Canto contest - asutorufos's results

Execution layer for original work.

General Information

Platform: Code4rena

Start Date: 14/06/2022

Pot Size: $100,000 USDC

Total HM: 26

Participants: 59

Period: 7 days

Judge: GalloDaSballo

Total Solo HM: 9

Id: 133

League: ETH

Canto

Findings Distribution

Researcher Performance

Rank: 47/59

Findings: 1

Award: $183.84

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

72.7276 USDC - $72.73

687.9945 CANTO - $111.11

Labels

bug
QA (Quality Assurance)

External Links

L-1 - Unspecific Compiler Version Pragma Avoid floating pragmas for non-library contracts. A known vulnerable compiler version may accidentally be selected or security tools might fall-back to an older compiler version ending up checking a different EVM compilation that is ultimately deployed on the blockchain. AccountantInterface.sol L#1 AccountantDelegate.sol L#1 AccountantDelegator.sol L#1 Comptroller.sol L#2

L-2 UNUSED RECEIVE() FUNCTION WILL LOCK ETHER IN CONTRACT If the intention is for the Ether to be used, the function should call another function, otherwise it should revert AccountantDelegate.sol L#94 AccountantDelegator.sol L#137

L-3 UNBOUNDED LOOP ON ARRAY CAN LEAD TO DOS As this array can grow quite large, the transaction’s gas cost could exceed the block gas limit and make it impossible to call this function at all GovernorBravoDelegate.sol L#68

#0 - GalloDaSballo

2022-08-02T01:05:42Z

## L-1 - Unspecific Compiler Version Pragma Valid NC

L-2 UNUSED RECEIVE() FUNCTION WILL LOCK ETHER IN CONTRACT

One of them is valid in that there's no sweep

L-3 UNBOUNDED LOOP ON ARRAY CAN LEAD TO DOS

Valid NC

1L 2 NC

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter