Part 2

Zaros
PerpetualsDEXFoundrySolidity
70,000 USDC
View results
Submission Details
Severity: low
Invalid

Possible Reentrancy During Fee Transfers in FeeDistributionBranch.sol::receiveMarketFee

Summary

The function receiveMarketFee(...) is vulnerable to reentrancy attacks due to external calls before state updates.

Vulnerability Details

  • The function calls transferFrom before updating state, allowing potential reentrancy.

  • A malicious token could re-enter contract functions before state updates are finalized.

IERC20(asset).safeTransferFrom(msg.sender, address(this), amount);

Impact

Double-counting or bypassing supply checks, leading to potential fund loss.

Tools Used

Manual code review.

Recommendations

  • Implement reentrancy guards.

  • Update state before making external calls.

Updates

Lead Judging Commences

inallhonesty Lead Judge 10 months ago
Submission Judgement Published
Invalidated
Reason: Lack of quality

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.

Give us feedback!