issues
search
code-423n4
/
2022-10-paladin-findings
2
stars
0
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Upgraded Q -> M from #272 [1668215320788]
#285
c4-judge
closed
1 year ago
5
Upgraded Q -> M from #107 [1668211909800]
#284
c4-judge
closed
1 year ago
2
Upgraded Q -> M from #43 [1668210521611]
#283
c4-judge
closed
1 year ago
3
Upgraded Q -> M from #20 [1668209885833]
#282
c4-judge
closed
1 year ago
3
Upgraded Q -> M from #60 [1668072358798]
#281
c4-judge
closed
1 year ago
0
Current `votesDifference` is not checked when extending a pledge or increasing the `rewardPerVote`
#280
code423n4
closed
1 year ago
6
QA Report
#279
code423n4
closed
1 year ago
1
Gas Optimizations
#278
code423n4
opened
1 year ago
1
QA Report
#277
code423n4
opened
1 year ago
1
QA Report
#276
code423n4
opened
1 year ago
2
Gas Optimizations
#275
code423n4
opened
1 year ago
1
Owner can withdraw all funds from a WardenPledge contract
#274
code423n4
closed
1 year ago
5
Gas Optimizations
#273
code423n4
opened
1 year ago
2
QA Report
#272
code423n4
opened
1 year ago
1
Gas Optimizations
#271
code423n4
closed
1 year ago
1
Compromised or malicious owner of `WardenPledge` contract can steal pledge creator's deposited reward token amount
#270
code423n4
closed
1 year ago
7
Pausing `WardenPledge` contract, which takes effect immediately, by its owner can unexpectedly block pledge creator from calling `closePledge` or `retrievePledgeRewards` function
#269
code423n4
opened
1 year ago
11
Gas Optimizations
#268
code423n4
opened
1 year ago
1
QA Report
#267
code423n4
opened
1 year ago
1
[M2] Zero protocol fee can prevent users to extendPledge for some tokens
#266
code423n4
opened
1 year ago
5
Every token accidentally sent to the Contract cannot be recovered
#265
code423n4
closed
1 year ago
3
QA Report
#264
code423n4
opened
1 year ago
1
Gas Optimizations
#263
code423n4
opened
1 year ago
1
QA Report
#262
code423n4
opened
1 year ago
1
Gas Optimizations
#261
code423n4
closed
1 year ago
3
Gas Optimizations
#260
code423n4
closed
1 year ago
3
Owner can drain pledged tokens balance with `recoverERC20` function
#259
code423n4
closed
1 year ago
5
Gas Optimizations
#258
code423n4
closed
1 year ago
3
QA Report
#257
code423n4
closed
1 year ago
1
Front-running of a `pledge` call
#256
code423n4
closed
1 year ago
4
Votes can be reused
#255
code423n4
closed
1 year ago
3
Gas Optimizations
#254
code423n4
opened
1 year ago
1
Gas Optimizations
#253
code423n4
closed
1 year ago
3
Protocol doesn't support fee-on transfer tokens
#252
code423n4
closed
1 year ago
2
QA Report
#251
code423n4
opened
1 year ago
1
QA Report
#250
code423n4
opened
1 year ago
1
Malicious owner can steal reward tokens
#249
code423n4
closed
1 year ago
5
A single point of failure is not acceptable for this project
#248
code423n4
closed
1 year ago
4
Owner can bypass ERC20 recovery restrictions and take all rewards
#247
code423n4
closed
1 year ago
7
QA Report
#246
code423n4
opened
1 year ago
1
Gas Optimizations
#245
code423n4
opened
1 year ago
1
Fee-on-transfer tokens cause wrong accounting or brick some functions
#244
code423n4
opened
1 year ago
3
Gas Optimizations
#243
code423n4
opened
1 year ago
2
recoverERC20 can drain user's funds
#242
code423n4
closed
1 year ago
7
Gas Optimizations
#241
code423n4
opened
1 year ago
1
QA Report
#240
code423n4
opened
1 year ago
1
QA Report
#239
code423n4
opened
1 year ago
1
User does not benefit if pledgeOwner increases Pledge Rewards by calling increasePledgeRewardPerVote()
#238
code423n4
closed
1 year ago
3
QA Report
#237
code423n4
opened
1 year ago
2
Owner can bypass reward token protection in recoverERC20 to instantly steal all tokens in contract
#236
code423n4
closed
1 year ago
7
Next