-
Notifications
You must be signed in to change notification settings - Fork 0
Issues: sherlock-audit/2024-11-hats-protocol-judging
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Albort - it uses invalid “transient” variables causing logic errors.
#60
opened Nov 23, 2024 by
sherlock-admin2
Taiger4526 - Potential Underflow Risk in checkTransaction Due to safe.nonce() - 1
#59
opened Nov 23, 2024 by
sherlock-admin3
0xlookman - A malicious user can prevent a signer from registering with a desired hat
#58
opened Nov 23, 2024 by
sherlock-admin4
Chupinexx - Single hatId Assigned to Multiple Wearers Enables Governance Manipulation
#56
opened Nov 23, 2024 by
sherlock-admin3
Taiger4526 - _countValidSignatures Fails if signatureSplit Method is Not Implemented
#55
opened Nov 23, 2024 by
sherlock-admin4
dobrevaleri - Threshold of existing Safe, could cause transaction failures
#51
opened Nov 23, 2024 by
sherlock-admin2
0xKann - Lack of Dynamic Threshold Adjustment for New Signers
#49
opened Nov 23, 2024 by
sherlock-admin3
Taiger4526 - An Attacker Can Arbitrarily Remove Safe Signers via removeSigner Method
#48
opened Nov 23, 2024 by
sherlock-admin4
0xKann - Ownership and Threshold Management Issue when First Signer Joins
#47
opened Nov 23, 2024 by
sherlock-admin2
Taiger4526 - An Attacker Can Register New Hats for Arbitrary Signers to Abuse Safe Signatures
#46
opened Nov 23, 2024 by
sherlock-admin3
parzival - Old signers and HSG can remove new signers and HSG, hijacking the safe wallet
#45
opened Nov 23, 2024 by
sherlock-admin4
0x3adeade - High Number of signers can make the Safe unusable.
#41
opened Nov 23, 2024 by
sherlock-admin2
0xKann - Vulnerability in Threshold Manipulation via Signer Reregistration
#40
opened Nov 23, 2024 by
sherlock-admin3
0xKann - Deployment of Malicious Safe Contracts During Hat Setup
#38
opened Nov 23, 2024 by
sherlock-admin4
pepocpeter - Attacker will Disrupt Batch Signer Registration through Front-running
#35
opened Nov 23, 2024 by
sherlock-admin4
Ragnarok - DoS Attack by Malicious Signer in HatsSignerGate
#34
opened Nov 23, 2024 by
sherlock-admin3
Ragnarok - Gas Limit exceeded due to Unbounded Array in HatsSignerGate::_removeSigner
#33
opened Nov 23, 2024 by
sherlock-admin2
Previous Next
ProTip!
Updated in the last three days: updated:>2025-01-12.