| Severity | Tool | Title | Validated | Confirmed |
|---|---|---|---|---|
| high | slither | Pool.safeRewardTransfer(address,uint256) (contracts/Contract.sol#1269-1276) ignores return value by rewardToken.transfer(_to,balance) (contracts/Contract.sol#1272-1273) | no | — |
| high | slither | Pool.safeRewardTransfer(address,uint256) (contracts/Contract.sol#1269-1276) ignores return value by rewardToken.transfer(_to,_amount) (contracts/Contract.sol#1273-1276) | no | — |
| high | detector | Authorization based on tx.origin | no | — |
| high | codex | Pool can be permanently bricked after endBlock due to underflow in reward calculation | no | — |
| medium | detector | Untrusted CALL target/value reachable | no | no |
| medium | detector | ETH value transfer possible | no | no |
| medium | slither | Reentrancy in Pool.withdraw(uint256,uint256) (contracts/Contract.sol#1255-1269): | no | — |
| medium | codex | Reentrancy in deposit via untrusted pool tokens can double-claim rewards | no | — |
| medium | slither | Reentrancy in Pool.deposit(uint256,uint256) (contracts/Contract.sol#1237-1255): | no | — |
| medium | slither | Reentrancy in Pool.updatePool(uint256) (contracts/Contract.sol#1207-1221): | no | — |
| low | codex | Fee-on-transfer/rebasing tokens break accounting and reward distribution | no | — |
| info | cast | Heavy EXTCODE*/BALANCE usage | no | — |
| Run ID | Status | Validated | Total findings | Created |
|---|---|---|---|---|
| 019c0ea9-0936-7262-bcf9-9ef5de23bf57 | complete | crit 0 high 0 | 12 | 2 months ago |