Code snippet of Treasory.sol::deposit() -
token address isn't verified,
Attacker can put any fake token and hit deposit() function which will inflate _totalValue very high.
This will lead to disperncy between actual balance of treasory and internal accounting mapping _balances[token].
This can lead to incorrect amount of token related actions like depositing and withdrawing.
Same as above
Non synchronous value between actual balance of treasury contract and internal accounting, can lead many flaws in token inflow/ outflow operations.
Manual
Implement a require statement to verify if token is legit or not.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.