There is no mechanism to ensure that only whitelisted tokens are accepted in the tillIn function. An attacker could exploit this by depositing non-whitelisted or malicious tokens
An attacker could till in a malicious token, potentially disrupting the capital pool's operations or introducing vulnerabilities in the ecosystem if the malicious token has adverse effects
The presence of the non-whitelisted tokens could lead to issues in token accounting, market manipulation, or contract malfunction.
Manual review
CODE SNIPPET
Implement a check in the tillIn function to verify if the token is whitelisted before accepting the transaction.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.