Normal behavior:
The contract is always active, and all functions are callable at any time. This ensures continuous operation and availability for users to create, amend, cancel, or fill orders.
Issue:
In the event of a discovered vulnerability, exploit, or emergency (such as a bug in a newly added token or a protocol-wide attack), there is no way for the owner to pause the contract. This means malicious activity or exploitation can continue unchecked until a new contract is deployed or a fix is implemented, potentially resulting in significant losses.
Likelihood:
Vulnerabilities or attacks may be discovered after deployment, especially as the protocol evolves or new tokens are added.
The owner cannot react quickly to stop contract activity, increasing the window for exploitation.
Impact:
Funds may be drained or further exploited before a fix can be deployed.
Loss of user trust and protocol funds, and potential legal or reputational consequences.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
View preliminary resultsAppeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.