Loss of Funds through MEV
Fees
contract uses exactInputSingle
call whose role is to swap the tokens through Uniswap router.
Issue here is that the amountOutMin
value has been set to 0
in both the cases. As there is no slippage protection, a malicious actor could, e.g., trivially insert transactions before and after this swapping transaction (using the infamous "sandwich" attack), causing the smart contract to trade at a radically worse price, profit from this at the caller's expense, and then return the contracts to their original state, all at a low cost.
VS Code
Recommend to add a amountOutMin
parameter in the function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.