20,000 USDC
View results
Submission Details
Severity: medium

Pools are vulnerable to re-entrancy with ERC-777 tokens

Vulnerability Details

There are no re-entrancy guards on any of the functions, and the functions do not follow the checks-effects-interactions pattern. ERC777 are a subset of ERC20 and the protocol is meant to work with all ERC20 tokens. These re-entrancies can occur both in the transfer() and transferFrom functions.

Impact

Pools with ERC777 tokens are vulnerable to being drained via re-entrancy

Tools Used

Manual Review

Recommendations

ERC777 tokens should not be used in pools

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.