You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 5, 2023. It is now read-only.
sherlock-admin opened this issue
Apr 30, 2023
· 0 comments
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
No Slippage Protection while Swapping tokens through uniswap router
Summary
While Closing Position Farm in AuraSpell, convexSpell and curveSpell, there is a use of Uniswap Router which uses swapExactTokensForTokens method call to Swap rewards tokens to debt token. But the value of amountOutMinimum is set to be zero which allows 100% Value Slippage.
Vulnerability Detail
In closePositionFarm method of all the 3 spell contracts, there is no slippage control while swapping the reward tokens into debt tokens which means that a malicious actor could, e.g., trivially insert transactions before and after the naive transaction (using the infamous "sandwich" attack), causing the smart contract to trade at a radically worse price, profit from this at the caller's expense, and then return the contracts to their original state, all at a low cost.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
DuplicateA valid issue that is a duplicate of an issue with `Has Duplicates` labelHighA valid High severity issueRewardA payout will be made for this issue
Breeje
high
No Slippage Protection while Swapping tokens through uniswap router
Summary
While Closing Position Farm in
AuraSpell
,convexSpell
andcurveSpell
, there is a use of Uniswap Router which usesswapExactTokensForTokens
method call to Swap rewards tokens to debt token. But the value ofamountOutMinimum
is set to be zero which allows 100% Value Slippage.Vulnerability Detail
In
closePositionFarm
method of all the 3 spell contracts, there is no slippage control while swapping the reward tokens into debt tokens which means that a malicious actor could, e.g., trivially insert transactions before and after the naive transaction (using the infamous "sandwich" attack), causing the smart contract to trade at a radically worse price, profit from this at the caller's expense, and then return the contracts to their original state, all at a low cost.Impact
Loss of Funds.
Code Snippet
Link to Code
Link to Code
Link to Code
Tool used
Manual Review
Recommendation
Use a require check at the end of swap to make sure that slippage is not higher than user allowed slippage.
Duplicate of #121
The text was updated successfully, but these errors were encountered: