-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
registerLayer2Candidate() function can be abused to register a vulnerable #8
Comments
@suahnkim
If the Foundation missed the scenario, I think it should be classified as a new vulnerability, separate from the previously reported ones. ps. Also, if it is a previously discovered vulnerability, it would be good to provide evidence as the first report. |
@blackcow1987 hey, sorry for the late response, we have finished discussing internally and will post our answer soon. |
@blackcow1987 Sorry for the delay response: A1. A2. To foster a wide variety of development, we decided to leave this open at the contract level. We don't show this candidate on our frontend to prevent novice users from staking on any candidates that weren't created using createCandidate() This policy is similar to how anyone can create a malicious contract that uses an existing UniswapV3 contract's swap function and build a frontend for it. Users need to verify that the frontend is correct and the contract is safe to use. If there's any loss from this frontend, it's not Uniswap's responsibility. Limiting the composability of dapps would hinder the development of new dapps. @blackcow1987 If you are not satisfied with the answer, we would be more than happy to have a call with you and discuss. As always, we appreciate your report and feedback, and sorry for the delay. If you are ok with the answer, we will close this issue after your confirmation. |
Describe the bug
Community member @blackcow1987 reported an issue with registerLayer2Candidate(), where anyone can register any candidate contract to the DAO. This includes a case where a user's staked TON (for that candidate) can be burned by manipulating who the operator is. @blackcow1987 also submitted test script to show feasibility of the attack.
Configuration
no severity label (won't be fixed)
Impact
Please note that this issue has already been reported by at least three members from Tokamak Network prior to this report. The reason for not removing this function is as follows:
Recommendation
No fix is required and no bounty will be paid.
Report Contributors
This issue will be closed if there are no additional comments by September 2024
The text was updated successfully, but these errors were encountered: