The function claim is vulnerable to reentrancy attack
The mapping claimable is updated after token transfer. Malicious user could make use of that and perform reentrancy attack
Tokens being drained from the smart contract
Manual review
Update the mapping before transfer of the token or use the nonReentrant modifier from OZ ReentrancyGuard contract
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.