├── Code4rena ├── 2022-12-caviar │ ├── GAS │ │ └── README.md │ └── README.md ├── 2022-12-escher │ ├── GAS │ │ └── README.md │ ├── README.md │ ├── [MEDIUM]-Possible_DOS_IN_BUY()_FUNCTION_OF_LPDA_CONTRACT │ │ └── README.md │ ├── [MEDIUM]-[H-01]_EXTERNAL_CONTRACT_REFERENCE_WITH_MALICIOUS_INTENT │ │ └── README.md │ └── [MEDIUM]-call()_should_be_used_instead_of_transfer()_on_an_address_payable │ │ └── README.md ├── 2022-12-prepo │ ├── GAS │ │ └── README.md │ ├── QA │ │ └── README.md │ ├── README.md │ └── [MEDIUM]-POSSIBLE_FRONTRUNNING_ATTACK_ON_MINTING_LONG-SHORT_POSITIONS │ │ └── README.md ├── 2023-01-rabbithole │ ├── README.md │ ├── [HIGH]-[H-01]_Any_user_can_drain_rewardToken_contract │ │ └── README.md │ ├── [HIGH]-[M-01]_Wrong_onlyMinter_modifier_implementation_-_anyone_can_mint_a_token │ │ └── README.md │ └── [MEDIUM]-DOS_risk_if_enough_tokens_are_minted_in_Quest.claim │ │ └── README.md ├── 2023-03-neotokyo │ ├── README.md │ └── [HIGH]-Staker_can_get_unlimited_amount_of_LP_points │ │ └── README.md └── README.md ├── README.md ├── Report-template.md └── audits ├── DivaVesting(QA).md ├── OpenPeer.md └── TalentLayer.md /Code4rena/2022-12-caviar/GAS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-caviar/GAS/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-caviar/README.md: -------------------------------------------------------------------------------- 1 | # Findings for 2022-12-caviar 2 | 3 | - [[GAS]](GAS/README.md) 4 | -------------------------------------------------------------------------------- /Code4rena/2022-12-escher/GAS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-escher/GAS/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-escher/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-escher/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-escher/[MEDIUM]-Possible_DOS_IN_BUY()_FUNCTION_OF_LPDA_CONTRACT/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-escher/[MEDIUM]-Possible_DOS_IN_BUY()_FUNCTION_OF_LPDA_CONTRACT/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-escher/[MEDIUM]-[H-01]_EXTERNAL_CONTRACT_REFERENCE_WITH_MALICIOUS_INTENT/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-escher/[MEDIUM]-[H-01]_EXTERNAL_CONTRACT_REFERENCE_WITH_MALICIOUS_INTENT/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-escher/[MEDIUM]-call()_should_be_used_instead_of_transfer()_on_an_address_payable/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-escher/[MEDIUM]-call()_should_be_used_instead_of_transfer()_on_an_address_payable/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-prepo/GAS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-prepo/GAS/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-prepo/QA/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-prepo/QA/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-prepo/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-prepo/README.md -------------------------------------------------------------------------------- /Code4rena/2022-12-prepo/[MEDIUM]-POSSIBLE_FRONTRUNNING_ATTACK_ON_MINTING_LONG-SHORT_POSITIONS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2022-12-prepo/[MEDIUM]-POSSIBLE_FRONTRUNNING_ATTACK_ON_MINTING_LONG-SHORT_POSITIONS/README.md -------------------------------------------------------------------------------- /Code4rena/2023-01-rabbithole/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-01-rabbithole/README.md -------------------------------------------------------------------------------- /Code4rena/2023-01-rabbithole/[HIGH]-[H-01]_Any_user_can_drain_rewardToken_contract/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-01-rabbithole/[HIGH]-[H-01]_Any_user_can_drain_rewardToken_contract/README.md -------------------------------------------------------------------------------- /Code4rena/2023-01-rabbithole/[HIGH]-[M-01]_Wrong_onlyMinter_modifier_implementation_-_anyone_can_mint_a_token/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-01-rabbithole/[HIGH]-[M-01]_Wrong_onlyMinter_modifier_implementation_-_anyone_can_mint_a_token/README.md -------------------------------------------------------------------------------- /Code4rena/2023-01-rabbithole/[MEDIUM]-DOS_risk_if_enough_tokens_are_minted_in_Quest.claim/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-01-rabbithole/[MEDIUM]-DOS_risk_if_enough_tokens_are_minted_in_Quest.claim/README.md -------------------------------------------------------------------------------- /Code4rena/2023-03-neotokyo/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-03-neotokyo/README.md -------------------------------------------------------------------------------- /Code4rena/2023-03-neotokyo/[HIGH]-Staker_can_get_unlimited_amount_of_LP_points/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/2023-03-neotokyo/[HIGH]-Staker_can_get_unlimited_amount_of_LP_points/README.md -------------------------------------------------------------------------------- /Code4rena/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Code4rena/README.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/README.md -------------------------------------------------------------------------------- /Report-template.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/Report-template.md -------------------------------------------------------------------------------- /audits/DivaVesting(QA).md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/audits/DivaVesting(QA).md -------------------------------------------------------------------------------- /audits/OpenPeer.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/audits/OpenPeer.md -------------------------------------------------------------------------------- /audits/TalentLayer.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ahmedovv123/audits/HEAD/audits/TalentLayer.md --------------------------------------------------------------------------------