Maia DAO Ecosystem - 8olidity's results

Efficient liquidity renting and management across chains with Curvenized Uniswap V3.

General Information

Platform: Code4rena

Start Date: 30/05/2023

Pot Size: $300,500 USDC

Total HM: 79

Participants: 101

Period: about 1 month

Judge: Trust

Total Solo HM: 36

Id: 242

League: ETH

Maia DAO Ecosystem

Findings Distribution

Researcher Performance

Rank: 98/101

Findings: 1

Award: $5.20

🌟 Selected for report: 0

🚀 Solo Findings: 0

Awards

5.2022 USDC - $5.20

Labels

bug
2 (Med Risk)
downgraded by judge
partial-50
duplicate-577

External Links

Lines of code

https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L206-L207 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L144-L145 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L357-L358 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/TalosStrategyVanilla.sol#L146-L147

Vulnerability details

Impact

There is no slippage protection on any of the calls to increase or decrease liquid-ity, allowing for trades to be subject to MEV-style attacks such as front-running and sandwiching.

The previous audit report mentioned this problem, but only fixed the problem in the redeem() function, but TalosBaseStrategy::init , TalosBaseStrategy::deposit , TalosBaseStrategy::_withdrawAll, TalosStrategyVanilla::_compoundFees These functions are not fixed

Proof of Concept

https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L206-L207 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L144-L145 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/base/TalosBaseStrategy.sol#L357-L358 https://github.com/code-423n4/2023-05-maia/blob/main/src/talos/TalosStrategyVanilla.sol#L146-L147

Tools Used

vscode

We recommend adding user parameters in that allow for the customization of the level of slippage tolerance so that amount0Min and amount1Min can be adjusted ac-cordingly

Assessed type

Uniswap

#0 - c4-judge

2023-07-09T17:38:13Z

trust1995 marked the issue as duplicate of #828

#1 - c4-judge

2023-07-09T17:38:18Z

trust1995 marked the issue as partial-50

#2 - c4-judge

2023-07-11T17:03:21Z

trust1995 marked the issue as duplicate of #177

#3 - c4-judge

2023-07-11T17:04:19Z

trust1995 changed the severity to 3 (High Risk)

#4 - c4-judge

2023-07-25T08:54:03Z

trust1995 changed the severity to 2 (Med Risk)

AuditHub

A portfolio for auditors, a security profile for protocols, a hub for web3 security.

Built bymalatrax © 2024

Auditors

Browse

Contests

Browse

Get in touch

ContactTwitter