The contract uses call to transfer Ether, which could expose it to a reentrancy attack if the recepient is a malicious contract.
There is no checks for buyer have enough funds, order is valid etc.
(bool success, ) = payable(order.seller).call{value: (order.price - sellerFee)}("");
This can lead to reentrancy attack.
Foundry
It checks all condition wheather buyer has enough ETH, calculate the gas fee, updates state of the contract and then transfer the ETH
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.