The functions involve multiple external calls(e.g. token transfers) without proper reentrancy protection, which could be exploited.
An attacker could re-enter the function via callbacks, manipulating state variables like offerld, makerInfoMap, offerInfoMap, and stockInfoMap.
An attacker could exploit these external calls to re-enter the contracts and manipulate it's state.
Manual review
CODE SNIPPET
Use Reentrancy guard modifier to prevent reentrancy attacks
Invalid, all [vague generalities](https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity#vague-generalities) talking about possible reentrancies 11and afaik, reentrancy is not possible and not proven.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.