Payouts
1st Places
2nd Places
3rd Places
All
Sherlock
Code4rena
Cantina
CodeHawks
Hats Finance
May '25
Apr '25
medium
medium
Mar '25
medium
Feb '25
high
The verifyBatchSignatures function may trigger an index out-of-range panic for consensus nodes, due to missing lower-bound check
high
Attacker can frontrun unstake calls to manipulate withdrawals
high
postBatch doesn’t check for duplicate signatures resulting in being able to overcome the consensus threshold
high
Multiple Delegation by Double Spending Boosts and Lack of Delegation Tracking in BoostController Contract
high
ZENO Token Redemption Returns Negligible USDC Amount Compared to Purchase Price
high
Multiple issues from unnecessary balance increase calculation in DebtToken.mint
high
Incorrect Reward Claim Logic in FeeCollector::claimRewards Causes Denial of Service
high
Incorrect Debt Scaling Leading to Protocol Solvency Risk
high
Treasury Balance Tracking Bypass in FeeCollector
high
Ineffective Time-Weighted Average Implementation in Fee Distribution
medium
Missing StabilityPool Integration in `mintRewards` Function
medium
Incorrect Return Values and Double Scaling in `RToken.burn` Function Leads to Denial of Service
medium
Using balanceOf Instead of Voting Power
medium
Workingsupply would always be overwritten in boostcontroller.sol impacting reward calculations
medium
Permanent boost inflation through delegation removal in Boostcontroller.sol
medium
Inconsistent Scaling in RToken Transfer Functions
medium
[L-1] Inaccurate boost calculations in `veRAACToken` due to wrong input parameter
medium
Failure to update `lastClaimTime` mapping when users claim rewards in FeeCollector Causes Time-Based Reward Calculation Issues
medium
RAACToken burns less tokens than expected when feeCollector is unset
medium
Incorrect boost calculation in `BoostController#_calculateBoost()` can be exploited to gain an unfair advantage in reward distribution
medium
Flawed Boost Multiplier Calculation Always Yields Maximum Boost
medium
Misuse of Raw vs. Normalized Values in Utilization Rate Calculation
medium
Users Cannot Remove Their Own Boost Delegation, Causing Potential Lock-In
medium
The earned yield from the Curve vault can never be utilized when withdrawing or borrowing
low
`mint` function in RToken contract doesn't return the correct expected values, leading to emission of ReserveLibrary `Deposit` event and LendingPool `Deposit` event with incorrect values.
low
Limited veRaac Token Supply Triggers DoS, Hampering Proper Governance Participation.
low
Unauthorized Vote Casting Vulnerability
low
Incorrect Initialization of minBoost in BaseGauge Constructor Breaks Core Contract Functionality
low
Missing Pause Functionality in veRAACToken Contract Can Be Abused When Emergency Withdrawal Mechanism Is Activated
low
`FeeCollector::updateFeeType` wrong fee share validation leads to impossible update for some fee types
low
Inadequate Emergency Shutdown Role Enforcement in RAACMinter: Denial of Service in Emergency Response
low
Hardcoded Emission Values Lead to Incorrect Reward Calculations
low
Misleading NatSpec and Ambiguous Access Control in `setHousePrice` Function
low
`emergencyUnlockEnabled` Is Never Used, Rendering “Emergency Unlock” Ineffective
low
`collateralLiquidated` value is always 0 when emitted in the `LiquidationFinalized` event
low
Incorrect Gauge Weight Emission in BoostController Vote Function
low
Indefinite Extension of Delegation in function delegateBoos() in BoostController.sol
low
Inaccurate Execution Time Reporting in Proposal Execution Revert
Jan '25
high
high
high
medium
medium
Nov '24
Findings not publicly available for private contests.
Oct '24
medium
Platform fees withdrawal will sweep oracle agents earned fees
medium
Request responses and validations can be mocked leading to extraction of fees and/or forcing other generators to lose their fees by making them outliers
medium
Users can list assets with price < 1 ERC20 (ETH, WETH), leading to potential DoS vulnerability.
low
Lack of output validation in `LLMOracleCoordinator::respond` allows empty responses and potential fee exploitation by oracles.
low
`LLMOracleCoordinator::request` lacks a check for non-empty `task.input`, making `assertValidNonce` easier to pass due to reduced uniqueness
Sep '24
Jul '24