issues
search
code-423n4
/
2022-01-dev-test-repo-findings
2
stars
1
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Unsafe usage of `msg.value` in a loop
#347
code423n4
opened
7 months ago
0
Unchecked return value of low-level `call()`/`delegatecall()`
#346
code423n4
opened
7 months ago
0
The `owner` is a single point of failure and a centralization risk
#345
code423n4
opened
7 months ago
0
Some tokens may revert when zero value transfers are made
#344
code423n4
opened
7 months ago
0
Return values of transfer()/transferFrom() not checked
#343
code423n4
opened
7 months ago
0
Return values of `approve()` not checked
#342
code423n4
opened
7 months ago
0
Proxy's logic contract relies on code in the constructor
#341
code423n4
opened
7 months ago
0
Interface improperly implemented
#340
code423n4
opened
7 months ago
0
Fee-on-transfer/rebasing tokens will have problems when swapping
#339
code423n4
opened
7 months ago
0
Excess funds sent via `msg.value` not refunded
#338
code423n4
opened
7 months ago
0
Contracts are vulnerable to fee-on-transfer accounting-related issues
#337
code423n4
opened
7 months ago
0
Array is `push()`ed but not `pop()`ed, and is iterated over
#336
code423n4
opened
7 months ago
0
`latestAnswer()` may return stale values
#335
code423n4
opened
7 months ago
0
`_safeMint()` should be used rather than `_mint()` wherever possible
#334
code423n4
opened
7 months ago
0
Calls to `get_virtual_price()` are vulnerable to read-only reentrancy
#333
code423n4
opened
7 months ago
0
`addRewardToken()` does note remove old entries before adding new ones
#332
code423n4
opened
7 months ago
0
Using `block.timestamp` as the deadline/expiry invites MEV
#331
code423n4
opened
7 months ago
0
Use of `transferFrom()` rather than `safeTransferFrom()` for NFTs in will lead to the loss of NFTs
#330
code423n4
opened
7 months ago
0
Unsafe use of `transfer()`/`transferFrom()` with `IERC20`
#329
code423n4
opened
7 months ago
0
Unsafe use of `approve()` with `IERC20`
#328
code423n4
opened
7 months ago
0
Unsafe usage of `msg.value` in a loop
#327
code423n4
opened
7 months ago
0
Unchecked return value of low-level `call()`/`delegatecall()`
#326
code423n4
opened
7 months ago
0
The `owner` is a single point of failure and a centralization risk
#325
code423n4
opened
7 months ago
0
Some tokens may revert when zero value transfers are made
#324
code423n4
opened
7 months ago
0
Return values of transfer()/transferFrom() not checked
#323
code423n4
opened
7 months ago
0
Return values of `approve()` not checked
#322
code423n4
opened
7 months ago
0
Proxy's logic contract relies on code in the constructor
#321
code423n4
opened
7 months ago
0
Interface improperly implemented
#320
code423n4
opened
7 months ago
0
Fee-on-transfer/rebasing tokens will have problems when swapping
#319
code423n4
opened
7 months ago
0
Excess funds sent via `msg.value` not refunded
#318
code423n4
opened
7 months ago
0
Contracts are vulnerable to fee-on-transfer accounting-related issues
#317
code423n4
opened
7 months ago
0
Array is `push()`ed but not `pop()`ed, and is iterated over
#316
code423n4
opened
7 months ago
0
`latestAnswer()` may return stale values
#315
code423n4
opened
7 months ago
0
`_safeMint()` should be used rather than `_mint()` wherever possible
#314
code423n4
opened
7 months ago
0
Calls to `get_virtual_price()` are vulnerable to read-only reentrancy
#313
code423n4
opened
7 months ago
0
`addRewardToken()` does note remove old entries before adding new ones
#312
code423n4
opened
7 months ago
0
Using `block.timestamp` as the deadline/expiry invites MEV
#311
code423n4
opened
7 months ago
0
Use of `transferFrom()` rather than `safeTransferFrom()` for NFTs in will lead to the loss of NFTs
#310
code423n4
opened
7 months ago
0
Unsafe use of `transfer()`/`transferFrom()` with `IERC20`
#309
code423n4
opened
7 months ago
0
Unsafe use of `approve()` with `IERC20`
#308
code423n4
opened
7 months ago
0
Unsafe usage of `msg.value` in a loop
#307
code423n4
opened
7 months ago
0
Unchecked return value of low-level `call()`/`delegatecall()`
#306
code423n4
opened
7 months ago
0
The `owner` is a single point of failure and a centralization risk
#305
code423n4
opened
7 months ago
0
Some tokens may revert when zero value transfers are made
#304
code423n4
opened
7 months ago
0
Return values of transfer()/transferFrom() not checked
#303
code423n4
opened
7 months ago
0
Return values of `approve()` not checked
#302
code423n4
opened
7 months ago
0
Proxy's logic contract relies on code in the constructor
#301
code423n4
opened
7 months ago
0
Interface improperly implemented
#300
code423n4
opened
7 months ago
0
Fee-on-transfer/rebasing tokens will have problems when swapping
#299
code423n4
opened
7 months ago
0
Excess funds sent via `msg.value` not refunded
#298
code423n4
opened
7 months ago
0
Previous
Next