Good Entry - parsely's results

The best day trading platform to make every trade entry a Good Entry.

General Information

Platform: Code4rena

Start Date: 01/08/2023

Pot Size: $91,500 USDC

Total HM: 14

Participants: 80

Period: 6 days

Judge: gzeon

Total Solo HM: 6

Id: 269

League: ETH

Good Entry

Findings Distribution

Researcher Performance

Rank: 75/80

Findings: 1

Award: $12.88

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

12.8772 USDC - $12.88

Labels

bug
2 (Med Risk)
satisfactory
duplicate-83

External Links

Lines of code

https://github.com/code-423n4/2023-08-goodentry/blob/main/contracts/helper/V3Proxy.sol#L147-L158 https://github.com/code-423n4/2023-08-goodentry/blob/main/contracts/helper/V3Proxy.sol#L160-L176 https://github.com/code-423n4/2023-08-goodentry/blob/main/contracts/helper/V3Proxy.sol#L178-L194

Vulnerability details

Impact

Although this is similar to known findings M-14 (link to known findings M-14) , M-14 refers to a different contract (GeVault.sol), only has one instance indicated which is in that contract, and does not actually reference the .call function but the .deposit function of WETH. The return value from the low-level calls to return any funds to the msg.sender after the swap function is not checked and can lead to loss of funds for the msg.sender if the call fails.

payable(msg.sender).call{value: amountOut}("");

Tools Used

Manual Audit

Check for success on the call.

(bool success,) = payable(msg.sender).call{value: amountOut}(""); require(success, "Return of funds failed");

Assessed type

call/delegatecall

#0 - c4-pre-sort

2023-08-10T05:44:32Z

141345 marked the issue as duplicate of #481

#1 - c4-pre-sort

2023-08-10T06:02:54Z

141345 marked the issue as duplicate of #83

#2 - c4-judge

2023-08-20T17:11:34Z

gzeon-c4 marked the issue as satisfactory

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter