Loss of Funds through MEV
Fees contract uses exactInputSingle call whose role is to swap the tokens through Uniswap router.
Issue here is that the amountOutMin value has been set to 0 in both the cases. As there is no slippage protection, a malicious actor could, e.g., trivially insert transactions before and after this swapping transaction (using the infamous "sandwich" attack), causing the smart contract to trade at a radically worse price, profit from this at the caller's expense, and then return the contracts to their original state, all at a low cost.
VS Code
Recommend to add a amountOutMin parameter in the function.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.