ID:
sharedstake-1139
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Ethereum
Protocol
Staking
Rewards - Bug Bounties
Extended Method:
Is able to bypass timelock checks in the SmartTimelock.sol contract and pull out all the funds immediately without governance approval by abusing the call method to invoke arbitrary external contract methods with arbitrary data.
Days in Operation:
378
(1.04 Years)





100 pts each
Veteran whitehat Lucash-dev submitted a critical timelock vulnerability report in SharedStake’s timelock contracts to Immunefi. This vulnerability allowed the beneficiary of the timelocked funds to transfer out those funds before those funds were scheduled to be released.
At the time of the report, a total of $40m in SharedStake team funds could have been exploited by the intended recipients (the SharedStake core team) using this vulnerability. Because the only parties that could exploit this vulnerability were the SharedStake core team, the SharedStake team marked it with a vulnerability severity level of “High” and paid a $5000 bug bounty.
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.