Zokyo Auditing Tutorials
Ctrlk
  • 🔐Zokyo Auditing Tutorials
  • 📚Tutorials
    • 🏃Tutorial 1: Front-Running
    • 🧱Tutorial 2: Unsafe Casting
    • 👍Tutorial 3: Approvals and Safe Approvals
    • ⛓️Tutorial 4: Block.chainid, DOMAIN_SEPARATOR and EIP-2612 permit
  • 💰Tutorial 5: Fee-On-Transfer Tokens
  • 🌴Tutorial 6: Merkle Trees
  • 🌳Tutorial 7: Merkle-Patricia Trees
  • 🔁Tutorial 8: Reentrancy
  • 🔂Tutorial 9: Read-Only Reentrancy
  • 🚆Tutorial 10: ERC20 transfer() and safeTransfer()
  • 📞Tutorial 11: Low level .call(), .transfer() and .send()
  • ☎️Tutorial 12: Delegatecall Vulnerabilities in Precompiled Contracts
  • 🌊Tutorial 13: Liquid Staking
  • 🚿Tutorial 14: Slippage
    • 🚀Prerequisites
    • 📘Understanding Slippage in Automated Market Makers (AMMs)
    • 💀Understanding the "Lack of Slippage Check" Vulnerability in Automated Market Makers (AMMs) and DEXs
    • 😡On-Chain Slippage Calculations Vulnerability
    • 📛0 slippage tolerance vulnerability
    • 👓Real World Examples
    • 🏦Resource bank to more slippage vulnerabilities
    • 🤝Slippage Conclusion
  • 📉Tutorial 15: Oracles
  • 🧠Tutorial 16: Zero Knowledge (ZK)
  • 🤝Tutorial 17 DEX's (Decentralized Exchanges)
  • 🤖Tutorial 18: Proxies
  • 🔞Tutorial 19: 18 Decimal Assumption
  • ➗Tutorial 20: Arithmetic
  • 🔁Tutorial 21: Unbounded Loops
  • 📔Tutorial 22: `isContract`
  • 💵Tutorial 23: Staking
  • ⛓️Tutorial 24: Chain Re-org Vulnerability
  • 🌉Tutorial 25: Cross Chain Bridges Vulnerabilities
  • 🚰Tutorial 26: Integer Underflow and Overflow Vulnerabilities in Solidity (Before 0.8.0)
  • 🥏Tutorial 27: OpenZeppelin Vulnerabilities
  • 🖊️Tutorial 28: Signature Vulnerabilities / Replays
  • 🤝Tutorial 29: Solmate Vulnerabilities
  • 🧱Tutorial 30: Inconsistent block lengths across chains
  • 💉Tutorial 31: NFT JSON and XSS injection
  • 🍃Tutorial 32: Merkle Leafs
  • 0️Tutorial 33: Layer 0
  • ♻️Tutorial 34: Forgetting to Update the Global State in Smart Contracts
  • ‼️Tutorial 35: Wrong Function Signature
  • 🛑Tutorial 36: Handling Edge Cases of Banned Addresses in DeFi
  • Tutorial 37: initializer and onlyInitializing
  • ➗Tutorial 38: Eigen Layer
  • ⚫Tutorial 39: Wormhole
  • 💼Tutorial 40: Uniswap V3
  • 🔢Tutorial 41: Multiple Token Addresses in Proxied Tokens
  • 🤖Tutorial 42: abiDecoder v2
  • ❓Tutorial 43: On-Chain Randomness
  • 😖Tutorial 44: Weird ERC20 Tokens
  • 🔨Tutorial 45: Hardcoded stable coin values
  • ❤️Tutorial 46: The Risks of Chainlink Heartbeat Discrepancies in Smart Contracts
  • 👣Tutorial 47: The Risk of Forgetting a Withdrawal Mechanism in Smart Contracts
  • 💻Tutorial 48: Governance and Voting
  • 📕Tutorial 49: Not Conforming To EIP standards
  • ⏳Tutorial 50: Vesting
  • ⛽Tutorial 51: Ethereum's 63/64 Gas Rule
  • 📩Tutorial 52: NPM Dependency Confusion and Unclaimed Packages
  • 🎈Tutorial 53: Airdrops
  • 🎯Tutorial 54: Precision
  • Tutorial 55: AssetIn == AssetOut, FromToken == ToToken
  • 🚿Tutorial 56: Vulnerabilities Related to LP Tokens Being the Same as Reward Tokens
  • Tutorial 57: Unsanitized SWAP Paths and Arbitrary Contract Call Vulnerabilities
  • Tutorial 58: The Risk of Infinite Approvals and Arbitrary Contract Calls
  • Tutorial 59: Low-Level Calls in Solidity Returning True for Non-Existent Contracts
  • 0️⃣Tutorial 60: The Impact of PUSH0 and the Shanghai Hardfork on Cross-Chain Deployments > 0.8.20
  • 🐍Tutorial 61: Vyper Vulnerable Versions
  • ⌨️Tutorial 62: Typos in Smart Contracts — The Silent Threat Leading to Interface Mismatch
  • ☁️Tutorial 63: Balance Check Using ==
  • 💍Tutorial 64: Equal Royalties for Unequal NFTs
  • 🖼️Tutorial 65: ERC721 and NFTs
  • 2️⃣Tutorial 66: Vulnerability Arising from NFTs Supporting Both ERC721 and ERC1155 Standards
  • 📷Tutorial 67: ERC1155 Vulnerabilities
  • 🪟Informational Vulnerabilities
  • ⛽Gas Efficiency
  • 💻Automation Tools
  • 🔜Out Of Gas (Coming Soon)
  • 🔜DEX Aggregators (Coming Soon)
  • 🔜Bribes (Coming Soon)
  • 🔜Understanding Compiled Bytecode (coming soon)
  • 🔜Deployment Mistakes (coming soon)
  • 🔜Optimistic Roll-ups (coming soon)
  • 🔜Typos (coming soon)
  • 🔜Try-Catch (coming soon)
  • 🔜NFT Market-place (coming soon)
  • 🔜Upgrade-able Contracts (coming soon)
Powered by GitBook
On this page
  1. 🚿Tutorial 14: Slippage

🏦Resource bank to more slippage vulnerabilities

This page is a open resource where any examples of slippage bugs found in bug bounties, audit reports or live attacks are to be added here.

Book an audit with Zokyo

Links

LogoRekt - Jimbo's Protocol - REKTrekt
LogoUniswapHelper.buyFlanAndBurn is a subject to sandwich attacks · Issue #230 · code-423n4/2022-01-behodler-findingsGitHub
LogoSlippage checks when adding liquidity are too strict · Issue #257 · code-423n4/2021-11-malt-findingsGitHub
Logo`addLiquidity` Does Not Reset Approval If Not All Tokens Were Added To Liquidity Pool · Issue #228 · code-423n4/2021-11-malt-findingsGitHub
LogoFrontrunning in UniswapHandler calls to UniswapV2Router · Issue #219 · code-423n4/2021-11-malt-findingsGitHub
Logo`mintSynth()` and `burnSynth()` can be front run · Issue #209 · code-423n4/2021-11-vader-findingsGitHub
LogoMinting and burning synths exposes users to unlimited slippage · Issue #2 · code-423n4/2021-11-vader-findingsGitHub
LogoregerralFeePool is vulnerable to MEV searcher · Issue #62 · code-423n4/2021-10-mochi-findingsGitHub
LogoMissing slippage checks · Issue #171 · code-423n4/2021-07-spartan-findingsGitHub
PreviousReal World ExamplesNextSlippage Conclusion

Last updated 2 years ago