20,000 USDC
View results
Submission Details
Severity: medium

Pools are vulnerable to re-entrancy with ERC-777 tokens

Vulnerability Details

There are no re-entrancy guards on any of the functions, and the functions do not follow the checks-effects-interactions pattern. ERC777 are a subset of ERC20 and the protocol is meant to work with all ERC20 tokens. These re-entrancies can occur both in the transfer() and transferFrom functions.

Impact

Pools with ERC777 tokens are vulnerable to being drained via re-entrancy

Tools Used

Manual Review

Recommendations

ERC777 tokens should not be used in pools

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!