issues
search
code-423n4
/
2023-01-astaria-findings
5
stars
2
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
PublicVault Contract Allows Minting Tokens to a Null Address
#586
code423n4
closed
1 year ago
2
Gas Optimizations
#585
code423n4
closed
1 year ago
2
QA Report
#584
code423n4
opened
1 year ago
1
QA Report
#583
code423n4
opened
1 year ago
1
settleAuction() Check for status errors
#582
code423n4
opened
1 year ago
5
Use safeMint for ERC721
#581
code423n4
closed
1 year ago
3
Gas Optimizations
#580
code423n4
closed
1 year ago
1
New Guardian cannot be set
#579
code423n4
closed
1 year ago
4
ERC4626Cloned.previewMint() causes malicious users to can exclusive access to vault
#578
code423n4
closed
1 year ago
5
Solmate safetransfer and safetransferfrom does not check the codesize of the token address, which may lead to fund loss
#577
code423n4
closed
1 year ago
1
QA Report
#576
code423n4
closed
1 year ago
1
Front-run Initializer
#575
code423n4
closed
1 year ago
2
makePayment() may increase the user's debt
#574
code423n4
closed
1 year ago
6
Gas Optimizations
#573
code423n4
opened
1 year ago
2
QA Report
#572
code423n4
opened
1 year ago
1
LienToken.transferFrom There is a possibility of malicious attack
#571
code423n4
opened
1 year ago
2
Gas Optimizations
#570
code423n4
closed
1 year ago
1
Gas Optimizations
#569
code423n4
closed
1 year ago
1
Ownership vulnerabilities
#568
code423n4
closed
1 year ago
1
QA Report
#567
code423n4
opened
1 year ago
1
Reentrancy in safeTransferFrom() in ClearingHouse.sol allows the attacker to withdraw the collateral, while still owning the borrowed assets.
#566
code423n4
closed
1 year ago
7
commitToLien() can create LienToken for any holder
#565
code423n4
closed
1 year ago
8
ClearingHouse can pass in a malicious payment token
#564
code423n4
closed
1 year ago
8
QA Report
#563
code423n4
opened
1 year ago
1
Gas Optimizations
#562
code423n4
opened
1 year ago
1
INCORRECT FUNCTION CALLS
#561
code423n4
closed
1 year ago
2
QA Report
#560
code423n4
opened
1 year ago
1
commitToLien() can pass in an illegal payment token
#559
code423n4
closed
1 year ago
3
QA Report
#558
code423n4
opened
1 year ago
1
User can lose 10 ethers to Vault
#557
code423n4
closed
1 year ago
7
IRREVERSIBLE __RENOUNCEGUARDIAN FUNCTION
#556
code423n4
closed
1 year ago
4
Comparison Of Different Types Might Lead to Inconsistent Behavior
#555
code423n4
closed
1 year ago
1
[M-02] Strategist has full control over Public Vault it can be risky for depositors
#554
code423n4
closed
1 year ago
1
[M-01] Public Vault cannot be reactivated after Shutdown.
#553
code423n4
closed
1 year ago
1
Overflow/Underflow in interest calculation caused by lack of timestamp validation in `_getInterest()` & `_getRemainingInterest()` function
#552
code423n4
closed
1 year ago
1
Gas Optimizations
#551
code423n4
closed
1 year ago
1
> Should Be Used Instead Of >=
#550
code423n4
closed
1 year ago
2
QA Report
#549
code423n4
closed
1 year ago
1
Gas Optimizations
#548
code423n4
closed
1 year ago
1
Gas Optimizations
#547
code423n4
closed
1 year ago
1
IRREVERSIBLE SHUTDOWN FUNCTION
#546
code423n4
closed
1 year ago
2
QA Report
#545
code423n4
opened
1 year ago
1
CIE Violation Might Lead To Re-entrancy
#544
code423n4
closed
1 year ago
2
Gas Optimizations
#543
code423n4
closed
1 year ago
1
Inconsistent min deposit
#542
code423n4
closed
1 year ago
13
QA Report
#541
code423n4
opened
1 year ago
1
Gas Optimizations
#540
code423n4
opened
1 year ago
1
Attacker can fake an ERC20 token as the `paymentToken` and call ClearingHouse.safeTransferFrom() to prematurely settle the auction, preventing the actual auction from completing
#539
code423n4
closed
1 year ago
6
ERC20 approve fail for some tokens
#538
code423n4
closed
1 year ago
4
Gas Optimizations
#537
code423n4
closed
1 year ago
1
Previous
Next