We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The mitigation adds a new function, getTotalBalance(), to get all the lp tokens staked in the CVX and others left in the staker:
getTotalBalance()
function getTotalBalance() public view returns(uint256 balance) { unchecked { balance = stakedBalance() + clpToken.balanceOf(address(this)); } }
And every stakedBalance() function call in the AMO2.sol has been replaced by getTotalBalance(). This removes all calculation errors and makes sense.
stakedBalance()
The text was updated successfully, but these errors were encountered:
ronnyx2017 issue #2
6817ae4
kirk-baird marked the issue as satisfactory
Sorry, something went wrong.
No branches or pull requests
Lines of code
Vulnerability details
The mitigation adds a new function,
getTotalBalance()
, to get all the lp tokens staked in the CVX and others left in the staker:And every
stakedBalance()
function call in the AMO2.sol has been replaced bygetTotalBalance()
. This removes all calculation errors and makes sense.The text was updated successfully, but these errors were encountered: