This is the report from a security audit performed on Beluga Protocol by gorbunovperm.
Beluga Protocol
Commit hash: 84c33c8ca90f4a6d3ed2115bd7b2d90bf595abc9
https://github.com/belugaprotocol/beluga-protocol/tree/84c33c8ca90f4a6d3ed2115bd7b2d90bf595abc9
In total, 3 issues were reported including:
-
0 high severity issue.
-
1 medium severity issues.
-
1 low severity issues.
-
0 owner privileges.
-
1 note.
NoMintRewardPool
contract is not defined. Perhaps we are talking about a StakingRewards
contract from RewardsPool.sol
RewardPool.sol
uses construction tx.origin
to allow only the initiators of the transaction to collect the reward. This can lead to the blocking of many users who use smart contracts for convenience and security. For example, users using multisig contracts will not be able to use this contract.
More info about tx.origin
vulnerabilities: ethereum/solidity#683
-
It is possible to double withdrawal attack. More details here
-
Lack of transaction handling mechanism issue. WARNING! This is a very common issue and it already caused millions of dollars losses for lots of token users! More details here
There are some dangerous vulnerabilities were discovered here.