Dataset Viewer
Auto-converted to Parquet Duplicate
type
stringclasses
2 values
source
stringclasses
4 values
report
stringclasses
1 value
contract
stringclasses
1 value
severity
stringclasses
3 values
contract_url
stringclasses
31 values
findings
listlengths
0
0
repo
stringclasses
127 values
title
stringlengths
4
407
body
stringlengths
47
3k
url
stringlengths
60
86
confirmed_finding
immunefi_bounty
## [HIGH] Predictable Randomness in Yeetback Winner Selection ### Summary The `restart()` function accepts a user-controlled `userRandomNumber` parameter that directly determines yeetback winners. An attacker can pre-compute the winning number and guarantee they receive the yeetback pot. ### Vulnerability Detail In `...
// SPDX-License-Identifier: AGPL-3.0-or-later /* * Copyright (C) 2024 Squangleding Corporation * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as published by * the Free Software Foundation, either version 3 of the License, or ...
HIGH
null
null
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Mint-Claw/content-split/issues/1
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Mint-Claw/market-monitor/issues/1
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Dapp-Learning-DAO/DLIP/issues/137
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/sherlock-audit/2024-06-new-scope-judging/issues/402
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/FreeCAD/FPA-grant-proposals/issues/72
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/74
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/71
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/53
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/49
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/FreeCAD/FPA-grant-proposals/issues/61
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/FreeCAD/FPA-grant-proposals/issues/47
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/31
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/25
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/23
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/numfocus/small-development-grant-proposals/issues/21
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/FreeCAD/FPA-grant-proposals/issues/44
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/davedumto/LancePay/issues/269
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/davedumto/LancePay/issues/240
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/hummingbot/hummingbot/issues/8046
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/applefather-eth/applefather.xyz/issues/1
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Scottcjn/rustchain-bounties/issues/369
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Scottcjn/rustchain-bounties/issues/367
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/bolivian-peru/baozi-openclaw/issues/40
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/ZcashCommunityGrants/zcashcommunitygrants/issues/220
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/hummingbot/hummingbot/issues/8028
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Satianurag/algolia-challenge/issues/14
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/Satianurag/algolia-challenge/issues/13
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/JordanKotsop/context-dao/issues/14
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/paritytech/polkadot-sdk/issues/11100
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/bolivian-peru/marketplace-service-template/issues/91
[]
null
null
null
null
slither_candidate
code4rena_immunefi
null
null
unknown
https://github.com/flexyledger/defi-yield-aggregator/issues/54
[]
null
null
null
null
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
Disabled SphereXEngine Proctection.
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L61 # Vulnerability details ## Impact In WildcatArchController.sol file "WildcatArchController" contract constructor is passing "SphereXEngine's" engine address = 0 which will d...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/107
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
`WildcatArchController::updateSphereXEngineOnRegisteredContracts` will never execute because `sphereXEngine` is set as `address(0)` and never updated.
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L84 # Vulnerability details ## Impact The `WildcatArchController::updateSphereXEngineOnRegisteredContracts` updates SphereX engine on registered contracts and add them as allowe...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/99
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
Markets do not update delinquency timer correctly if the account goes underwater through interest accrual
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketBase.sol#L406-L465 https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketBase.sol#L541-L542 # Vulnerability details ## Imp...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/89
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
debit owned by borrower not cleared after full repayment of loan
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarket.sol#L226 # Vulnerability details Current implementation lacks the mechanism to clear borrowers debt either by full repayment of debt owned or closing of market . This is problematic...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/75
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
WildcatSanctionsSentinel:: createEscrow allows unregistered market to used to create escrow
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatSanctionsSentinel.sol#L121 # Vulnerability details In `WildcatSanctionsSentinel.sol`, the `createEscrow()` function has two issues : - There is currently no check that `msg.sender` is a regis...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/65
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
User could withdraw more than supposed to, forcing last user withdraw to fail
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketWithdrawals.sol#L248 # Vulnerability details ## Impact User could withdraw more than supposed to and force last user's withdraw to fail. ## Proof of Concept Within Wildcat, withdraw requests are put into batches. Users ...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/64
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
`SphereXConfig::constructor` argument `engine` set as `0` in `WildcatArchController::constructor` will prevent key `WildcatArchController` functions from from executing
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/WildcatArchController.sol#L61 # Vulnerability details ## Details In `WildcatArchController::constructor` the `SphereXConfig` is initialiazed by providing its `constructor` arguments as so ``` //src/Wild...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/58
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
`state.scaleFactor` is calculated incorrectly when handling the current expired withdrawal batch
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketBase.sol#L409-L431 # Vulnerability details ## Impact - The amount of assets paid for the current expired withdrawal batch is less than expected - The amount of reserved assets for unpaid withdrawal batches is insufficien...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/54
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
lenders are unable to get full repayment amount
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketWithdrawals.sol#L251 https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/market/WildcatMarketWithdrawals.sol#L247 # Vulnerability details Th...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/34
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
Wrong calculation of delinquent penalty time in `updateTimeDelinquentAndGetPenaltyTime` function
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/main/src/libraries/FeeMath.sol#L118 # Vulnerability details ## Impact Because of the incorrect calculation of delinquent penalty time, a borrower gets charged much lower delinquency fee than intended. ## Proof of Concept Over time, as market operat...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/19
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
Incorrect use of `state.isDelinquent` in `updateTimeDelinquentAndGetPenaltyTime` function - total misbehavior of applying delinquency fee
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/main/src/libraries/FeeMath.sol#L96 https://github.com/code-423n4/2024-08-wildcat/blob/main/src/market/WildcatMarketBase.sol#L406 # Vulnerability details ## Impact Due to the incorrect value of `state.isDelinquent`, the `updateTimeDelinquentAndGetPen...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/18
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-08-wildcat-findings
The protocol has not charged the protocol fee.
# Lines of code https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/libraries/MarketState.sol#L15 # Vulnerability details ## Proof of Concept The protocol has set `accruedProtocolFees` to represent the current protocol fees and `protocolFeeBips` to represent the protocol ...
https://github.com/code-423n4/2024-08-wildcat-findings/issues/5
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccountFactory.sol - Account can be created for an owner and setting any entryPoint
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33 https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166 # Vulnerability details ## Impact Detailed d...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/536
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Relayers can steal extra fees from smart contract wallets on every transaction
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192-L219 # Vulnerability details ## Impact Relayers can take signed transactions and append zeroes to the signature parameter to artificially i...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/535
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Frontrunning `deployCounterFactualWallet`
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L26-L39 # Vulnerability details `_entryPoint` and `_handler` are not included in the salt, so a front-running attack could be possible for the same `_owner` and `_index` (sa...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/522
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Frontrunning of smart wallet deployment
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L75 # Vulnerability details ## Impact Detailed description of the impact of this finding. An attacker could obtain information about...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/518
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Failed transactions may lead to fund loss via replay attacks
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192-L245 # Vulnerability details ## Impact Failed transactions inside ```executeTransaction()``` will revert and make the nonces[] remain intact. Thus a replay attack with signatu...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/514
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
The isContract function in LibAddress that uses EXTCODESIZE can be vulnerable to the "Contract Creation Code Execution" attack
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L121 # Vulnerability details ## Impact It will allow the attacker to potentially execute malicious code in the _implementation contract at https://github.com/code-423n4/2023-01-bic...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/510
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Front-running of the relayers transaction
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/aa-4337/core/EntryPoint.sol#L68 # Vulnerability details ## Description While the relayer has a positive outcome from the execution of some of the user operation...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/508
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Destruction of the `SmartAccount` implementation
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166 https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/496
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Unsigned `tokenGasPriceFactor` parameter
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L239 https://github.com/code-423n4/2023-01-biconomy/blob/5df2e8f8c0fd3393b9ecdad9ef356955f07fbbdd/scw-contracts/contracts/smart-contract-wallet/Sma...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/492
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Uninialized or front-runnable `.init` function in proxy implementation contract
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166 https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L17 # Vulnerability details # Uninialized or fro...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/491
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Theft of funds under relaying the transaction
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L200 https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L239 https://github.com/code-423n4/2023-01-biconomy/blob/m...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/489
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Lack of owner verification in EIP-1271 signature check
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L218 https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/486
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Replay attack on different batchId
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L194 https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/Sma...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/485
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Front-running "deployCounterFactualWallet"
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33 # Vulnerability details ## Description The `deployCounterFactualWallet` function deploys a smart wallet using the `create2` function with a salt value that depends on t...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/482
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Attacker can take control over each SmartAccount proxy and steal all users' funds
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L342 # Vulnerability details # Attacker can take control over each SmartAccount proxy and steal all users' funds ## Impact All users' funds can be stolen by a single attacker (tx ...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/477
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccount implementation contract can be destroyed by anyone
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L192 https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L302-L353 https://github.com/code-423n4/2023-01-biconomy/b...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/476
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccount implementation contract can be destroyed by owner
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L17 # Vulnerability details # SmartAccount implementation contract can be destroyed by owner ## Impact Locking users' funds forever due to DoS for all deployed smart accoun...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/474
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
The owner's address is not declared as payable
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L51 https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L172 # Vulnerability details ## Impact If someone sends ...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/471
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
when the 'v' value from a signature is 0, checkSignatures function can be tricked
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343 # Vulnerability details ## Impact when the v value of a signature is = 0, the 'checkSignatures' in entryPoint function doesn't check i...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/470
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Signature Replay Attack when EntryPoint contract is changed
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/paymasters/verifying/singleton/VerifyingSingletonPaymaster.sol#L77-L90 # Vulnerability details # Signature Replay Attack when EntryPoint contract is changed ## Impact User operations can be replay...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/469
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Deny of service in `SmartAccountFactory`
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L34 # Vulnerability details ## Impact The `salt` used for create2 does not include information from the `init` method, so it is vulnerabl...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/464
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Attacker can gain control of counterfactual wallet
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L45 # Vulnerability details A counterfactual wallet can be used by pre-generating its address using the `SmartAccountFactory.getAddressForCounterfactualWallet` function....
https://github.com/code-423n4/2023-01-biconomy-findings/issues/460
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccount wallet creation can be backdoored
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L53 # Vulnerability details At wallet creation time, an attacker can temporarily swap the address of the entrypoint to install a backdoor in the form of a registered module ...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/458
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
An attacker can create a smart contract wallet with a malicious config and the address that the user expects his smart contract to have
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33 # Vulnerability details ## Issue A deployCounterFactualWallet function in the SmartAccountFactory.sol uses create2 command to deploy a smart contract wallet with the add...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/456
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccount authorization can be bypassed using a contract signature
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343 # Vulnerability details # SmartAccount authorization can be bypassed using a contract signature The `SmartAccount` wallet supports contract signatures defined by EIP1271...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/449
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
`tokenGasPriceFactor` in `FeeRefund` struct can be malleable in calls to `execTransaction`
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L424-L446 # Vulnerability details The `execTransaction` function present in the `SmartAccount` contract is susceptible to a malleability attack. This is due to the fact that the `...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/447
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
SmartAccount implementation can be destroyed by a bad actor
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/main/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L166 # Vulnerability details The SmartAccount wallet architecture is mainly defined by a `Proxy` contract that delegates functionality to a common reusable `SmartAccount` implement...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/443
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Attacker can bypass signature validation and send arbitrary transactions to be executed by smart wallet.
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L314-L343 # Vulnerability details ## Impact On `SmartAccount.sol` logic to handle contract signatures there is no validation of which contracts ...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/433
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
The Smart Account can be generated in duplicate, and the attacker uses it by frontrunning the wallet generation process.
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccountFactory.sol#L33-L45 https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/426
confirmed_finding
code4rena
null
null
HIGH
null
null
2023-01-biconomy-findings
Transaction replay is possible due to the use of mapping of nonces
# Lines of code https://github.com/code-423n4/2023-01-biconomy/blob/53c8c3823175aeb26dee5529eeefa81240a406ba/scw-contracts/contracts/smart-contract-wallet/SmartAccount.sol#L204-L219 # Vulnerability details ## Impact Due to the use of a mapping of nonces, instead of a single one, on certain cases transaction replay ...
https://github.com/code-423n4/2023-01-biconomy-findings/issues/424
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Withdrawals can be locked forever if recipient is a contract
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/WithdrawQueue.sol#L303 # Vulnerability details ## Impact The [`WithdrawQueue`](https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Withdraw/Wit...
https://github.com/code-423n4/2024-04-renzo-findings/issues/612
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Upgraded Q -> 3 from #543 [1716909248129]
Judge has assessed an item in Issue #543 as 3 risk. The relevant finding follows: QA-09 Funds could be locked for some users if collateral to withdraw is native ETH token
https://github.com/code-423n4/2024-04-renzo-findings/issues/602
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Upgraded Q -> 3 from #556 [1716810129730]
Judge has assessed an item in Issue #556 as 3 risk. The relevant finding follows: [L-05] WithdrawQueue::claim rebasing tokens can block the last claim temporarily
https://github.com/code-423n4/2024-04-renzo-findings/issues/599
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Any withdrawals from `beaconChainETHStrategy` cannot be completed, due to OperatorDelegator reentrancy guard
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265 # Vulnerability details ## Impact `OperatorDelegator.completeQueuedWithdrawal()` perform an external call to [delegationManager](https://github.com/Layr-Labs/eige...
https://github.com/code-423n4/2024-04-renzo-findings/issues/571
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
ReentrancyGuard causes all native currency funds to get locked inside the EigenPod contract
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265-L269 https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L501 # Vulnerability deta...
https://github.com/code-423n4/2024-04-renzo-findings/issues/570
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Completing a withdrawal reverts due to unexpected caller
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Deposits/DepositQueue.sol#L134-L145 https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Delegation/OperatorDelegator.sol#L265-L314 # Vulnerability detail...
https://github.com/code-423n4/2024-04-renzo-findings/issues/566
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
`RenzoOracle.sol::lookupTokenValue` oracle uses 24hrs + 60 seconds which is stale
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/Oracle/RenzoOracle.sol#L71-L81 # Vulnerability details ## Impact The oracle uses MAX_TIME_WINDOW which is 24 hours + 60 seconds which is a longer timeframe. This 24+ hour check is just stale for finan...
https://github.com/code-423n4/2024-04-renzo-findings/issues/561
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
The user received less money than expected
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L270-L358 # Vulnerability details ## Impact The user will receive less money than they should have. ## Proof of Concept The user's withdrawal process involves two steps: 1. Call...
https://github.com/code-423n4/2024-04-renzo-findings/issues/552
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Inclusion of Pending Withdrawals in WithdrawQueue in TVL Calculation Causes Users to Lose Staking Rewards
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L315-L321 https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L564-L569 https://github.com/code-423n4/2024-04-renzo/b...
https://github.com/code-423n4/2024-04-renzo-findings/issues/551
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Calculating `amountToRedeem` inside `WithdrawQueue::withdraw()` instead of within `claim()` allows front-running a slashing event while also causing redemption of incorrect amount
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Withdraw/WithdrawQueue.sol#L216-L232 # Vulnerability details ## Summary When a user requests a `withdraw()` they also provide the `_assetOut` token (ETH or other ERC20 token). The `amountToRedeem` of this token is [calcuated inside the ...
https://github.com/code-423n4/2024-04-renzo-findings/issues/544
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
METH Exchange Rate Retrieval Method Can Lead To Major Losses
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/1c7cc4e632564349b204b4b5e5f494c9b0bc631d/contracts/Oracle/Mantle/METHShim.sol#L69 # Vulnerability details ## **Vulnerability Details:** The METHShim contract uses the **[_getMETHData](https://github.com/code-423n4/2024-04-renzo/blob/1c7cc4e632564349b...
https://github.com/code-423n4/2024-04-renzo-findings/issues/513
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Depositors can avoid validator penalties at other depositors' expense
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L274-L358 https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Oracle/Mantle/METHShim.sol#L80 https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Oracle/RenzoOracle.sol#L75 # Vulnerability detail...
https://github.com/code-423n4/2024-04-renzo-findings/issues/512
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
stETH 1-wei transfer issue may lead to reverts due to insufficient balance
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/519e518f2d8dec9acf6482b84a181e403070d22d/contracts/RestakeManager.sol#L491-L576 # Vulnerability details ## Impact `RestakeManager#deposit` treats stETH as any other token, which is prone to the known stETH rounding issue. https://docs.lido.fi/token-...
https://github.com/code-423n4/2024-04-renzo-findings/issues/510
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
stETH Rebasing Token Issue: Minting and Redeeming Discrepancies
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L491-L576 # Vulnerability details ## Impact Rebasing tokens, such as stETH, have a dynamic supply that can complicate their integration with DeFi platforms. To address this issue, it is recommended to wrap the rebasin...
https://github.com/code-423n4/2024-04-renzo-findings/issues/509
confirmed_finding
code4rena
null
null
HIGH
null
null
2024-04-renzo-findings
Deposits of rebasing stETH can revert
# Lines of code https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/RestakeManager.sol#L491-L576 https://github.com/code-423n4/2024-04-renzo/blob/main/contracts/Delegation/OperatorDelegator.sol#L143-L154 https://github.com/Layr-Labs/eigenlayer-contracts/blob/dev/src/contracts/core/StrategyManager.sol#L323-...
https://github.com/code-423n4/2024-04-renzo-findings/issues/508
End of preview. Expand in Data Studio

Solidity Security Findings Dataset

9,359 smart contract security findings from Code4rena audits.

Statistics

  • HIGH severity: 4,418 findings
  • MEDIUM severity: 4,910 findings
  • Sources: Code4rena, Immunefi

Use Cases

  • Training security audit models
  • Vulnerability classification
  • Smart contract analysis
Downloads last month
92