-
# Handle
broccoli
# Vulnerability details
# Flash swap call back prior to transferring tokens in indexPool
## Impact
In the IndexPool contract, flashSwap does not work.
The callback function is …
-
# Handle
cmichel
# Vulnerability details
The `ConstantProductPool.getAmountOut` function does not verify that `tokenIn == token1` in the `else` branch.
This is done everywhere else though (see `sw…
-
# Handle
broccoli
# Vulnerability details
## Impact
An attacker can call the `bento.harvest` function during the callback function of a flash swap of the `HybridPool` to reduce the number of inpu…
-
# Handle
broccoli
# Vulnerability details
## Impact
The `_processSwap` function of `HybridPool` calls the callback function only if the provided data has a length greater than 0. However, some im…
-
Hi 👋 Thanks @6eer for your work. Your code looks really promising.
I followed your instructions to deploy the demo environment. I ran ganache successfully (by forking mainnet), created the .env fi…
-
https://docs.cork.tech/testnet-trading-competition-ui-tutorial/contract-addresses
-
EFCCWEB3
High
# Misallocation of borrowedAmount in ::_flashSwap
Summary
A critical misallocation error exists within the `_swapRaforDs` function, where the `borrowedAmount`, which denotes the quant…
-
i am willing to pay for it
-
# Handle
shw
# Vulnerability details
## Impact
The LP pricing formula used in the `burnAsset` function of `LimboDAO` is vulnerable to flashloan manipulation. By swapping a large number of EYE int…
-
# Missing Access Control and Front-Running Vulnerability in "sellProfits" Function
### Severity
High Risk
### Relevant GitHub Links
https://github.com/Cyfrin/2023-07-beedle/blob/658e046bda8b010a5b82…