Dopex - gkrastenov's results

A rebate system for option writers in the Dopex Protocol.

General Information

Platform: Code4rena

Start Date: 21/08/2023

Pot Size: $125,000 USDC

Total HM: 26

Participants: 189

Period: 16 days

Judge: GalloDaSballo

Total Solo HM: 3

Id: 278

League: ETH

Dopex

Findings Distribution

Researcher Performance

Rank: 67/189

Findings: 1

Award: $181.37

🌟 Selected for report: 0

🚀 Solo Findings: 0

Findings Information

Awards

181.367 USDC - $181.37

Labels

bug
3 (High Risk)
satisfactory
sufficient quality report
duplicate-935

External Links

Lines of code

https://github.com/code-423n4/2023-08-dopex/blob/main/contracts/amo/UniV3LiquidityAmo.sol#L330

Vulnerability details

The admin has the right to recover an ERC721 token in the UniV3LiquidityAMO contract. He needs to call recoverERC721 and provide the tokenAddress and token_id values, where the token with token_id will be transferred to the rdpxV2Core contract.

INonfungiblePositionManager(tokenAddress).safeTransferFrom(
      address(this),
      rdpxV2Core,
      token_id
    );

The problem arises when an NFT is transferred to rdpxV2Core because it becomes locked within the contract and the removeLiquidity function can not be used.

Tools Used

Mannual Review

Add the possibility for ERC721 tokens to be transferred from the rdpxV2Core contract.

Assessed type

ERC721

#0 - c4-pre-sort

2023-09-09T06:40:57Z

bytes032 marked the issue as duplicate of #106

#1 - c4-pre-sort

2023-09-12T06:09:57Z

bytes032 marked the issue as sufficient quality report

#2 - c4-pre-sort

2023-09-12T06:12:28Z

bytes032 marked the issue as duplicate of #935

#3 - c4-judge

2023-10-20T18:05:16Z

GalloDaSballo marked the issue as satisfactory

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter