Occurrence of various external calls to IERC20 inside an unbounded for-loop.
External calls to IERC20 within an unbounded for-loop creates a possible DOS attack. In this case, the functions 'refinance', 'seizeLoan', 'startAuction', 'giveLoan', 'repay', and 'borrow' contain this vulnerability. An attacker could exploit this by creating conditions where the for-loop continues indefinitely, causing the smart contract to exhaust its gas limit.
Legitimate interactions with the contract—like refinancing loans, seizing loans, starting auctions, giving loans, repaying loans, and borrowing—could be blocked if exploited.
VS Code
Hardhat
Manual Review
Consider limiting the number of iterations in for-loops that make external calls.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.