Payouts
Top 50
All
Code4rena
CodeHawks
Aug '23
Jul '23
high
Sandwich attack to steal all ERC-20 tokens in the Fees contract
high
Borrower can bypass maxLoanRatio's configuration of a pool via buyLoan()
high
[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control
high
Using forged/fake lending pools to steal any loan opening for auction
medium
The `borrow` and `refinance` functions can be front-run by the pool lender to set high interest rates
low
Zero address leads to transaction reverts
low
Lender fails to giveLoan because of inconsistent length between `loadIds` and `poolIds`
low
Missing Events Emitting
low
Loan can be seized during an auction
gas
Move the Duplicate Checks into a Modifier
gas
Unnecessary If condition in update() of Staking.sol
gas
For the borrow(), repay() & startAuction() functions in Lender.sol the public visibility modifiers should be changed to external, to help optimize gas usage
gas
[L-07] interface Staking.FeeDistribution is not used
gas
No use of Ownable in Staking contract.
gas
Incorrect Event Emmiting
3.12 USDC • 1 total finding • CodeHawks • leasowillow
#93