Part 2

Zaros
PerpetualsDEXFoundrySolidity
70,000 USDC
View results
Submission Details
Severity: high
Invalid

Reentrancy in Fee/Collateral Handling

Summary

ETH/WETH transfers during fee distribution or USDz swaps are vulnerable to reentrancy attacks.

Vulnerability Details

MarketMakingEngine uses raw call() for ETH transfers (e.g., sendWETHToLPs()) without reentrancy guards.

Impact

Malicious actors could re-enter the contract to drain WETH or manipulate collateral balances.

Tools Used

Slither (reentrancy detector), manual analysis.

Recommendations

Use ReentrancyGuard and follow checks-effects-interactions patterns. Replace call() with transfer() for ETH.

Updates

Lead Judging Commences

inallhonesty Lead Judge 4 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.