Tadle

Tadle
DeFiFoundry
27,750 USDC
View results
Submission Details
Severity: low
Invalid

Potential Reentrancy on tillIn Function

Summary

If the tillIn function transfers tokens, there is a potential for a reentrancy attack, where an attacker could recursively call the function to drain tokens.

Vulnerability Details

A malicious contract could exploit a reentrancy vulnerability by calling the tillIn function in a recursive manner to deplete the capital pool

Impact

This could result in significant financial loss as the pool could be drained by the attack.

Tools Used

Manual review

CODE SNIPPET

function tillIn(
address accountAddress,
address tokenAddress,
uint256 amount,
bool isPointToken
) external payable;

Recommendations

Use the Check-Effects interactions pattern, or integrate OpenZeppelin's ReentrancyGuard.

function tillIn(
address accountAdress,
address tokenAdress,
uint256 amount,
bool isPointToken
)external payble nonReentrant {
//function logic
}
Updates

Lead Judging Commences

0xnevi Lead Judge 12 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality
Assigned finding tags:

[invalid] finding-PreMarkets-reentrancy

Invalid, all [vague generalities](https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity#vague-generalities) talking about possible reentrancies 11and afaik, reentrancy is not possible and not proven.

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.