-
# Lines of code
https://github.com/code-423n4/2023-07-amphora/blob/daae020331404647c661ab534d20093c875483e1/core/solidity/contracts/core/WUSDA.sol#L247
# Vulnerability details
## Impact
Due to flo…
-
# Handle
shw
# Vulnerability details
## Impact
In `library/PoolLib.sol`, the return value of functions `BPTVal` and `getPoolSharesRequired` are vulnerable by flash-loan attacks. The attacker can …
-
0x73696d616f
medium
# Incorrect selector in `FlashRolloverLoan_G5::_acceptCommitment()` does not match `SmartCommitmentForwarder::acceptCommitmentWithRecipient()`
## Summary
`FlashRolloverLoan_G5:…
-
## GOV-01M: Unsafe Balance Evaluation for Governance
| Type | Severity | Location |
| ---- | -------- | -------- |
| [Logical Fault](/appendix/finding-types#logical-fault) | | [Governance.sol:L1…
-
# Handle
0xRajeev
# Vulnerability details
## Impact
The addSafeAddress() takes an address and adds it to a “safe list". This is used in eoaOnly() to give exemption to safe addresses that are tru…
-
- tx: https://etherscan.io/tx/0xeb8c3bebed11e2e4fcd30cbfc2fb3c55c4ca166003c7f7d319e78eaab9747098
- Analysis: https://medium.com/amber-group/reproducing-the-ape-airdrop-flash-loan-arbitrage-exploit-…
-
0x73696d616f
medium
# `FlashRolloverLoan_G5` will not work for certain tokens due to not setting the approval to `0` after repaying a loan
## Summary
`FlashRolloverLoan_G5::_repayLoanFull()` appro…
-
**Github username:** --
**Submission hash (on-chain):** 0x2c4be5daeef51c5489f6a3dc8bcd7bf127846e08e1a164b30ec4add731f25943
**Severity:** high severity
**Description:**
## summary
During a security r…
-
Hi, while following the steps to test the repo on the Kovan test network I ran into this issue : **. get_weth.py works well, I can see the ETH being replaced by WETH on Metamask, deployement_v2 works …
-
# Handle
@cmichelio
# Vulnerability details
## Vulnerability Details
The `Router.curatePool` and `replacePool` don't have any access restriction.
An attacker can get a flash loan of base tokens a…