wrap in WStETHMock.sol vulnerable to reentrancy
Inside wrap() ,minting of stETHAmount_ amount of tokens is happening first and afterwards the stETHAmount_ amount of tokens are transferred from msg.sender to the contract address thus creating a re-entrancy attack.
Complete depletion of the token balance within the contract.
Manual Review
First Transfer tokens to contract and then mint the amount of tokens to msg.sender.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.