This repository has been archived by the owner on Oct 29, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 2
Session 3 Numoen protocol Audit Report #12
Comments
High Risk Finding H-01 precision loss in the invariant function can cause an attacket to steal funds without impacting the invariant function()
the testAttack function is so exquisite that there is more to read and understand the prank function and idea; also it seems that attacker should know the exact amount to withdraw or swap. I am still not clear on the a+b>=c+d would return and if it is expecting true/false or a positive number and what the uint256 UpperBound represents. |
[M-02] First liquidity provider will suffer from revert or fund loss
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Audit report for this discussion is here on the Numoen protocol: https://code4rena.com/reports/2023-01-numoen/
Please leave a comment with your analysis of an vulnerability and/or questions and thoughts your have.
The text was updated successfully, but these errors were encountered: