Skip to content

Not verified input #49

@code423n4

Description

@code423n4

Handle

mics

Vulnerability details

external / public functions parameters should be validated to make sure the address is not 0.
Otherwise if not given the right input it can mistakenly lead to loss of user funds.


    OpenLevV1Lib.sol.doTransferOut weth
    OpenLevV1Lib.sol.doTransferOut to
    FarmingPools.sol.notifyRewardAmount stakeToken
    ControllerDelegator.sol.constructor _xoleToken
    EthDexAggregatorV1.sol.getAvgPrice desToken
    LPool.sol.reduceReserves to
    OpenLevV1.sol.doTransferOut to
    XOLE.sol._moveDelegates dstRep
    EthDexAggregatorV1.sol.updatePriceOracle quoteToken
    UniV3Dex.sol.uniV3Buy sellToken
    LPool.sol.repayBorrowEndByOpenLev borrower
    LPool.sol.borrowBalanceStored account
    UniV3Dex.sol.increaseV3Observation quoteToken
    OpenLevDelegator.sol.constructor _dexAggregator
    LPool.sol.borrowBalanceStoredInternal account
    ControllerDelegator.sol.constructor _wETH

Metadata

Metadata

Assignees

No one assigned

    Labels

    0 (Non-critical)Code style, clarity, syntax, versioning, off-chain monitoring (events etc), exclude gas optimisationbugSomething isn't workingsponsor acknowledgedTechnically the issue is correct, but we're not going to resolve it for XYZ reasons

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions