There are two instances where this vulnerability occurs
https://github.com/Cyfrin/2024-10-sablier/blob/8a2eac7a916080f2022527408b004578b21c51d0/src/SablierFlow.sol#L811
the above code reverts if totalDebt > type(uint128).max
this could mean that users might not be able to execute core functionalities like withdraw or refund if the supply of ERC20 token surpasses 128 bits, and the debt also surpasses 128 bits
A better approach would be to cap the debt at type(uint128).max
something like
debt > type(uint128).max ? type(uint128).max : debt
User funds could be locked
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.