Payouts
All
CodeHawks
Aug '23
Jul '23
high
[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control
high
Using forged/fake lending pools to steal any loan opening for auction
high
Fee on transfer tokens will cause users to lose funds
medium
Single-step process for critical ownership transfer is risky
gas
Uncheck Arithmetic where overflow/underflow impossible
gas
Use if + custom errors instead of using require + string
gas
Unbounded loop in Lender.sol functions may revert.
gas
Lender.sol: The error being `PoolConfig` in most cases is completely a downside of protocol as users can't know the reasons to why their transaction failed
gas
Repeated code
gas
Use unchecked for collateral
medium
staleCheckLatestRoundData() does not check the status of the Arbitrum sequencer in Chainlink feeds.
medium
Too many DSC tokens can get minted for fee-on-transfer tokens.
low
Zero address check for tokens
gas
using x=x+y /x=x-y is more gas efficient than x+=y / x-=y
gas
`++i`/`i++` should be `unchecked{++i}`/`unchecked{i++}` when it is not possible for them to overflow, as is the case when used in `for`- and `while`-loops
gas
The nonReentrant modifier should occur before all other modifiers
gas
collateral and debt to cover not validated