-
Here´s the original solidity source code:
```
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
// RUN: %soll %s
contract HelloWorld {
function sayHello() public pure returns (string…
-
# Lines of code
https://github.com/code-423n4/2024-05-bakerfi/blob/main/contracts/core/flashloan/BalancerFlashLender.sol#L63
https://github.com/code-423n4/2024-05-bakerfi/blob/main/contracts/core/str…
-
I have question does UniswapV2 swapExactTokensForTokens function charge fees ? And if yes does expected amount input should be like this Expected price after fee subtraction?
-
# Handle
@cmichelio
# Vulnerability details
## Vulnerability Details
The `NFTXVaultUpgradeable.flashLoan` is not correctly implemented according to EIP-3156 (but it tries to implement it as it …
-
Anyone can interact with your contract with this current version, so it is theoretically vulnerable to frontrunning attacks
### Ideas
- Add something like the ownable modifier from OpenZeppelin to…
-
The AAVE v3 flashloan docs say use the "pull proxy" address, but I keep getting a revert error because 'borrower doesn't have permission' or 'not the approved borrower trying to get the tokens' or som…
-
# Handle
shw
# Vulnerability details
## Impact
The LP pricing formula used in the `burnAsset` function of `LimboDAO` is vulnerable to flashloan manipulation. By swapping a large number of EYE int…
-
### Challenge Description
Aave protocol introduced the concept of uncollateralized loans in a context of a single transaction, with this feature, any interaction with the Ethereum blockchain that w…
-
# Lines of code
https://github.com/reserve-protocol/protocol/blob/9ee60f142f9f5c1fe8bc50eef915cf33124a534f/contracts/plugins/assets/curve/CurveVolatileCollateral.sol#L32-L65
# Vulnerability details…
-
# Lines of code
https://github.com/code-423n4/2023-04-caviar/blob/cd8a92667bcb6657f70657183769c244d04c015c/src/PrivatePool.sol#L635
# Vulnerability details
## Impact
In the current implementation…