-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
turvec - Attackers can cause DOS attacks for tokens with Cap #142
Comments
This seems to be low due to sponsor's comment:
|
Escalate
As explained in the report above, there is a
These apply for any user depositing with any amount as long as attackers have the fund required for the cap |
The escalation could not be created because you are not exceeding the escalation threshold. You can view the required number of additional valid issues/judging contest payouts in your Profile page, |
The protocol team fixed this issue in the following PRs/commits: |
1 similar comment
The protocol team fixed this issue in the following PRs/commits: |
The Lead Senior Watson signed off on the fix. |
turvec
Medium
Attackers can cause DOS attacks for tokens with Cap
Summary
Attackers can prevent users from depositing certain tokens into the protocol, causing DOS attacks for tokens with Cap
Vulnerability Detail
Users are able to deposit tokens into the vault using the
deposit()
function, however, certain tokens have a deposit limit orcap
:These tokens can also be withdrawn at any time through the
withdraw()
function with no regulation capabilities whatsoever:This allows attackers to run bots that monitor the deposit transactions to any of these capped tokens and front-run it to deposit the capped amount and then back-run it to withdraw out the amount, causing users' deposit transactions to those tokens to revert.
There are multiple reasons for attackers to perform such malicious attacks such as competitor advantage or blackhat reasons e.t.c
Impact
Attackers can cause DOS attacks for tokens with Cap
Code Snippet
PointTokenVault.sol#L118
Tool used
Manual Review
Recommendation
In order to prevent these attacks for tokens with caps, consider implementing a minimum cooldown on withdrawals and a regulating capability of penalizing such activities e.g slashing, temporary blocking or seizing of withdrawals for such blacklisted addresses.
The text was updated successfully, but these errors were encountered: