issues
search
hats-finance
/
Kintsu-0x7d70f9442af3a9a0a734fa6a1b4857f25518e9d2
Smart contracts for Kintsu
Other
0
stars
0
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Audit Report Draft Update
#67
shayzluf
opened
3 weeks ago
0
rewards will be stuck in the nomination_agent
#66
hats-bug-reporter[bot]
opened
1 month ago
11
Malicious inflating of sAZERO supply and spamming of invalid batch request
#65
hats-bug-reporter[bot]
opened
1 month ago
3
DOS/temporary lock of user funds if a validator node is slashed
#64
hats-bug-reporter[bot]
opened
1 month ago
3
unsynced `staked` value when unbond open for DOS
#63
hats-bug-reporter[bot]
opened
1 month ago
8
Anyone Could Prevent Users from Redeeming Their Tokens
#62
hats-bug-reporter[bot]
opened
1 month ago
3
Dos in send_batch_unlock_requests function due to invalid range for agent's boned AZERO
#61
hats-bug-reporter[bot]
opened
1 month ago
2
registry:libs.rs - `remove_agent` returns error when the agent has `weight > 0`
#60
hats-bug-reporter[bot]
opened
1 month ago
11
cault : data.rs : get_weight_imbalances did not check whether the agent has valid stake amount or not.
#59
hats-bug-reporter[bot]
opened
1 month ago
12
`nomination_agent` might be deactivated after calling `nomination_agent.compound`
#58
hats-bug-reporter[bot]
opened
1 month ago
1
`vault.stake` might revert when `nomination_agent.staked==0`
#57
hats-bug-reporter[bot]
opened
1 month ago
1
Wrong Value in Compound Emit Event
#56
hats-bug-reporter[bot]
opened
1 month ago
2
The Vault data total_pooled can be manipulated during yield compounding
#55
hats-bug-reporter[bot]
opened
1 month ago
1
The Vault data total_pooled can be manipulated
#54
hats-bug-reporter[bot]
opened
1 month ago
2
`unclaimed` data can mislead campaign owner when recover reward, late user claim will be affected
#53
hats-bug-reporter[bot]
opened
1 month ago
1
`vault.redeem` might revert when the pool is slashed
#52
hats-bug-reporter[bot]
opened
1 month ago
6
Nomination Agents Linked to Pools in Destroying or Blocked State Cause Revert in Compound and Stake Functions
#51
hats-bug-reporter[bot]
opened
1 month ago
3
GasToken(AZERO) might be stuck in nomination_agent contract when the pool is in destroy mode
#50
hats-bug-reporter[bot]
opened
1 month ago
0
The Vault data total_shares_minted can be manipulated
#49
hats-bug-reporter[bot]
opened
1 month ago
7
Minimum Stake Not Checked for Each Nomination Agent
#48
hats-bug-reporter[bot]
opened
1 month ago
4
Minimum Stake Not Checked in `compound` Function Causing DoS in Compound Function
#47
hats-bug-reporter[bot]
opened
1 month ago
1
Lost Fees due to Precision Loss during Fee Calculation in `Vault/data.rs:update_fees()`.
#46
hats-bug-reporter[bot]
opened
1 month ago
4
minimum_stake doesn't check the user's total stake amount, which prevents the user's next stake if the stake amount < minimum_stake
#45
hats-bug-reporter[bot]
opened
1 month ago
6
Incorrect calculation of `total_shares` lead to inflated number of shares being minted
#44
hats-bug-reporter[bot]
opened
1 month ago
2
Incorrect `Event::UnlockRedeemed` for`redeem`
#43
hats-bug-reporter[bot]
opened
1 month ago
3
User who opt for `request_unlock` at the end of epoch could not get sufficient time to apply for `cancel_unlock_request`
#42
hats-bug-reporter[bot]
opened
1 month ago
3
Out-of-flow balance transfer to NominationAgent may cause inconsistencies in the protocol
#41
hats-bug-reporter[bot]
opened
1 month ago
1
If there are 2 transactions in the same block, fees will be not accumulated
#40
hats-bug-reporter[bot]
opened
1 month ago
5
The function `update_agents()` doesn't check for the new weight to be bigger than the older weight of the agent
#39
hats-bug-reporter[bot]
opened
1 month ago
4
Unchecked Arithmetic in NominationAgent Contract
#38
hats-bug-reporter[bot]
opened
1 month ago
1
Lack of Input Validation in adjust_incentive
#37
hats-bug-reporter[bot]
opened
1 month ago
2
Unauthorized Access Vulnerability in set_code Function of Vault Contract
#36
neuraldevx
closed
1 month ago
0
Unauthorized Access Vulnerability in set_code Function of Vault Contract
#35
hats-bug-reporter[bot]
opened
1 month ago
1
Risk of Share Manipulation
#34
hats-bug-reporter[bot]
opened
1 month ago
3
Malicious user can cause denying of batching of unlock requests causing loss to users
#33
hats-bug-reporter[bot]
opened
1 month ago
3
Test
#32
hats-bug-reporter[bot]
opened
1 month ago
0
funds are always remain in `NominationAgent`
#31
hats-bug-reporter[bot]
opened
1 month ago
2
Potential DOS in `delegate_compound` Function
#30
hats-bug-reporter[bot]
opened
1 month ago
3
Inconsistency in Nomination Pool Joining Logic
#29
hats-bug-reporter[bot]
opened
1 month ago
0
KIN-H02: Malicious users can prevent other users from redeeming rewards by manipulating `total_pooled` with duplicate withdrawal requests
#28
hats-bug-reporter[bot]
opened
1 month ago
8
Users can bypass `minimum_stake` requirement by staking and the redeeming
#27
hats-bug-reporter[bot]
opened
1 month ago
3
`unlock_id` open for duplication then user can lost their asset when redeeming
#26
hats-bug-reporter[bot]
opened
1 month ago
4
New users receive more shares than users who stakes earlier
#25
hats-bug-reporter[bot]
opened
1 month ago
6
Use ink! version 5.0.0 instead of 4.3.0
#24
hats-bug-reporter[bot]
opened
1 month ago
3
`withdraw_fees()` violates CEI pattern
#23
hats-bug-reporter[bot]
opened
1 month ago
2
`NominationAgent` contract lack of transfer admin function
#22
hats-bug-reporter[bot]
opened
1 month ago
2
Any user can drain the bonded AZERO from the pool
#21
hats-bug-reporter[bot]
opened
1 month ago
5
Having only one member per role might not be wanted
#20
hats-bug-reporter[bot]
opened
1 month ago
1
`set_code()` function does not follow the `ink!` recommended implementation
#19
hats-bug-reporter[bot]
opened
1 month ago
3
Inconsistency in Fee Calculation in `update_fees` Function
#18
hats-bug-reporter[bot]
opened
1 month ago
4
Next