In PreMarkets.sol
the functions createOffer
, createTaker
, listOffer
, closeOffer
, relistOffer
, abortAskOffer
, abortBidTaker
neither follow Checks Effects Interaction pattern nor do they have non-reentrant modifiers. For instance looking at abortBidTaker
as a case study for these issues;
As indicated by @audit
tags above, most functions in the protocol have no any protection against reentrancy.
Manipulation of protocol accounting to cause loss of funds and since protocol supports any ERC20 token, using ERC 777s, attacker can use hooks to callback into the functions to cause destruction
Manual Review
Use CEI pattern or simply use openzeppelin's Reentrancy Guard contract (nonReentrant
) modifier
Invalid, all [vague generalities](https://docs.codehawks.com/hawks-auditors/how-to-determine-a-finding-validity#vague-generalities) talking about possible reentrancies 11and afaik, reentrancy is not possible and not proven.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.