The amendSellOrder
function should follow the checks-effects-interactions pattern to prevent reentrancy attacks during token transfers.
The function performs external token transfers before updating the order state, creating a potential reentrancy vulnerability where a malicious token could re-enter the contract.
Likelihood: Medium
Requires malicious ERC20 token to be whitelisted by owner
Attack complexity is moderate but feasible
Could be exploited if new tokens are added without proper vetting
Impact: High
Reentrancy could allow manipulation of order state
Potential double-spending or order manipulation attacks
Could lead to fund loss or protocol disruption
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
View preliminary resultsAppeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.