Kuiper contest - pauliax's results

Automated portfolio protocol.

General Information

Platform: Code4rena

Start Date: 16/09/2021

Pot Size: $50,000 USDC

Total HM: 26

Participants: 30

Period: 7 days

Judge: GalloDaSballo

Total Solo HM: 17

Id: 36

League: ETH

Kuiper

Findings Distribution

Researcher Performance

Rank: 15/30

Findings: 3

Award: $976.69

🌟 Selected for report: 6

🚀 Solo Findings: 0

Findings Information

🌟 Selected for report: 0xRajeev

Also found by: bw, pauliax

Labels

bug
duplicate
2 (Med Risk)
sponsor confirmed

Awards

270.5216 USDC - $270.52

External Links

Handle

pauliax

Vulnerability details

Impact

The same bounty can be claimed multiple times as it remains active. 'bounty' points to the memory variable, so its state is not persisted: Bounty memory bounty = _bounties[bountyIds[i]]; require(bounty.active); IERC20(bounty.token).transfer(msg.sender, bounty.amount); bounty.active = false;

A simple solution would be to use a storage pointer instead: Bounty storage bounty = _bounties[bountyIds[i]];

#0 - frank-beard

2021-09-28T21:31:14Z

#1 - GalloDaSballo

2021-12-19T15:47:20Z

Duplicate of #168

#2 - GalloDaSballo

2021-12-27T00:44:03Z

I ended up downgrading this finding as well as marking as duplicate because the warden didn't specify any attack vector via the vulnerability.

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter