Functions calling contracts/addresses with transfer hooks are missing reentrancy guards
Even if a function follows the best practice of check-effects-interaction, not using a reentrancy guard when there may be transfer hooks will open users of this protocol up to read-only reentrancy attacks, which cannot be prevented except by block-listing the whole protocol.
There are 2 instances of this issue:
Users of this protocol are vulnerable to read-only reentrancy attacks
Manual review
Use nonReentrant modifiers like you've used here:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.