can collude together to restrict the minting of position owner
medium
POSITION LIMIT COULD BE FULLY REDUCED TO ZERO BY CLONES
high
Reward accounting is incorrect in BathBuddy contract
high
DOS of market operations with malicious offers
medium
Fee inclusivity calculations are inaccurate in RubiconMarket
medium
Calling `Position._marketBuy` and `Position._marketSell` functions that calculate `_fee` by dividing by `10000` can cause incorrect calculations
Mar '23
Feb '23
Jan '23
Dec '22
medium
Division by zero error can block RewardsPool#startRewardCycle if all multisig wallet are disabled.
medium
wrong reward distribution between early and late depositors because of the late syncRewards() call in the cycle, syncReward() logic should be executed in each withdraw or deposits (without reverting)
medium
Cancellation of minipool may skip MinipoolCancelMoratoriumSeconds checking if it was cancelled before
medium
Inflation rate can be reduce by half at most if it get called every 1.99 interval.
medium
Bypass `whenNotPaused` modifier
Findings not publicly available for private contests.
high
Malicious user can steal all assets in BondNFT
high
Incorrect Assumption of Stablecoin Market Stability
medium
Must approve 0 first
medium
Approved operators of Position token can't call Trading.initiateCloseOrder
medium
Centralization risks: owner can freeze withdraws and use timelock to steal all funds
medium
`BondNFT.sol#claim()` needs to correct all the missing epochs
medium
Unreleased locks cause the reward distribution to be flawed in BondNFT
medium
Chainlink price feed is not sufficiently validated and can return stale price
medium
Lock.sol: claimGovFees function can cause assets to be stuck in the Lock contract
Nov '22
high
Discrepency in the Uniswap V3 position price calculation because of decimals
medium
Fallback oracle is using spot price in Uniswap liquidity pool, which is very vulnerable to flashloan price manipulation
medium
Front-running admin setPrice call allows a single compromised oracle to set any price, allowing the oracle manipulator to drain all protocol funds
medium
During oracle outages or feeder outages/disagreement, the `ParaSpaceFallbackOracle` is not used
Oct '22
Sep '22
Aug '22
Jul '22
Jun '22