Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

strategiesLength should not be allowed to exceed MAX_STRATS #110

Open
code423n4 opened this issue Jul 7, 2021 · 2 comments
Open

strategiesLength should not be allowed to exceed MAX_STRATS #110

code423n4 opened this issue Jul 7, 2021 · 2 comments

Comments

@code423n4
Copy link
Contributor

Handle

pauliax

Vulnerability details

Impact

function setStrategiesLength should check that the value is not above MAX_STRATS. Now admin can set any arbitrary value for strategiesLength. The number of iterations in loops relies on this value so if it becomes too high, a block gas limit may be exceeded. Thus it makes sense to explicitly enforce the limit with MAX_STRATS.

Recommended Mitigation Steps

require _strategiesLength <= MAX_STRATS

@kitty-the-kat
Copy link
Collaborator

either non-critical or no an issue.
This issue relies on malicious governance that woulnt be behind a timelock. Would also not block out any ability to save assets from the vault.

@ghoul-sol
Copy link
Collaborator

The problem is presented from different view but is essentially the result of #17 so it's non-critical.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants