Datasets:
Tasks:
Text Classification
Modalities:
Text
Formats:
json
Languages:
English
Size:
10K - 100K
License:
type stringclasses 2
values | source stringclasses 4
values | report stringclasses 1
value | contract stringclasses 1
value | severity stringclasses 3
values | contract_url stringclasses 31
values | findings listlengths 0 0 ⌀ | repo stringclasses 127
values | title stringlengths 4 407 ⌀ | body stringlengths 47 3k ⌀ | url stringlengths 60 86 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|
confirmed_finding | immunefi_bounty | ## [HIGH] Predictable Randomness in Yeetback Winner Selection
### Summary
The `restart()` function accepts a user-controlled `userRandomNumber` parameter that directly determines yeetback winners. An attacker can pre-compute the winning number and guarantee they receive the yeetback pot.
### Vulnerability Detail
In `... | // SPDX-License-Identifier: AGPL-3.0-or-later
/*
* Copyright (C) 2024 Squangleding Corporation
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
... | HIGH | null | null | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Mint-Claw/content-split/issues/1 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Mint-Claw/market-monitor/issues/1 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Dapp-Learning-DAO/DLIP/issues/137 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/sherlock-audit/2024-06-new-scope-judging/issues/402 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/FreeCAD/FPA-grant-proposals/issues/72 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/74 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/71 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/53 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/49 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/FreeCAD/FPA-grant-proposals/issues/61 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/FreeCAD/FPA-grant-proposals/issues/47 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/31 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/25 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/23 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/numfocus/small-development-grant-proposals/issues/21 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/FreeCAD/FPA-grant-proposals/issues/44 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/davedumto/LancePay/issues/269 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/davedumto/LancePay/issues/240 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/hummingbot/hummingbot/issues/8046 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/applefather-eth/applefather.xyz/issues/1 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Scottcjn/rustchain-bounties/issues/369 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Scottcjn/rustchain-bounties/issues/367 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/bolivian-peru/baozi-openclaw/issues/40 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/ZcashCommunityGrants/zcashcommunitygrants/issues/220 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/hummingbot/hummingbot/issues/8028 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Satianurag/algolia-challenge/issues/14 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/Satianurag/algolia-challenge/issues/13 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/JordanKotsop/context-dao/issues/14 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/paritytech/polkadot-sdk/issues/11100 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/bolivian-peru/marketplace-service-template/issues/91 | [] | null | null | null | null |
slither_candidate | code4rena_immunefi | null | null | unknown | https://github.com/flexyledger/defi-yield-aggregator/issues/54 | [] | null | null | null | null |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | Disabled SphereXEngine Proctection. | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L61
# Vulnerability details
## Impact
In WildcatArchController.sol file "WildcatArchController" contract constructor is passing "SphereXEngine's" engine address = 0 which will d... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/107 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | `WildcatArchController::updateSphereXEngineOnRegisteredContracts` will never execute because `sphereXEngine` is set as `address(0)` and never updated. | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L84
# Vulnerability details
## Impact
The `WildcatArchController::updateSphereXEngineOnRegisteredContracts` updates SphereX engine on registered contracts and add them as allowe... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/99 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | Markets do not update delinquency timer correctly if the account goes underwater through interest accrual | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketBase.sol#L406-L465
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketBase.sol#L541-L542
# Vulnerability details
## Imp... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/89 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | debit owned by borrower not cleared after full repayment of loan | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarket.sol#L226
# Vulnerability details
Current implementation lacks the mechanism to clear borrowers debt either by full repayment of debt owned or closing of market .
This is problematic... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/75 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | WildcatSanctionsSentinel:: createEscrow allows unregistered market to used to create escrow | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatSanctionsSentinel.sol#L121
# Vulnerability details
In `WildcatSanctionsSentinel.sol`, the `createEscrow()` function has two issues :
- There is currently no check that `msg.sender` is a regis... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/65 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | User could withdraw more than supposed to, forcing last user withdraw to fail | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketWithdrawals.sol#L248
# Vulnerability details
## Impact
User could withdraw more than supposed to and force last user's withdraw to fail.
## Proof of Concept
Within Wildcat, withdraw requests are put into batches. Users ... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/64 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | `SphereXConfig::constructor` argument `engine` set as `0` in `WildcatArchController::constructor` will prevent key `WildcatArchController` functions from from executing | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L61
# Vulnerability details
## Details
In `WildcatArchController::constructor` the `SphereXConfig` is initialiazed by providing its `constructor` arguments as so
```
//src/Wild... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/58 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | `state.scaleFactor` is calculated incorrectly when handling the current expired withdrawal batch | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketBase.sol#L409-L431
# Vulnerability details
## Impact
- The amount of assets paid for the current expired withdrawal batch is less than expected
- The amount of reserved assets for unpaid withdrawal batches is insufficien... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/54 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | lenders are unable to get full repayment amount | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketWithdrawals.sol#L251
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketWithdrawals.sol#L247
# Vulnerability details
Th... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/34 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | Wrong calculation of delinquent penalty time in `updateTimeDelinquentAndGetPenaltyTime` function | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/libraries/FeeMath.sol#L118
# Vulnerability details
## Impact
Because of the incorrect calculation of delinquent penalty time, a borrower gets charged much lower delinquency fee than intended.
## Proof of Concept
Over time, as market operat... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/19 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | Incorrect use of `state.isDelinquent` in `updateTimeDelinquentAndGetPenaltyTime` function - total misbehavior of applying delinquency fee | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/libraries/FeeMath.sol#L96
https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketBase.sol#L406
# Vulnerability details
## Impact
Due to the incorrect value of `state.isDelinquent`, the `updateTimeDelinquentAndGetPen... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/18 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-08-wildcat-findings | The protocol has not charged the protocol fee. | # Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/libraries/MarketState.sol#L15
# Vulnerability details
## Proof of Concept
The protocol has set `accruedProtocolFees` to represent the current protocol fees and `protocolFeeBips` to represent the protocol ... | https://github.com/code-423n4/2024-08-wildcat-findings/issues/5 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccountFactory.sol - Account can be created for an owner and setting any entryPoint | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166
# Vulnerability details
## Impact
Detailed d... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/536 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Relayers can steal extra fees from smart contract wallets on every transaction | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192-L219
# Vulnerability details
## Impact
Relayers can take signed transactions and append zeroes to the signature parameter to artificially i... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/535 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Frontrunning `deployCounterFactualWallet` | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L26-L39
# Vulnerability details
`_entryPoint` and `_handler` are not included in the salt, so a front-running attack could be possible for the same `_owner` and `_index` (sa... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/522 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Frontrunning of smart wallet deployment | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L75
# Vulnerability details
## Impact
Detailed description of the impact of this finding.
An attacker could obtain information about... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/518 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Failed transactions may lead to fund loss via replay attacks | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192-L245
# Vulnerability details
## Impact
Failed transactions inside ```executeTransaction()``` will revert and make the nonces[] remain intact. Thus a replay attack with signatu... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/514 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | The isContract function in LibAddress that uses EXTCODESIZE can be vulnerable to the "Contract Creation Code Execution" attack | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L121
# Vulnerability details
## Impact
It will allow the attacker to potentially execute malicious code in the _implementation contract at https://github.com/code-423n4/2023-01-bic... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/510 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Front-running of the relayers transaction | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/aa-4337/core/EntryPoint.sol#L68
# Vulnerability details
## Description
While the relayer has a positive outcome from the execution of some of the user operation... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/508 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Destruction of the `SmartAccount` implementation | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/496 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Unsigned `tokenGasPriceFactor` parameter | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L239
https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/Sma... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/492 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Uninialized or front-runnable `.init` function in proxy implementation contract | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L17
# Vulnerability details
# Uninialized or fro... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/491 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Theft of funds under relaying the transaction | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L200
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L239
https://github.com/code-423n4/2023-01-biconomy/blob/m... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/489 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Lack of owner verification in EIP-1271 signature check | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L218
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/486 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Replay attack on different batchId | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L194
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/485 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Front-running "deployCounterFactualWallet" | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33
# Vulnerability details
## Description
The `deployCounterFactualWallet` function deploys a smart wallet using the `create2` function with a salt value that depends on t... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/482 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Attacker can take control over each SmartAccount proxy and steal all users' funds | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L342
# Vulnerability details
# Attacker can take control over each SmartAccount proxy and steal all users' funds
## Impact
All users' funds can be stolen by a single attacker (tx ... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/477 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccount implementation contract can be destroyed by anyone | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L302-L353
https://github.com/code-423n4/2023-01-biconomy/b... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/476 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccount implementation contract can be destroyed by owner | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L17
# Vulnerability details
# SmartAccount implementation contract can be destroyed by owner
## Impact
Locking users' funds forever due to DoS for all deployed smart accoun... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/474 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | The owner's address is not declared as payable | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L51
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L172
# Vulnerability details
## Impact
If someone sends ... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/471 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | when the 'v' value from a signature is 0, checkSignatures function can be tricked | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343
# Vulnerability details
## Impact
when the v value of a signature is = 0, the 'checkSignatures' in entryPoint function doesn't check i... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/470 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Signature Replay Attack when EntryPoint contract is changed | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/paymasters/verifying/singleton/VerifyingSingletonPaymaster.sol#L77-L90
# Vulnerability details
# Signature Replay Attack when EntryPoint contract is changed
## Impact
User operations can be replay... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/469 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Deny of service in `SmartAccountFactory` | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L34
# Vulnerability details
## Impact
The `salt` used for create2 does not include information from the `init` method, so it is vulnerabl... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/464 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Attacker can gain control of counterfactual wallet | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L45
# Vulnerability details
A counterfactual wallet can be used by pre-generating its address using the `SmartAccountFactory.getAddressForCounterfactualWallet` function.... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/460 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccount wallet creation can be backdoored | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L53
# Vulnerability details
At wallet creation time, an attacker can temporarily swap the address of the entrypoint to install a backdoor in the form of a registered module ... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/458 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | An attacker can create a smart contract wallet with a malicious config and the address that the user expects his smart contract to have | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33
# Vulnerability details
## Issue
A deployCounterFactualWallet function in the SmartAccountFactory.sol uses create2 command to deploy a smart contract wallet with the add... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/456 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccount authorization can be bypassed using a contract signature | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343
# Vulnerability details
# SmartAccount authorization can be bypassed using a contract signature
The `SmartAccount` wallet supports contract signatures defined by EIP1271... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/449 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | `tokenGasPriceFactor` in `FeeRefund` struct can be malleable in calls to `execTransaction` | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L424-L446
# Vulnerability details
The `execTransaction` function present in the `SmartAccount` contract is susceptible to a malleability attack.
This is due to the fact that the `... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/447 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | SmartAccount implementation can be destroyed by a bad actor | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166
# Vulnerability details
The SmartAccount wallet architecture is mainly defined by a `Proxy` contract that delegates functionality to a common reusable `SmartAccount` implement... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/443 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Attacker can bypass signature validation and send arbitrary transactions to be executed by smart wallet. | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343
# Vulnerability details
## Impact
On `SmartAccount.sol` logic to handle contract signatures there is no validation of which contracts ... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/433 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | The Smart Account can be generated in duplicate, and the attacker uses it by frontrunning the wallet generation process. | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L45
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/426 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2023-01-biconomy-findings | Transaction replay is possible due to the use of mapping of nonces | # Lines of code
https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L204-L219
# Vulnerability details
## Impact
Due to the use of a mapping of nonces, instead of a single one, on certain cases transaction replay ... | https://github.com/code-423n4/2023-01-biconomy-findings/issues/424 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Withdrawals can be locked forever if recipient is a contract | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/WithdrawQueue.sol#L303
# Vulnerability details
## Impact
The [`WithdrawQueue`](https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/Wit... | https://github.com/code-423n4/2024-04-renzo-findings/issues/612 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Upgraded Q -> 3 from #543 [1716909248129] | Judge has assessed an item in Issue #543 as 3 risk. The relevant finding follows:
QA-09 Funds could be locked for some users if collateral to withdraw is native ETH token | https://github.com/code-423n4/2024-04-renzo-findings/issues/602 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Upgraded Q -> 3 from #556 [1716810129730] | Judge has assessed an item in Issue #556 as 3 risk. The relevant finding follows:
[L-05] WithdrawQueue::claim rebasing tokens can block the last claim temporarily | https://github.com/code-423n4/2024-04-renzo-findings/issues/599 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Any withdrawals from `beaconChainETHStrategy` cannot be completed, due to OperatorDelegator reentrancy guard | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265
# Vulnerability details
## Impact
`OperatorDelegator.completeQueuedWithdrawal()` perform an external call to [delegationManager](https://github.com/Layr-Labs/eige... | https://github.com/code-423n4/2024-04-renzo-findings/issues/571 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | ReentrancyGuard causes all native currency funds to get locked inside the EigenPod contract | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265-L269
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L501
# Vulnerability deta... | https://github.com/code-423n4/2024-04-renzo-findings/issues/570 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Completing a withdrawal reverts due to unexpected caller | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Deposits/DepositQueue.sol#L134-L145
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265-L314
# Vulnerability detail... | https://github.com/code-423n4/2024-04-renzo-findings/issues/566 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | `RenzoOracle.sol::lookupTokenValue` oracle uses 24hrs + 60 seconds which is stale | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Oracle/RenzoOracle.sol#L71-L81
# Vulnerability details
## Impact
The oracle uses MAX_TIME_WINDOW which is 24 hours + 60 seconds which is a longer timeframe. This 24+ hour check is just stale for finan... | https://github.com/code-423n4/2024-04-renzo-findings/issues/561 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | The user received less money than expected | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L270-L358
# Vulnerability details
## Impact
The user will receive less money than they should have.
## Proof of Concept
The user's withdrawal process involves two steps:
1. Call... | https://github.com/code-423n4/2024-04-renzo-findings/issues/552 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Inclusion of Pending Withdrawals in WithdrawQueue in TVL Calculation Causes Users to Lose Staking Rewards | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L315-L321
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L564-L569
https://github.com/code-423n4/2024-04-renzo/b... | https://github.com/code-423n4/2024-04-renzo-findings/issues/551 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Calculating `amountToRedeem` inside `WithdrawQueue::withdraw()` instead of within `claim()` allows front-running a slashing event while also causing redemption of incorrect amount | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Withdraw/WithdrawQueue.sol#L216-L232
# Vulnerability details
## Summary
When a user requests a `withdraw()` they also provide the `_assetOut` token (ETH or other ERC20 token). The `amountToRedeem` of this token is [calcuated inside the ... | https://github.com/code-423n4/2024-04-renzo-findings/issues/544 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | METH Exchange Rate Retrieval Method Can Lead To Major Losses | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/1c7cc4e632564349b204b4b5e5f494c9b0bc631d/contracts/Oracle/Mantle/METHShim.sol#L69
# Vulnerability details
## **Vulnerability Details:**
The METHShim contract uses the **[_getMETHData](https://github.com/code-423n4/2024-04-renzo/blob/1c7cc4e632564349b... | https://github.com/code-423n4/2024-04-renzo-findings/issues/513 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Depositors can avoid validator penalties at other depositors' expense | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L274-L358
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Oracle/Mantle/METHShim.sol#L80
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Oracle/RenzoOracle.sol#L75
# Vulnerability detail... | https://github.com/code-423n4/2024-04-renzo-findings/issues/512 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | stETH 1-wei transfer issue may lead to reverts due to insufficient balance | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L491-L576
# Vulnerability details
## Impact
`RestakeManager#deposit` treats stETH as any other token, which is prone to the known stETH rounding issue.
https://docs.lido.fi/token-... | https://github.com/code-423n4/2024-04-renzo-findings/issues/510 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | stETH Rebasing Token Issue: Minting and Redeeming Discrepancies | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L491-L576
# Vulnerability details
## Impact
Rebasing tokens, such as stETH, have a dynamic supply that can complicate their integration with DeFi platforms. To address this issue, it is recommended to wrap the rebasin... | https://github.com/code-423n4/2024-04-renzo-findings/issues/509 |
confirmed_finding | code4rena | null | null | HIGH | null | null | 2024-04-renzo-findings | Deposits of rebasing stETH can revert | # Lines of code
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L491-L576
https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Delegation/OperatorDelegator.sol#L143-L154
https://github.com/Layr-Labs/eigenlayer-contracts/blob/dev/src/contracts/core/StrategyManager.sol#L323-... | https://github.com/code-423n4/2024-04-renzo-findings/issues/508 |
End of preview. Expand in Data Studio
- Downloads last month
- 92