This repository has been archived by the owner on Jul 14, 2024. It is now read-only.
GatewayGuardians - Incorrect peg for uAD when protocol is deployed #221
Labels
Non-Reward
This issue will not receive a payout
GatewayGuardians
high
Incorrect peg for uAD when protocol is deployed
Summary
The developers mentioned that uAD is 100% collateral backed.
To ensure it, they are backing it with an equal amount of 3CRV in the curve pool during deployment.
Vulnerability Detail
uAD-3CRV
Curve Pool, we need to mint uAD from UbiquityPool.Impact
uAD ($10,000)
and3CRV ($10,300)
Code Snippet
Tool used
Manual Review
Recommendation
Duplicate of #59
The text was updated successfully, but these errors were encountered: