The ERC20 implementation uses custom Yul-based internals for balance and allowance updates.
These operations may bypass Solidity 0.8’s built-in safety checks, allowing arithmetic overflow or underflow.
This can corrupt balances, break total supply, or enable mint-like behavior by wrapping values around uint256.
Likelihood:
Custom Yul arithmetic executes without 0.8 overflow checks.
Any wallet or attacker transferring near boundary values can trigger wrap-around.
Impact:
Balance corruption.
Possible infinite mint through overflowed balances.
Permanent state damage leading to stuck or invalid supply.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.
The contest is complete and the rewards are being distributed.