Payouts
1st Places
2nd Places
3rd Places
All
Sherlock
Code4rena
CodeHawks
Hats Finance
Jun '25
May '25
Apr '25
Jan '25
Jul '24
Jun '24
May '24
Apr '24
Feb '24
Jan '24
Dec '23
Nov '23
Oct '23
Sep '23
Aug '23
Jul '23
high
[H-04] Lender#buyLoan - Malicious user could take over a loan for free without having a pool because of wrong access control
high
Stealing any loan opening for auction through others' lending pool
high
Attacker can steal a loan's collateral and break the protocol
high
Fee on transfer tokens will cause users to lose funds
high
Rewards can be sabotaged by large deposit and withdraw
high
Hardcoded Router Address May Cause Token Lockup in Non-Standard Networks
medium
The `borrow` and `refinance` functions can be front-run by the pool lender to set high interest rates
medium
Single-step process for critical ownership transfer is risky
medium
Pragma non-specification can lead to non-functional / corrupted contract when deployed on Arbitrum
low
Zero address leads to transaction reverts
low
Lender fails to giveLoan because of inconsistent length between `loadIds` and `poolIds`
low
Amount != 0 checks are missing
gas
Multiple accesses of a mapping/array should use a local variable cache.
1.54 USDC • 2 total findings • CodeHawks • ptsanev
#126
2,077.98 USDC • 3 total findings • CodeHawks • ptsanev
#5