Payouts
1st Places
2nd Places
Top 10
All
Code4rena
Cantina
Jul '24
high
Invalid DISPUTED_L2_BLOCK_NUMBER is passed to VM
medium
Honest party's move could become invalid when re-org takes place
medium
In some cases, proper CLOCK_EXTENTSION time cannot be ensured to generate the initial instruciton trace
medium
Attacker can continuously create games for not yet safe l2 blocks to prevent the update of anchor state
May '24
Nov '23
medium
Oct '23
high
Attacker can drain all ETH from AuctionDemo when block.timestamp == auctionEndTime
high
Attacker can reenter to mint all the collection supply
medium
On a Linear or Exponential Descending Sale Model, a user that mint on the last `block.timestamp` mint at an unexpected price.
medium
Artist signatures can be forged to impersonate the artist behind a collection
Aug '23
Jul '23
high
[HF06] `BaseTOFT.sol`: `retrieveFromStrategy` can be used to manipulate other user's positions due to absent approval check.
high
[HF08] `BaseTOFTLeverageModule.sol`: `leverageDownInternal` tries to burn tokens from wrong address
high
Incorrect formula used in function `Market.computeClosingFactor()`
high
Refund mechanism for failed cross-chain transactions does not work
high
Ability to steal user funds and increase collateral share infinitely in BigBang and Singularity
high
The BigBang contract take more fees than it should
medium
`BaseTOFTSTrategyModule.strategyWithdraw()` cross chain call will fail due to missing approvals
medium
User could be forced to withdraw more amount than desired when calling `retrieveFromStrategy`
medium
`multiHopSell` and `multiHopBuy` can be frontrunned with high slippage tolerance
medium
The twTAP multiplier can be compromised with manipulated deposits of low value cost and high duration
medium
SGLLendingCommon.sol: The totalBorrowCap validation is incorrect
Jun '23
May '23
high
Ulysses omnichain - RetrieveDeposit might never be able to Trigger the Fallback function
high
`UlyssesToken` asset ID accounting error
high
Malicious user can set any contract as local hToken for an underlying since there is no access control for "_addLocalToken"
high
Attacker can redeposit gas after "forceRevert()" to freeze all deposited gas budget of Root Bridge Agent
high
Missing unwrapping of native token in RootBridgeAgent.sweep() causes fees to be stuck
high
User can bypass bandwidth limit by repeatedly "balancing" the pool
high
Attacker can exploit "deposit" to drain Ulysess Liquidity Pool
high
Reentrancy attack possible on `RootBridgeAgent.retrySettlement()` with missing access control for `RootBridgeAgentFactory.createBridgeAgent()`
high
User underpay for the remote call execution gas on root chain
high
Attacker can steal Accumulated Awards from RootBridgeAgent by abusing retrySettlement()
high
`RootBridgeAgent->CheckParamsLib#checkParams` does not check that `_dParams.token` is underlying of `_dParams.hToken`
high
Due to inadequate checks, Adversary can call `BranchBridgeAgent#retrieveDeposit` with an invalid `_depositNonce`, which would lead to loss of other users' deposit.
high
Use of slot0 to get sqrtPriceLimitX96 can lead to price manipulation.
high
Cross-chain messaging via Anycall will fail
medium
Incorrect accounting logic for fallback gas will lead to insolvency
medium
User can "callOutSigned" without paying for gas by reentering "anyExecute" with virtual account
medium
RestakeToken function is not permissionless
medium
deposit gas through depositGasAnycallConfig should not withdraw the nativeToken
medium
`RootBridgeAgent.redeemSettlement` can be front-run using `RootBridgeAgent.retrySettlement` causing redeem DoS