You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How does meta-pool prevent a malicious operator / owner from setaling coins via a malicious staking pool? A attack vector i'm thinking of:
A malicious actor gets voted in as an operator
The owner creates malicious contract that implements the staking pool NEP. The malicious bit is deposit simply increases their balance in the staking pool, regardless of the sender. And withdraw only ever withdraws to the attacker's address
The owner adds the staking pool to the list of staking pools in metapool, and overweights it in the following line:
Solution: add a check that all the staking-pools account_ids are in the form *.poolv1.near, and that will solve the issue, because all staking-pools created as *.poolv1.near can only be deployed by the whitelisted stake-pool factory
How does meta-pool prevent a malicious operator / owner from setaling coins via a malicious staking pool? A attack vector i'm thinking of:
deposit
simply increases their balance in the staking pool, regardless of the sender. Andwithdraw
only ever withdraws to the attacker's addressmeta-pool/metapool/src/owner.rs
Line 71 in 607556c
ping
orstake
, then coins are "stolen" into the malicious staking pool that implements the NEP, but is otherwise maliciousI feel like I'm missing something - or is such attacks simply possible?
The text was updated successfully, but these errors were encountered: