id large_stringlengths 16 92 | source_platform large_stringclasses 3
values | contest large_stringclasses 418
values | issue_id large_stringlengths 0 25 | severity large_stringclasses 2
values | title large_stringlengths 3 307 | description large_stringlengths 0 495k | source_url large_stringlengths 0 86 | domain large_stringclasses 1
value | scraped_at large_stringdate 2026-05-08 04:37:49 2026-05-08 04:37:49 |
|---|---|---|---|---|---|---|---|---|---|
code4rena:2022-01-behodler-findings:102 | code4rena | 2022-01-behodler-findings | #102 | Medium | Calling `generateFLNQuote` twice in every block prevents any migration | # Handle
camden
# Vulnerability details
# Impact and PoC
https://github.com/code-423n4/2022-01-behodler/blob/71d8e0cfd9388f975d6a90dffba9b502b222bdfe/contracts/UniswapHelper.sol#L138
In the Uniswap helper, `generateFLNQuote` is public, so any user can generate the latest quote. If you call this twice in any block, ... | https://github.com/code-423n4/2022-01-behodler-findings/issues/102 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-notional-findings:200 | code4rena | 2022-01-notional-findings | #200 | Medium | latestAnswer doesn't check if the value is up to date | # Handle
pauliax
# Vulnerability details
## Impact
EIP1271Wallet.sol is calling latestAnswer to get the last price:
```solidity
uint256 oraclePrice = _toUint(
AggregatorV2V3Interface(priceOracle).latestAnswer()
);
```
This method will return the last value, but you won’t be able to check if the data is fresh. O... | https://github.com/code-423n4/2022-01-notional-findings/issues/200 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-notional-findings:197 | code4rena | 2022-01-notional-findings | #197 | Medium | Usage of deprecated ChainLink API in `EIP1271Wallet` | # Handle
cmichel
# Vulnerability details
The Chainlink API (`latestAnswer`) used in the `EIP1271Wallet` contract is deprecated:
> This API is deprecated. Please see API Reference for the latest Price Feed API. [Chainlink Docs](https://web.archive.org/web/20210304160150/https://docs.chain.link/docs/deprecated-aggre... | https://github.com/code-423n4/2022-01-notional-findings/issues/197 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-notional-findings:162 | code4rena | 2022-01-notional-findings | #162 | Medium | Improper Validation Of Chainlink's `latestAnswer` Function | # Handle
leastwood
# Vulnerability details
## Impact
The `latestAnswer` function does not allow `EIP1271Wallet._validateOrder` to validate the output of the Chainlink oracle query. As a result, it is possible for off-chain orders to use stale results, potentially allowing the taker of the order to extract more val... | https://github.com/code-423n4/2022-01-notional-findings/issues/162 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-notional-findings:70 | code4rena | 2022-01-notional-findings | #70 | Medium | Chainlink oracle query in `_validateOrder` does not check that response is fresh | # Handle
TomFrenchBlockchain
# Vulnerability details
## Impact
Potential for TreasuryManager to use a stale price to calculate the slippage limit, allowing unacceptable slippage relative to if the price feed was current.
## Proof of Concept
EIP1271Wallet queries Chainlink for the most recent price for various as... | https://github.com/code-423n4/2022-01-notional-findings/issues/70 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-timeswap-findings:166 | code4rena | 2022-01-timeswap-findings | #166 | High | `TimeswapPair.sol#borrow()` Attacker can increase `pool.state.y` to an arbitrary target value | # Handle
WatchPug
# Vulnerability details
`TimeswapPair.sol#borrow()` takes a user input value of `yIncrease`, and the `BorrowMath.check()` at L316 only checks for a minimal `yIncrease`, which means that it allows the state of `pool.state.y` to increase by the value of the user's input as long as it's larger than m... | https://github.com/code-423n4/2022-01-timeswap-findings/issues/166 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:138 | code4rena | 2022-01-yield-findings | #138 | Medium | Chainlink oracles might return stale data | # Handle
hack3r-0m
# Vulnerability details
Location: https://github.com/code-423n4/2022-01-yield/blob/main/contracts/Cvx3CrvOracle.sol#L120-L122
`DAI.latestRoundData` returns data from the latest round, but there is no guarantee that the latest round happened frequently, it might be a case where latestRoundData ha... | https://github.com/code-423n4/2022-01-yield-findings/issues/138 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:136 | code4rena | 2022-01-yield-findings | #136 | Medium | Oracle data feed is insufficiently validated. | # Handle
throttle
# Vulnerability details
## Impact
Price can be stale and can lead to wrong `quoteAmount` return value
## Proof of Concept
Oracle data feed is insufficiently validated. There is no check for stale price and round completeness.
Price can be stale and can lead to wrong `quoteAmount` return value
```... | https://github.com/code-423n4/2022-01-yield-findings/issues/136 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:132 | code4rena | 2022-01-yield-findings | #132 | Medium | Cvx3CrvOracle can report stale prices | # Handle
hyh
# Vulnerability details
## Impact
Whenever Chainlink's `latestRoundData` for any reason returns some not recent, but positive price, it will be used as current price by Cvx3CrvOracle's `peek` and `get` despite there will be no confirmation for it.
This way an attacker can monitor Chainlink oracle sta... | https://github.com/code-423n4/2022-01-yield-findings/issues/132 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:115 | code4rena | 2022-01-yield-findings | #115 | Medium | latestRoundData data may be stale | # Handle
sirhashalot
# Vulnerability details
## Impact
The Chainlink `latestRoundData()` function is used in Cvx3CrvOracle.sol, but it is used without checking whether the data returns from the oracle is stale or not. Chainlink warns about this issue and describes how to check for it: https://docs.chain.link/docs/... | https://github.com/code-423n4/2022-01-yield-findings/issues/115 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:104 | code4rena | 2022-01-yield-findings | #104 | Medium | Chainlink's `latestRoundData` might return stale results | # Handle
WatchPug
# Vulnerability details
https://github.com/code-423n4/2022-01-yield/blob/e946f40239b33812e54fafc700eb2298df1a2579/contracts/Cvx3CrvOracle.sol#L110-L127
```solidity
function _peek(
bytes6 base,
bytes6 quote,
uint256 baseAmount
) private view returns (uint256 quoteAm... | https://github.com/code-423n4/2022-01-yield-findings/issues/104 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:94 | code4rena | 2022-01-yield-findings | #94 | Medium | Cvx3CrvOracle misses sanity checks for Chainlink responses | # Handle
kenzo
# Vulnerability details
When querying Chainlink for stable prices, Cvx3CrvOracle doesn't run sanity checks against stale or incomplete results.
This is unlike Yield's [ChainlinkMultiOracle](https://github.com/yieldprotocol/vault-v2/blob/master/contracts/oracles/chainlink/ChainlinkMultiOracle.sol), wh... | https://github.com/code-423n4/2022-01-yield-findings/issues/94 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:90 | code4rena | 2022-01-yield-findings | #90 | Medium | Improper Validation Of Chainlink's `latestRoundData` Function | # Handle
leastwood
# Vulnerability details
## Impact
`latestRoundData` is missing additional validation to ensure that the round is complete and has returned a valid/expected price. This is documented [here](https://docs.chain.link/docs/faq/#how-can-i-check-if-the-answer-to-a-round-is-being-carried-over-from-a-pre... | https://github.com/code-423n4/2022-01-yield-findings/issues/90 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:78 | code4rena | 2022-01-yield-findings | #78 | Medium | Cvx3CrvOracle does not check that Chainlink data is fresh. | # Handle
TomFrenchBlockchain
# Vulnerability details
## Impact
Usage of stale prices when querying chainlink oracles.
## Proof of Concept
https://github.com/code-423n4/2022-01-yield/blob/e946f40239b33812e54fafc700eb2298df1a2579/contracts/Cvx3CrvOracle.sol#L115-L127
Cvx3CrvOracle queries chainlink oracles for the... | https://github.com/code-423n4/2022-01-yield-findings/issues/78 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:53 | code4rena | 2022-01-yield-findings | #53 | Medium | Oracle might return stale or incorrect results (Cvx3CrvOracle.sol) | # Handle
ye0lde
# Vulnerability details
## Impact
Oracle might return stale or incorrect results (Cvx3CrvOracle.sol)
The `_peek` function in the contract Cvx3CrvOracle.sol fetches the `daiPrice, usdcPrice, usdtPrice` from a Chainlink aggregator using the `latestRoundData` function.
If there is a problem with Cha... | https://github.com/code-423n4/2022-01-yield-findings/issues/53 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:41 | code4rena | 2022-01-yield-findings | #41 | Medium | Oracle prices could be not fresh | # Handle
0x1f8b
# Vulnerability details
## Impact
Unsafe oracle call.
## Proof of Concept
The contract `Cvx3CrvOracle` doesn't check that the data is fress, it call the method `latestRoundData`, this method allow you to run some extra validations, but these validations were not made.
According to the chain.link d... | https://github.com/code-423n4/2022-01-yield-findings/issues/41 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:7 | code4rena | 2022-01-yield-findings | #7 | Medium | SHOULD CHECK RETURN DATA FROM CHAINLINK AGGREGATORS | # Handle
defsec
# Vulnerability details
## Impact
The _peek function in the contract Cvx3CrvOracle.sol fetches the asset price from a Chainlink aggregator using the latestRoundData function. However, there are no checks on timestamp, resulting in stale prices. The oracle wrapper calls out to a chainlink oracle rec... | https://github.com/code-423n4/2022-01-yield-findings/issues/7 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-01-yield-findings:2 | code4rena | 2022-01-yield-findings | #2 | Medium | Chainlink's latestRoundData might return stale or incorrect results | # Handle
cccz
# Vulnerability details
## Impact
On Cvx3CrvOracle.sol, we are using latestRoundData, but there is no check if the return value indicates stale data. This could lead to stale prices according to the Chainlink documentation:
https://docs.chain.link/docs/historical-price-data/#historical-rounds
https:... | https://github.com/code-423n4/2022-01-yield-findings/issues/2 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-anchor-findings:47 | code4rena | 2022-02-anchor-findings | #47 | High | [WP-H3] `money-market-contracts/oracle#feed_prices()` delayed transaction may disrupt price feeds | # Lines of code
https://github.com/code-423n4/2022-02-anchor/blob/7af353e3234837979a19ddc8093dc9ad3c63ab6b/contracts/money-market-contracts/contracts/oracle/src/contract.rs#L106-L113
# Vulnerability details
https://github.com/code-423n4/2022-02-anchor/blob/7af353e3234837979a19ddc8093dc9ad3c63ab6b/contracts/money-ma... | https://github.com/code-423n4/2022-02-anchor-findings/issues/47 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-foundation-findings:53 | code4rena | 2022-02-foundation-findings | #53 | Medium | Upgradable escrow contract | # Lines of code
https://github.com/code-423n4/2022-02-foundation/blob/4d8c8931baffae31c7506872bf1100e1598f2754/contracts/FNDNFTMarket.sol
# Vulnerability details
## Impact
Upgradable escrow contract pose great risk to user who approved their NFT to the contract. Most popular token / NFT exchange do not require user... | https://github.com/code-423n4/2022-02-foundation-findings/issues/53 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:127 | code4rena | 2022-02-hubble-findings | #127 | High | QA Report | # 1
## Impact
Light DoS of USDC withdrawal system
## Proof of Concept
Currently, withdrawals are queued in an array and processed sequentially in a for loop.
However, a user can post unlimited number of tiny (1 wei) withdrawals.
Clearing these withdrawals can be gas consuming and can delay users.
(It is gas consuming... | https://github.com/code-423n4/2022-02-hubble-findings/issues/127 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:123 | code4rena | 2022-02-hubble-findings | #123 | Medium | Improper Validation Of Chainlink's `latestRoundData()` Function | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/Oracle.sol#L33
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/Oracle.sol#L115
# Vulnerability details
## Impact
The calls to the `latestRoundData()` function do not validate the output of the Chainlink oracle query. ... | https://github.com/code-423n4/2022-02-hubble-findings/issues/123 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:104 | code4rena | 2022-02-hubble-findings | #104 | Medium | Chainlink latestRoundData validation | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/Oracle.sol#L33
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/Oracle.sol#L64
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/Oracle.sol#L115
# Vulnerability details
## Impact
Oracle returns Chainlink ... | https://github.com/code-423n4/2022-02-hubble-findings/issues/104 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:99 | code4rena | 2022-02-hubble-findings | #99 | Medium | [WP-M6] Chainlink's `latestRoundData` might return stale results | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L24-L35
# Vulnerability details
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L24-L35
```solidity
function getUnderlyingP... | https://github.com/code-423n4/2022-02-hubble-findings/issues/99 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:90 | code4rena | 2022-02-hubble-findings | #90 | Medium | No check for stale chainlink oracle data in getUnderlyingPrice function | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L24-L35
# Vulnerability details
No check for stale chainlink oracle data in getUnderlyingPrice function
## Impact
There is no check if the value of answer returned by chainlink latestRoun... | https://github.com/code-423n4/2022-02-hubble-findings/issues/90 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:65 | code4rena | 2022-02-hubble-findings | #65 | Medium | Functions `getLatestRoundData` and `getRoundData` do not check that the price returned from a chainlink aggregator is != 0 (Oracle.sol) | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L106-L122
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L134
# Vulnerability details
## Impact
The `getLatestRoundData` fu... | https://github.com/code-423n4/2022-02-hubble-findings/issues/65 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:64 | code4rena | 2022-02-hubble-findings | #64 | Medium | Function `getUnderlyingPrice` in Oracle.sol does not check the price returned from chainlink aggregators | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/ed1d885d5dbc2eae24e43c3ecbf291a0f5a52765/contracts/Oracle.sol#L24-L35
# Vulnerability details
## Impact
The `getUnderlyingPrice ` function in the contract Oracle.sol fetches the `answer` directly from a Chainlink aggregator using the `latestRoundData... | https://github.com/code-423n4/2022-02-hubble-findings/issues/64 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:51 | code4rena | 2022-02-hubble-findings | #51 | Medium | AMM Cannot Be `initialize()` Except By Governance | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/AMM.sol#L93-L108
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/AMM.sol#L730-L734
https://github.com/code-423n4/2022-02-hubble/blob/main/contracts/legos/Governable.sol#L10-L13
# Vulnerability details
## Impact
The co... | https://github.com/code-423n4/2022-02-hubble-findings/issues/51 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-hubble-findings:10 | code4rena | 2022-02-hubble-findings | #10 | Medium | Oracle price could not be fresh | # Lines of code
https://github.com/code-423n4/2022-02-hubble/blob/8c157f519bc32e552f8cc832ecc75dc381faa91e/contracts/Oracle.sol#L115
# Vulnerability details
## Vulnerability
On [Oracle.sol#L115](https://github.com/code-423n4/2022-02-hubble/blob/8c157f519bc32e552f8cc832ecc75dc381faa91e/contracts/Oracle.sol#L115), we... | https://github.com/code-423n4/2022-02-hubble-findings/issues/10 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-pooltogether-findings:20 | code4rena | 2022-02-pooltogether-findings | #20 | Medium | `permitAndMulticall()` May Be Used to Steal Funds Or as a Denial Of Service if `_from` Is Not The Message Sender | # Lines of code
https://github.com/pooltogether/v4-twab-delegator/blob/2b6d42506187dd7096043e2dfec65fa06ab18577/contracts/PermitAndMulticall.sol#L46-L64
https://github.com/pooltogether/v4-twab-delegator/blob/2b6d42506187dd7096043e2dfec65fa06ab18577/contracts/PermitAndMulticall.sol#L31-L37
https://github.com/pooltogeth... | https://github.com/code-423n4/2022-02-pooltogether-findings/issues/20 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-pooltogether-findings:6 | code4rena | 2022-02-pooltogether-findings | #6 | Medium | DoS in `permitAndMulticall` | # Lines of code
https://github.com/pooltogether/v4-twab-delegator/blob/2b6d42506187dd7096043e2dfec65fa06ab18577/contracts/TWABDelegator.sol#L442
# Vulnerability details
## Impact
The `permitAndMulticall` function does _not_ authenticate the `_data` argument through any signatures.
Only the `_from, _amount` paramete... | https://github.com/code-423n4/2022-02-pooltogether-findings/issues/6 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-redacted-cartel-findings:49 | code4rena | 2022-02-redacted-cartel-findings | #49 | Medium | ThecosomataETH: Oracle price can be better secured (freshness + tamper-resistance) | # Lines of code
https://github.com/code-423n4/2022-02-redacted-cartel/blob/main/contracts/ThecosomataETH.sol#L94-L110
# Vulnerability details
## Preamble
The `ThecosomataETH` contract adds ETH and BTRFLY tokens as liquidity into the [ETH-BTRFLY curve crypto pool](https://etherscan.io/address/0xf43b15ab692fde1f9c24... | https://github.com/code-423n4/2022-02-redacted-cartel-findings/issues/49 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-02-tribe-turbo-findings:56 | code4rena | 2022-02-tribe-turbo-findings | #56 | High | [WP-M3] `TurboRouter.sol#createSafeAndDeposit*()` CreateSafeAndDeposit combo methods won't work as an allowance cannot be granted to a newly created Safe for deposit | # Lines of code
https://github.com/fei-protocol/tribe-turbo/blob/5e1c5d9b49dc557c84f07afabbba2ba4e08e9cc6/src/TurboRouter.sol#L49-L72
# Vulnerability details
The `TurboRouter.sol#deposit()` function can be used in a `multicall()` together with `approve()` and `pullToken()` from `PeripheryPayments` to pull tokens fr... | https://github.com/code-423n4/2022-02-tribe-turbo-findings/issues/56 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-biconomy-findings:180 | code4rena | 2022-03-biconomy-findings | #180 | Medium | Possible frontrun on deposits on LiquidityPool | # Lines of code
https://github.com/code-423n4/2022-03-biconomy/blob/main/contracts/hyphen/LiquidityPool.sol#L255
https://github.com/code-423n4/2022-03-biconomy/blob/main/contracts/hyphen/LiquidityPool.sol#L175-L188
# Vulnerability details
## Impact
Rewards are given to a user for depositing either ERC20 tokens or t... | https://github.com/code-423n4/2022-03-biconomy-findings/issues/180 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-lifinance-findings:124 | code4rena | 2022-03-lifinance-findings | #124 | Medium | Double spend msg.value in Swapper.sol | # Lines of code
https://github.com/code-423n4/2022-03-lifinance/blob/699c2305fcfb6fe8862b75b26d1d8a2f46a551e6/src/Facets/Swapper.sol#L14
https://github.com/code-423n4/2022-03-lifinance/blob/699c2305fcfb6fe8862b75b26d1d8a2f46a551e6/src/Libraries/LibSwap.sol#L42
https://github.com/code-423n4/2022-03-lifinance/blob/699c2... | https://github.com/code-423n4/2022-03-lifinance-findings/issues/124 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-lifinance-findings:123 | code4rena | 2022-03-lifinance-findings | #123 | Medium | Anyone can use all token hold by Li.Fi contract | # Lines of code
https://github.com/code-423n4/2022-03-lifinance/blob/699c2305fcfb6fe8862b75b26d1d8a2f46a551e6/src/Libraries/LibAsset.sol#L59-L70
https://github.com/code-423n4/2022-03-lifinance/blob/699c2305fcfb6fe8862b75b26d1d8a2f46a551e6/src/Libraries/LibSwap.sol#L33-L35
https://github.com/code-423n4/2022-03-lifinanc... | https://github.com/code-423n4/2022-03-lifinance-findings/issues/123 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-rolla-findings:11 | code4rena | 2022-03-rolla-findings | #11 | Medium | Chainlink pricer is using a deprecated API | # Lines of code
https://github.com/code-423n4/2022-03-rolla/blob/main/quant-protocol/contracts/pricing/oracle/ChainlinkOracleManager.sol#L112-L130
# Vulnerability details
## Impact
According to Chainlink's documentation, the latestAnswer function is deprecated. This function might suddenly stop working if Chainlink... | https://github.com/code-423n4/2022-03-rolla-findings/issues/11 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-rolla-findings:9 | code4rena | 2022-03-rolla-findings | #9 | Medium | Using deprecated Chainlink function latestAnswer | # Lines of code
https://github.com/code-423n4/2022-03-rolla/blob/efe4a3c1af8d77c5dfb5ba110c3507e67a061bdd/quant-protocol/contracts/pricing/oracle/ChainlinkOracleManager.sol#L120
# Vulnerability details
## Proof of Concept
According to Chainlink's documentation, the latestAnswer function is deprecated. This function... | https://github.com/code-423n4/2022-03-rolla-findings/issues/9 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-03-volt-findings:128 | code4rena | 2022-03-volt-findings | #128 | Medium | If `currentMonth` in init is 0, then CPI update will revert, zero div | This is a manual upgrade of the sixth item in QA report #86 , per judge @jack-the-pug's assessment of it as a Medium risk issue.
> If currentMonth in init is 0, then CPI update will revert, zero div
https://github.com/code-423n4/2022-03-volt/blob/main/contracts/oracle/ScalingPriceOracle.sol#L92
https://github.com/cod... | https://github.com/code-423n4/2022-03-volt-findings/issues/128 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:190 | code4rena | 2022-04-abranft-findings | #190 | High | No success required for Oracle market rate queries | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/main/contracts/NFTPairWithOracle.sol#L287
# Vulnerability details
## Impact
The system can use stale or even plainly incorrect (due to any technical malfunction) price for decision making.
For example, a malicious lender can setup a bot that track... | https://github.com/code-423n4/2022-04-abranft-findings/issues/190 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:166 | code4rena | 2022-04-abranft-findings | #166 | High | Malicious lender can change price oracle for outstanding loan | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/35906782c9ca3d167b96ccdbbdf6a9f61497aa7f/contracts/NFTPairWithOracle.sol#L223
# Vulnerability details
The `updateLoanParams` function in `NFTPairWithOracle.sol` allows the lender to update parameters for an outstanding loan (duration, valuation, ann... | https://github.com/code-423n4/2022-04-abranft-findings/issues/166 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:130 | code4rena | 2022-04-abranft-findings | #130 | High | Unchecked oracle return value | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/5cd4edc3298c05748e952f8a8c93e42f930a78c2/contracts/NFTPairWithOracle.sol#L287
https://github.com/code-423n4/2022-04-abranft/blob/5cd4edc3298c05748e952f8a8c93e42f930a78c2/contracts/NFTPairWithOracle.sol#L321
# Vulnerability details
## Impact
The ret... | https://github.com/code-423n4/2022-04-abranft-findings/issues/130 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:92 | code4rena | 2022-04-abranft-findings | #92 | High | [WP-H6] The validity of the oracle price is ignored, making it possible for the loan to be liquidated unfairly with an invalid or stale price | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/5cd4edc3298c05748e952f8a8c93e42f930a78c2/contracts/NFTPairWithOracle.sol#L287
# Vulnerability details
https://github.com/code-423n4/2022-04-abranft/blob/5cd4edc3298c05748e952f8a8c93e42f930a78c2/contracts/interfaces/INFTOracle.sol#L8
```solidity
int... | https://github.com/code-423n4/2022-04-abranft-findings/issues/92 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:55 | code4rena | 2022-04-abranft-findings | #55 | High | Mistake while checking LTV to lender accepted LTV | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/main/contracts/NFTPairWithOracle.sol#L316
# Vulnerability details
## Impact
It comments in the _lend() function that lender accepted conditions must be at least as good as the borrower is asking for.
The line which checks the accepted LTV (lender's ... | https://github.com/code-423n4/2022-04-abranft-findings/issues/55 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-abranft-findings:21 | code4rena | 2022-04-abranft-findings | #21 | High | The return value `success` of the get function of the INFTOracle interface is not checked | # Lines of code
https://github.com/code-423n4/2022-04-abranft/blob/5cd4edc3298c05748e952f8a8c93e42f930a78c2/contracts/interfaces/INFTOracle.sol#L10-L10
# Vulnerability details
## Impact
```
function get(address pair, uint256 tokenId) external returns (bool success, uint256 rate);
```
The get function of the INF... | https://github.com/code-423n4/2022-04-abranft-findings/issues/21 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:220 | code4rena | 2022-04-backd-findings | #220 | Medium | ChainLink latestRoundData data may be stale | Originally submitted by warden 0xkatana in https://github.com/code-423n4/2022-04-backd-findings/issues/63, duplicate of https://github.com/code-423n4/2022-04-backd-findings/issues/17.
# ChainLink latestRoundData data may be stale
## Impact
The Chainlink API `latestRoundData` function returns price data with other ti... | https://github.com/code-423n4/2022-04-backd-findings/issues/220 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:217 | code4rena | 2022-04-backd-findings | #217 | Medium | Missing freshness validation in ETH price oracle | Originally submitted by warden horsefacts in https://github.com/code-423n4/2022-04-backd-findings/issues/199, duplicate of https://github.com/code-423n4/2022-04-backd-findings/issues/17.
### Missing freshness validation in ETH price oracle
The `ChainlinkUsdWrapper#_ethPrice()` function does not check for a nonzero an... | https://github.com/code-423n4/2022-04-backd-findings/issues/217 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:212 | code4rena | 2022-04-backd-findings | #212 | Medium | ChainlinkOracleProvider can provide zero and stale prices | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/main/backd/contracts/oracles/ChainlinkOracleProvider.sol#L58
# Vulnerability details
## Impact
As stale price is determined by time since last timestamp, the price that is most recent, but wasn't updated for more than 2 hours (say there were no trade... | https://github.com/code-423n4/2022-04-backd-findings/issues/212 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:150 | code4rena | 2022-04-backd-findings | #150 | Medium | Chainlink's latestRoundData might return stale or incorrect results. | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkUsdWrapper.sol#L56
# Vulnerability details
## Impact
Chainlink's `latestRoundData` might return stale or incorrect results.
## Proof of Concept
Chainlink's `latestRoundData`... | https://github.com/code-423n4/2022-04-backd-findings/issues/150 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:140 | code4rena | 2022-04-backd-findings | #140 | Medium | Chainlink's `latestRoundData` might return stale or incorrect results | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkUsdWrapper.sol#L64
# Vulnerability details
## Impact
In `ChainlinkUsdWrapper.sol`, `latestRoundData()` is used but there is no check if the return value indicates stale data. T... | https://github.com/code-423n4/2022-04-backd-findings/issues/140 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:134 | code4rena | 2022-04-backd-findings | #134 | Medium | Chainlink data could get unintended stale price | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/main/backd/contracts/oracles/ChainlinkOracleProvider.sol#L55-L58
# Vulnerability details
## Impact
Though it checks `updatedAt` with `stalePriceDelay`, it still gets an unintended stale price without checking `roundId`.
## Proof of Concept
In `getP... | https://github.com/code-423n4/2022-04-backd-findings/issues/134 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:128 | code4rena | 2022-04-backd-findings | #128 | Medium | [WP-M13] Chainlink's `latestRoundData` might return stale or incorrect results | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkUsdWrapper.sol#L63-L66
# Vulnerability details
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkUsdWrap... | https://github.com/code-423n4/2022-04-backd-findings/issues/128 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:59 | code4rena | 2022-04-backd-findings | #59 | Medium | Chainlink's latestRoundData missing/invalid security checks | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkUsdWrapper.sol#L64
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkOracleProvider.sol#L58
# Vulnerabili... | https://github.com/code-423n4/2022-04-backd-findings/issues/59 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:51 | code4rena | 2022-04-backd-findings | #51 | Medium | Missing Validations In Chainlink's `latestRoundData` Function | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/main/backd/contracts/oracles/ChainlinkOracleProvider.sol#L55-L58
# Vulnerability details
## Impact
Here, `latestRoundData()` is missing an additional validation to ensure that the round is complete.
## Proof of Concept
https://github.com/code-423n4/2... | https://github.com/code-423n4/2022-04-backd-findings/issues/51 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:37 | code4rena | 2022-04-backd-findings | #37 | Medium | Call to Chainlink Oracle lacks proper checks | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/c856714a50437cb33240a5964b63687c9876275b/backd/contracts/oracles/ChainlinkOracleProvider.sol#L55-L58
# Vulnerability details
## Impact
Calls to the Chainlink price oracle via `getPriceUSD()` in `ChainlinkOracleProvider.sol` use the correct function `l... | https://github.com/code-423n4/2022-04-backd-findings/issues/37 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backd-findings:31 | code4rena | 2022-04-backd-findings | #31 | Medium | Should check return data from chainlink aggregators | # Lines of code
https://github.com/code-423n4/2022-04-backd/blob/main/backd/contracts/oracles/ChainlinkOracleProvider.sol#L55
# Vulnerability details
## Impact
The getPriceUSD function in the contract ChainlinkOracleProvider.sol fetches the asset price from a Chainlink aggregator using the latestRoundData function... | https://github.com/code-423n4/2022-04-backd-findings/issues/31 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:131 | code4rena | 2022-04-backed-findings | #131 | High | Loan buyouts can stick users with huge surprise bills | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L148
# Vulnerability details
## Impact
If a small loan is bought out with a new `loanAmount` in the millions, so much interest can be charged that the borrower is unable to pay... | https://github.com/code-423n4/2022-04-backed-findings/issues/131 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:124 | code4rena | 2022-04-backed-findings | #124 | High | Malicious users can frontrun borrowers trying to repay loans, causing DoS and possibly a loan default | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L129-L226
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L230-L250
# Vulnerability details
## Impac... | https://github.com/code-423n4/2022-04-backed-findings/issues/124 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:88 | code4rena | 2022-04-backed-findings | #88 | High | currentLoanOwner can manipulate loanInfo when any lenders try to buyout | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L205-L208
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L215-L218
# Vulnerability details
## Impact
If an attacker already calls `lend()` to lend to a loan, the attacker... | https://github.com/code-423n4/2022-04-backed-findings/issues/88 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:85 | code4rena | 2022-04-backed-findings | #85 | High | Borrower can be their own lender and steal funds from buyout due to reentrancy | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L214-L221
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L230-L250
# Vulnerability details
## Impac... | https://github.com/code-423n4/2022-04-backed-findings/issues/85 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:42 | code4rena | 2022-04-backed-findings | #42 | High | Allowing the lender to finalize a loan with an arbitrarily high amount can cause the borrower to default | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L148
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L382-L386
# Vulnerability details
## Impact
A borrower specifies a minimum loan amount. The lender can provide a loan a... | https://github.com/code-423n4/2022-04-backed-findings/issues/42 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:30 | code4rena | 2022-04-backed-findings | #30 | High | loan amount is unbounded | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L129
# Vulnerability details
The lender of a loan can lend an unbounded amount, which the borrower might not be able to pay its interest rate.
## Proof of Concept
Alice wants to borrow 1000 USDC, she creates a l... | https://github.com/code-423n4/2022-04-backed-findings/issues/30 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:24 | code4rena | 2022-04-backed-findings | #24 | High | Can force borrower to pay huge interest | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L148
# Vulnerability details
## Impact
The loan amount is used as a min loan amount. It can be matched as high as possible (realistically up to the collateral NFT's worth to re... | https://github.com/code-423n4/2022-04-backed-findings/issues/24 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:23 | code4rena | 2022-04-backed-findings | #23 | High | Bad Incentives For Lenders Who Buy Out Other Lenders | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L162-L224
# Vulnerability details
## Impact
Lenders are allowed to "buy out" another lender on a position via the `loan` function.
https://github.com/code-423n4/2022-04-backe... | https://github.com/code-423n4/2022-04-backed-findings/issues/23 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:17 | code4rena | 2022-04-backed-findings | #17 | High | Lack of Limit on `amount` Allows Borrowers To Be Extorted For Interest Payments | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L142-L162
# Vulnerability details
## Impact
There is on limit on the upper bounds on the amount a lender may send to a borrower. Borrowers will then be forced to pay interest ... | https://github.com/code-423n4/2022-04-backed-findings/issues/17 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:14 | code4rena | 2022-04-backed-findings | #14 | High | Borrower may be forced to pay more interest than he expected | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L148
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L174
# Vulnerability details
## Impact
Creatin... | https://github.com/code-423n4/2022-04-backed-findings/issues/14 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:9 | code4rena | 2022-04-backed-findings | #9 | High | Borrower collateral can be stolen | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L129
# Vulnerability details
## Impact
In case of collateral price fluctuation, lender can create a situation where borrower would be unable to repay the loan and lender could get hold of collateral
## Proof of ... | https://github.com/code-423n4/2022-04-backed-findings/issues/9 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:133 | code4rena | 2022-04-backed-findings | #133 | Medium | Consistently check account balance before and after transfers for Fee-On-Transfer discrepancies | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L155
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L159
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L203
# Vulnerability detail... | https://github.com/code-423n4/2022-04-backed-findings/issues/133 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:132 | code4rena | 2022-04-backed-findings | #132 | Medium | Code credits fee-on-transfer tokens for amount stated, not amount transferred | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L155
# Vulnerability details
Some ERC20 tokens, such as Tether (USDT), allow for charging a fee any time `transfer()` or `transferFrom()` is called.
## Impact
The code miscalc... | https://github.com/code-423n4/2022-04-backed-findings/issues/132 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:115 | code4rena | 2022-04-backed-findings | #115 | Medium | Burning `collateralContractAddress` by mistake in `closeLoan` | # Lines of code
[closeLoan; L116-216](https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L116-L126)
# Vulnerability details
## Impact
ERC721 used as collateral could possibly never return to borrower.
## Proof of Concept
No zero address check for `sendCollateralTo` might lead... | https://github.com/code-423n4/2022-04-backed-findings/issues/115 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:112 | code4rena | 2022-04-backed-findings | #112 | Medium | Lender can stop others from offering higher rates. | # Lines of code
[NFTLoandFacilitator.lend; L205](https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L205)
# Vulnerability details
## Impact
A lender using an upgradeable smart contract could stop other lenders from buying him out, essentially causing a DoS.
## Proof of Concept... | https://github.com/code-423n4/2022-04-backed-findings/issues/112 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:111 | code4rena | 2022-04-backed-findings | #111 | Medium | Malicious owner can steal some funds from borrower | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L306-L312
# Vulnerability details
## Impact
Owner can make changes to the protocol with immediate effect. Malicious owner can watch for big lend in the mempool and front run it by maxing out `originationFeeRate` ... | https://github.com/code-423n4/2022-04-backed-findings/issues/111 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:106 | code4rena | 2022-04-backed-findings | #106 | Medium | Use `safeTransferFrom()` consistently instead of `transferFrom()` | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L88
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L124
# Vulnerability details
## Impact
While the contracts use in most places `safeTransferFrom()` to transfer NFTs, t... | https://github.com/code-423n4/2022-04-backed-findings/issues/106 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:98 | code4rena | 2022-04-backed-findings | #98 | Medium | Using `transferFrom` on ERC721 tokens transfer | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L124
# Vulnerability details
## Impact
- In the function `closeLoan` of contract `NFTLoanFacilitator`, collateral ERC721 token is sent to `sendCollateralTo`, the `transferFrom`... | https://github.com/code-423n4/2022-04-backed-findings/issues/98 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:96 | code4rena | 2022-04-backed-findings | #96 | Medium | Take other lender loanTicket without improving any of the loan conditions | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L177
# Vulnerability details
## Impact
Take other lender loanTicket without improving any of the loan conditions
## Proof of Concept
The bug is in `NftLoanFacilliator.sol` in the `function lend()` (link1).
`&& p... | https://github.com/code-423n4/2022-04-backed-findings/issues/96 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:89 | code4rena | 2022-04-backed-findings | #89 | Medium | When an attacker lends to a loan, the attacker can trigger DoS that any lenders can not buyout it | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L205-L208
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L215-L218
# Vulnerability details
## Impact
If an attacker (lender) lends to a loan, the attacker can always reve... | https://github.com/code-423n4/2022-04-backed-findings/issues/89 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:83 | code4rena | 2022-04-backed-findings | #83 | Medium | `sendCollateralTo` is unchecked in `closeLoan()`, which can cause user's collateral NFT to be frozen | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L116-L126
# Vulnerability details
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L116-L126
```soli... | https://github.com/code-423n4/2022-04-backed-findings/issues/83 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:81 | code4rena | 2022-04-backed-findings | #81 | Medium | `mintBorrowTicketTo` can be a contract with no `onERC721Received` method, which may cause the BorrowTicket NFT to be frozen and put users' funds at risk | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L102-L102
# Vulnerability details
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L102-L102
```soli... | https://github.com/code-423n4/2022-04-backed-findings/issues/81 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:80 | code4rena | 2022-04-backed-findings | #80 | Medium | `requiredImprovementRate` can not work as expected when `previousInterestRate` less than 10 due to precision loss | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L167-L179
# Vulnerability details
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L167-L179
```sol... | https://github.com/code-423n4/2022-04-backed-findings/issues/80 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:75 | code4rena | 2022-04-backed-findings | #75 | Medium | Protocol doesn't handle fee on transfer tokens | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L155-L160
# Vulnerability details
## Impact
Since the borrower is able to specify any asset token, it is possible that loans will be created with tokens that support fee on tra... | https://github.com/code-423n4/2022-04-backed-findings/issues/75 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:51 | code4rena | 2022-04-backed-findings | #51 | Medium | Using `transferFrom` on ERC721 tokens | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L124
# Vulnerability details
In the function `closeLoan()` of contract `NFTLoanFacilitator.sol`, the `transferFrom` keyword is used instead of `safeTransferFrom`. If the arbitrary `sendCollateralTo` address is a ... | https://github.com/code-423n4/2022-04-backed-findings/issues/51 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:48 | code4rena | 2022-04-backed-findings | #48 | Medium | Lend and borrow tickets can be transferred to the NFTLoanFacilitator | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanTicket.sol#L10
# Vulnerability details
## Impact
Both lend and borrow tickets can be intentionally or accidentally transferred to the NFTLoanFacilitator contract. Since the NFTLoanFacilitator ... | https://github.com/code-423n4/2022-04-backed-findings/issues/48 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:41 | code4rena | 2022-04-backed-findings | #41 | Medium | Facilitator fee is higher than it should be if loan asset has fees on transfer | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L155-L160
# Vulnerability details
## Impact
When the lend asset is a token with fees on transfer, the facilitator fee is higher than it should be. The contract doesn't use the actual token amount it received but ... | https://github.com/code-423n4/2022-04-backed-findings/issues/41 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:33 | code4rena | 2022-04-backed-findings | #33 | Medium | Tokens with fee on transfer are not supported | # Lines of code
https://github.com/code-423n4/2022-04-backed/tree/main/contracts/NFTLoanFacilitator.sol#L155
# Vulnerability details
There are ERC20 tokens that charge fee for every transfer() / transferFrom().
Vault.sol#addValue() assumes that the received amount is the same as the transfer amount,
and uses it t... | https://github.com/code-423n4/2022-04-backed-findings/issues/33 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:28 | code4rena | 2022-04-backed-findings | #28 | Medium | Might not get desired min loan amount if `_originationFeeRate` changes | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L309
# Vulnerability details
## Impact
Admins can update the origination fee by calling `updateOriginationFeeRate`.
Note that a borrower does not receive their `minLoanAmount` ... | https://github.com/code-423n4/2022-04-backed-findings/issues/28 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:27 | code4rena | 2022-04-backed-findings | #27 | Medium | Borrowers lose funds if they call `repayAndCloseLoan` instead of `closeLoan` | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L241
# Vulnerability details
## Impact
The `repayAndCloseLoan` function does not revert if there has not been a lender for a loan (matched with `lend`).
Users should use `close... | https://github.com/code-423n4/2022-04-backed-findings/issues/27 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:21 | code4rena | 2022-04-backed-findings | #21 | Medium | NFTLoanFacilitator: Unsupported fee-on-transfer tokens | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L129-L227
# Vulnerability details
## Impact
loanAssetContractAddress is specified by the user when the user creates a loan.
When loanAssetContractAddress is fee-on-transfer tokens, in the lend function, the actua... | https://github.com/code-423n4/2022-04-backed-findings/issues/21 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:11 | code4rena | 2022-04-backed-findings | #11 | Medium | use of transferFrom | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/e8015d7c4b295af131f017e646ba1b99c8f608f0/contracts/NFTLoanFacilitator.sol#L124
# Vulnerability details
## Impact
NFTLoanFaciltator.closeLoan function uses transferFrom to transfer the collateral to "sendCollateralTo" address and if the contract and... | https://github.com/code-423n4/2022-04-backed-findings/issues/11 | defi | 2026-05-08T04:37:49Z |
code4rena:2022-04-backed-findings:8 | code4rena | 2022-04-backed-findings | #8 | Medium | Lender can lose funds | # Lines of code
https://github.com/code-423n4/2022-04-backed/blob/main/contracts/NFTLoanFacilitator.sol#L230
# Vulnerability details
## Impact
Since some tokens take transfer fees on performing transfer operations and current contract implementation is not considering same, lender funds could be lost
## Proof of C... | https://github.com/code-423n4/2022-04-backed-findings/issues/8 | defi | 2026-05-08T04:37:49Z |
SPECA Vulnerability Reports
A normalized corpus of public smart-contract audit findings, curated by the SPECA project. Each row is one expert-judged audit issue, deduplicated across public competitive-audit platforms.
The dataset is split into one config per security domain (defi,
lending, oracle, …). HuggingFace auto-detects each <domain>/
folder as a config; pick the domain you want at load time.
Loading
from datasets import load_dataset
# A specific domain (recommended).
ds = load_dataset("NyxFoundation/vulnerability-reports", "defi", split="train")
# Or, from inside the SPECA repo:
from scripts.datasets.load import load_findings
df = load_findings(domain="defi").to_pandas()
Schema
| Field | Type | Description |
|---|---|---|
id |
string | Stable key, <platform>:<contest-slug>:<issue_id>. |
source_platform |
string | One of code4rena, sherlock, codehawks. |
contest |
string | Slugified contest identifier. |
issue_id |
string | Platform-local issue / finding id, #-stripped. |
severity |
string | High / Medium / Low / Info. |
title |
string | Verbatim issue title from the upstream platform. |
description |
string | Verbatim issue body. |
source_url |
string | Best-effort upstream link (deterministic for code4rena; may be empty for others — check the scraper output if you need a guaranteed URL). |
domain |
string | Matches the config name (defi, lending, …). |
scraped_at |
string | ISO 8601 UTC timestamp of the underlying scrape that produced this row. |
Per-build state for each domain — row count, scrape time, source CSVs,
speca_commit — lives in <domain>/manifest.json rather than this card,
so re-publishing one domain doesn't churn another's metadata.
Provenance
All findings originate from public competitive-audit platforms:
- Code4rena — contest reports published openly
on GitHub under the
code-423n4org. - Sherlock — contest reports published
via Sherlock's public site and their
sherlock-auditGitHub org. - CodeHawks — contest reports published on the CodeHawks platform.
This dataset redistributes the publicly accessible finding metadata
(title, description, severity, source URL). The source_url column
points back to the upstream record. If you are the original author of a
finding and want it removed, please open an issue on the
SPECA repository.
How this dataset is built
The build pipeline lives in
scripts/datasets/
of the SPECA repo:
scripts/scrape_*.pypulls raw data from each platform into CSVs underbenchmarks/data/defi_audit_reports/.scripts/datasets/build_derived.pynormalizes those CSVs (and the curatedcsv/similar_audit_findings.csv) into the schema above and emits a parquet + manifest underdist/datasets/<domain>/.scripts/datasets/publish_hf.pypushes the parquet plus this README toNyxFoundation/vulnerability-reportson themainbranch, scoped to the published domain's folder.
The .github/workflows/datasets-publish.yml workflow runs the last two
steps on a self-hosted runner via workflow_dispatch.
License
The schema, build code, and dataset card are MIT-licensed. Original finding text is reproduced for research / educational use under the public terms of each upstream platform; consult the source URL for the authoritative version.
- Downloads last month
- 35