High
Total
Medium
Total
Total Earnings
#460 All Time
Payouts
2nd Places
Top 10
Top 25
All
Sherlock
Code4rena
Jan '25
Nov '24
Collaborative Audit • Sherlock • juan
Jul '24
Apr '24
high
The amount of `xezETH` in circulation will not represent the amount of `ezETH` tokens 1:1
high
Incorrect withdraw queue balance in TVL calculation
high
Withdrawals logic allows MEV exploits of TVL changes and zero-slippage zero-fee swaps
high
DOS of `completeQueuedWithdrawal` when ERC20 buffer is filled
medium
stETH/ETH Feed being used opens up to 2 way deposit<->withdrawal arbitrage
high
Malicious users can exploit a flaw in `mintBatch()` to mint large amounts of tokens, with very little cost
medium
Roles within any `Edition` contract can never be granted/revoked
medium
Signature malleability- anyone can acknowledge or unacknowledge an edge from someone else's node
medium
A malicious user can DoS the `acknowledgeEdge` and `unacknowledgeEdge` function by front-running
medium
The excess funds sent to Edition will be lost, since `_refundExcess` has a logical flaw
medium
`Edition.mintBatch()` will always revert due to using `msg.value` in a loop
Mar '24
high
V3Utils.execute() does not have caller validation, leading to stolen NFT positions from users
high
Owner of a position can prevent liquidation due to the 'onERC721Received' callback
medium
AutoRange execution can be front-ran to avoid protocol fee, causing loss for protocol
medium
Repayments and liquidations can be forced to revert by an attacker that repays miniscule amount of shares
medium
Incorrect liquidation fee calculation during underwater liquidation, disincentivizing liquidators to participate
Feb '24
medium
Complete DoS of every DVP's minting and burning, due to insufficient access controls within FeeManager::trackVaultFee.
medium
The refunding feature in the PositionManager contract will always revert due to insufficient approval
medium
Whenever swapPrice > oraclePrice, minting via PositionManager will revert, due to not enough funds being obtained from user.
Jan '24
high
A malicious user can bypass limit order trading fees via cross-function re-entrancy
high
During liquidation, global position data is updated with the wrong price
high
A user can bypass the locking of tokens in announced orders, by unlocking it in the LimitOrder contract
high
Incorrect underflow-prevention logic when updating `marginDepositedTotal` which can lead to underflow and brick the system
Nov '23
Collaborative Audit • Sherlock • juan