-
Notifications
You must be signed in to change notification settings - Fork 5
Issues: sherlock-audit/2024-08-velar-artha-judging
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
bughuntoor - User could have impossible to close position if funding fees grow too big.
Escalation Resolved
This issue's escalations have been approved/rejected
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Confirmed
The sponsor acknowledged this issue is valid
Will Fix
The sponsor confirmed this issue will be fixed
#96
opened Sep 9, 2024 by
sherlock-admin4
bughuntoor - User can sandwich their own position close to get back all of their position fees
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
High
A High severity issue.
Reward
A payout will be made for this issue
Sponsor Confirmed
The sponsor acknowledged this issue is valid
Will Fix
The sponsor confirmed this issue will be fixed
#94
opened Sep 9, 2024 by
sherlock-admin2
bughuntoor - Whale LP providers can open positions on both sides to force users into high fees.
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#89
opened Sep 9, 2024 by
sherlock-admin3
bughuntoor - First depositor could DoS the pool
Escalation Resolved
This issue's escalations have been approved/rejected
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#85
opened Sep 9, 2024 by
sherlock-admin2
0xbranded - Funding Paid != Funding Received
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#83
opened Sep 9, 2024 by
sherlock-admin3
bughuntoor - Usage of This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
tx.origin
to determine the user is prone to attacks
Escalation Resolved
#82
opened Sep 9, 2024 by
sherlock-admin2
KupiaSec - Not decreasing oracle timestamp validation leads to DoS for protocol users
Escalation Resolved
This issue's escalations have been approved/rejected
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#79
opened Sep 9, 2024 by
sherlock-admin2
KupiaSec - Invalid Redstone oracle payload size prevents the protocol from working properly
Escalation Resolved
This issue's escalations have been approved/rejected
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#75
opened Sep 9, 2024 by
sherlock-admin4
pashap9990 - LPs cannot specify min amount received in burn function, causing loss of fund for them
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#74
opened Sep 9, 2024 by
sherlock-admin3
pashap9990 - Funding fee will be zero because of precision loss
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#72
opened Sep 9, 2024 by
sherlock-admin4
0xbranded - Fee Precision Loss Disrupts Liquidations and Causes Loss of Funds
Escalation Resolved
This issue's escalations have been approved/rejected
High
A High severity issue.
Reward
A payout will be made for this issue
Sponsor Confirmed
The sponsor acknowledged this issue is valid
Will Fix
The sponsor confirmed this issue will be fixed
#66
opened Sep 9, 2024 by
sherlock-admin4
4gontuk - LPs will withdraw more value than deposited during pegged token de-peg events
Escalation Resolved
This issue's escalations have been approved/rejected
Has Duplicates
A valid issue with 1+ other issues describing the same vulnerability
Medium
A Medium severity issue.
Reward
A payout will be made for this issue
Sponsor Disputed
The sponsor disputed this issue's validity
Won't Fix
The sponsor confirmed this issue will not be fixed
#52
opened Sep 9, 2024 by
sherlock-admin2
ProTip!
Add no:assignee to see everything that’s not assigned.