Part 2

Zaros
PerpetualsDEXFoundrySolidity
70,000 USDC
View results
Submission Details
Severity: high
Invalid

Audit Report for VaultRouterBranch.sol contract - High severity issues

Summary


external/
└── market-making/
└── branches/
└── VaultRouterBranch.sol

Functions like deposit, redeem, and unstake perform external calls (e.g., safeTransferFrom, safeTransfer) without reentrancy guards, allowing attackers to re-enter and manipulate the contract state.

Vulnerability Details

  1. Reentrancy Attack Risk

Code Affected:

All state-changing functions.

deposit(), redeem(), unstake()functions

Impact

  • Potential fund theft due to malicious reentrancy attacks.

  • Unauthorized state manipulation leading to financial losses.

Tools Used

  • Manual Code Review: Identified lack of reentrancy protection.

  • Slither: Detected potential reentrancy attack surfaces.

Recommendations

  1. Implement reentrancy guards (e.g., nonReentrant from OpenZeppelin’s ReentrancyGuard).

  2. Ensure external calls occur last in functions to prevent state inconsistencies.

  3. Perform thorough testing with adversarial reentrancy simulations.

Updates

Lead Judging Commences

inallhonesty Lead Judge 4 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.