The unchecked return value from transferFrom can allow anyone to steal tokens from the lender contract
The functions setPool and borrow calls an unsafe transferFrom. For certain ERC20 tokens, if insufficient tokens are present, no revert occurs but a result of “false” is returned.
The unchecked return value from the call to transferFrom essentially allows;
attacker to call setPool and create pools without actually sending any loanToken
attacker to call borrow and borrow tokens from pools without actually putting up any collateral
attacker to call repay and repay loans without actually paying back their loans
e.t.c
Manual Analysis
consider using openzepplin SafeERC20 or checking the return value from the transfer from function call
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.