Sandclock contest - 0x1f8b's results

The Next Generation of Wealth Creation.

General Information

Platform: Code4rena

Start Date: 06/01/2022

Pot Size: $60,000 USDC

Total HM: 20

Participants: 33

Period: 7 days

Judge: LSDan

Total Solo HM: 9

Id: 67

League: ETH

Sandclock

Findings Distribution

Researcher Performance

Rank: 16/33

Findings: 2

Award: $920.23

🌟 Selected for report: 1

πŸš€ Solo Findings: 0

Findings Information

🌟 Selected for report: hickuphh3

Also found by: 0x1f8b

Labels

bug
duplicate
2 (Med Risk)
sponsor disputed

Awards

797.1712 USDC - $797.17

External Links

Handle

0x1f8b

Vulnerability details

Impact

Allow flash loan attacks.

Proof of Concept

The variable minLockPeriod is assignated inside the constructor, and there is no check around this argument, this variable it's very important because it will deny the flash loan attacks, so it's very important to be different than 0.

Tools Used

Manual review.

Check that _minLockPeriod it's different than 0 inside the constructor.

#0 - r2moon

2022-01-12T14:07:49Z

we don't think it's an issue.

#1 - dmvt

2022-01-27T21:40:11Z

This does potentially open assets up to flash loan risk. It is probably a good idea to have this variable guarded, at least in the case of the pattern described in #150. I'm going to consider this a duplicate of that issue since the description is much more thorough.

duplicate #150

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax Β© 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter