buyOrder
functionThe buyOrder
function violates CEI by performing external token transfers after updating critical state, creating a window for potential reentrancy exploitation if validation mechanisms fail
Likelihood: Low
Currently mitigated by isActive
validation check, but creates fragile security dependency
Future code modifications could inadvertently weaken validation logic
Non-standard pattern increases audit complexity and potential for overlooked vulnerabilities
Custom ERC20 tokens with complex transfer logic could exploit the pattern violation
Impact: Medium
If validation fails or is bypassed, multiple order executions could drain buyer funds
totalFees
variable corruption could lead to accounting inconsistencies
Breaking of core protocol invariants (one order = one execution)
Potential for sophisticated attacks combining multiple vectors
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.