Payouts
1st Places
Top 10
Top 25
All
Sherlock
Jan '25
Dec '24
high
users can pass arbitrary strike price as parameter to Borrowing::depositTokens
high
Users can use signatures multiple time that has been generated by the admin in borrowing contract
high
malicious actors can drain treasury
high
There isn't any force for users to call `Borrowing::renewOptions`
medium
BorrowLib::borrowerDebt will be computed based on stale cumulative rate
medium
hasDeposited remain true when depositedAmountInETH is zero
medium
Borrowing::liquidate will be reverted
medium
synthetixPerpsV2.transferMargin will be reverted because of insufficient token amount
medium
sUSDs will be stuck in Synthetix
medium
multiSign::executeSetterFunction can be call by anyone
medium
users can pass arbitrary volatility as parameter to Borrowing::depositTokens and change option fee in favor of themself
medium
legitimate users cannot withdraw their assets from CDS contract
medium
dust amounts will be removed in OFT tokens
Nov '24
94.59 USDC • 1 total finding • Sherlock • pashap9990
Oct '24
Aug '24
Jul '24
456.02 USDC • 4 total findings • Sherlock • pashap9990
#11
May '24
high
Users can manipulate their balance without any cost
high
Stakers cannot redeem their funds
high
stakers loss their reward if they redeem their xToken
medium
User can deposit more than collateral user capacity
medium
lossFee always will be zero in process execution fee
medium
Users loss their payed executionFee if the protocol calls autoReducePositions function
medium
autoReducePositions function can has significant losses for the protocol
Apr '24