Submitted by jayjonah8, also found by rfa, shri4net, and xYrYuYx
The whitepaper says that the Vader token contains a Fee-On-Transfer so in XVader.sol, an attacker may be able to keep calling enter() and leave() while being credited more tokens than the contract actually receives eventually draining it.
Manually code review
There should be pre and post checks on balances to get the real amount
0xstormtrooper (Vader) acknowledged:
