HardhatDeFi
15,000 USDC
View results
Submission Details
Severity: high
Invalid

Reentrancy in WToken Redemption

Summary

Lack of reentrancy guards during WToken unwrapping allows recursive attacks.

Vulnerability Details

When users call redeemWToken, the contract burns WTokens, withdraws aTokens from Aave, and transfers collateral. An attacker could re-enter the function during the transfer step to drain funds.

Impact

Loss of user collateral due to reentrant withdrawals.

Tools Used

Slither reentrancy detector, manual analysis.

Recommendations

Use OpenZeppelin’s ReentrancyGuard on redeemWToken

Updates

Lead Judging Commences

bube Lead Judge 5 months ago
Submission Judgement Published
Invalidated
Reason: Incorrect statement

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.